共 184 条
- [1] Ji S., Mittal P., Beyah R., Graph Data Anonymization, AttacksDe-Anonymization, and QuantificationDe-Anonymizability: A Survey, IEEE Communications Surveys & Tutorials, 19, 2, pp. 1305-1326, (2017)
- [2] Liu K, Terzi E., Towards identity anonymization on graphs, Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93-106, (2008)
- [3] Liu XY, Yang XC., Survey on privacy preserving techniques for publishing social network data, Journal of Software, 25, 3, pp. 576-590, (2014)
- [4] Zou L., Chen L., Ozsu M.T., k-automorphism: a general framework for privacy preserving network publication, Proc. VLDB Endow, 2, 1, pp. 946-957, (2009)
- [5] Chen X, Kepuska E, Mauw S, Et al., Active Re-identification Attacks on Periodically Released Dynamic Social Graphs, Proceedings of the European Symposium on Research in Computer Security, pp. 185-205, (2020)
- [6] Korolova A., Et al., Link privacy in social networks, Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp. 289-298, (2008)
- [7] Wondracek G, Holz T, Kirda E, Et al., A practical attack to de-anonymize social network users, Proceedings of the 2010 Ieee Symposium on Security and Privacy, pp. 223-238, (2010)
- [8] Shirani F, Garg S, Erkip E., Optimal active social network de-anonymization using information thresholds, Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), pp. 1445-1449, (2018)
- [9] Backstrom L., Dwork C., Kleinberg J., Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th International Conference on World Wide Web, pp. 181-190, (2007)
- [10] Hay M., Et al., Resisting structural re-identification in anonymized social networks, The VLDB Journal, 19, 6, pp. 797-823, (2010)