Funder
Fonds National de la Recherche Luxembourg
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Hardware and Architecture,Human-Computer Interaction,Information Systems,Software
Reference37 articles.
1. Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th international conference on World Wide Web, Banff, AB, Canada, May 2007, pp 181–190
2. Casas-Roma J, Herrera-Joancomartí J, Torra V (2013) An algorithm for
$$k$$
k
-degree anonymity on large networks. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, Niagara Falls, Canada, August 2013, pp 671–675
3. Casas-Roma J, Herrera-Joancomartí J, Torra V (2017)
$$k$$
k
-degree anonymity and edge selection: improving data utility in large networks. Knowl Inf Syst 50(2):447–474
4. Chatterjee T, DasGupta B, Mobasheri N, Srinivasan V, Yero I (2016) On the computational complexities of three privacy measures for large networks under active attack. CoRR, abs/1607.01438
5. Chen W, Cao Y, Wang H (2015) Conditional anonymity with non-probabilistic adversary. Inf Sci 324:32–43
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献