Author:
Cormode Graham,Srivastava Divesh,Yu Ting,Zhang Qing
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems
Reference25 articles.
1. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore are thou R3579X? Anonymized social networks, hidden patterns and structural steganography. In: International Conference on World Wide Web (WWW) (2007)
2. Bennett, J., Lanning, S.: The Netflix prize. In: KDDCup Workshop (2007)
3. Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. In: International Conference on Very Large Data Bases (2009)
4. Campan, A., Truta, T.M.: A clustering approach for data and structural anonymity in social networks. In: International Workshop on Privacy, Security and Trust in KDD (PinKDD) (2008)
5. Garey M.R., Johnson D.S. (1979) Computers and Intractability, a Guide to the Theory of NP-Completeness. W.H. Freeman and Company, San Francisco
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献