- [1] , Differential Privacy, Automata, languages and programming, Springer Berlin Heidelberg, 2006, pp. 1–12.Google Scholar
- [2] ,
Differentially private histogram publishing through lossy compression , in: IEEE, International conference on data mining, IEEE Computer Society, 2012, pp. 1–10.Google Scholar - [3] , Differentially private histogram publication, VLDB J 22 (6) (2013) 32–43.Google Scholar
- [4] , Boosting the accuracy of differentially private histograms through consistency, Proc VLDB Endowment 3 (1-2) (2010) 1021–1032.Google Scholar
- [5] ,
Differentially private sequential data publication via variable-length n-grams , in: ACM conference on computer and communications security, ACM, 2012, pp. 638–649.Google Scholar - [6] G. Cormode, M. Procopiuc, E. Shen, et al. Differentially private spatial decompositions. 2011, 41(4):20–31.Google Scholar
- [7] ,
Differentially private transit data publication: a case study on the montreal transportation system , in: ACM SIGKDD international conference on knowledge discovery and data mining, ACM, 2012, pp. 213–221.Google Scholar - [8] , Diffusion wavelet-based analysis on traffic matrices by different diffusion operators, Comput Electr Eng 40 (6) (2014) 1874–1882.Google Scholar
- [9] L. Liu, J. Wang, J. Liu, et al. Privacy preserving in social networks against sensitive edge disclosure. 2008.Google Scholar
- [10] ,
Anonymizing graphs against weight-based attacks , in: IEEE International conference on data mining workshops, IEEE Computer Society, 2010, pp. 491–498.Google Scholar - [11] ,
Privacy preservation by k-anonymization of weighted social networks , in: International conference on advances in social networks analysis and mining, IEEE Computer Society, 2012, pp. 423–428.Google Scholar - [12] , Privacy preserving based on diffrential privacy for weighted social networks, J Commun 36 (9) (2015) 145–159.Google Scholar
- [13] , Differential privacy via wavelet transforms, IEEE Trans Knowl Data Eng 23 (8) (2010) 1200–1214.Google ScholarDigital Library
- [14] , Calibrating noise to sensitivity in private data analysis, Theory of cryptography, Springer, Berlin Heidelberg, 2006, pp. 265–284.Google ScholarDigital Library
- [15] ,
Differential privacy: a survey of results , in: International conference on theory and applications of models of computation, Springer-Verlag, 2008, pp. 1–19.Google Scholar - [16] ,
Diffusion wavelets based analysis on traffic matrices , in: Parallel and distributed computing. applications and technologies (PDCAT). 2011 12th international conference on IEEE, 2011, pp. 116–121.Google Scholar - [17] , Diffusion wavelets, Appl Comput Harmon Anal 21 (1) (2006) 53–94.Google Scholar
- [18] , Anomaly detection by diffusion wavelet-based analysis on traffic matrix, Educ Rev 8 (4) (2011) 241–248.Google Scholar
- [19] ,
Accurate estimation of the degree distribution of private networks , in: ICDM 2009, the ninth IEEE international conference on data mining,Miami, Florida, USA , DBLP, 2009, pp. 169–178. 6-9 December.Google Scholar - [20] ,
Sharing graphs using differentially private graph models , in: ACM SIGCOMM conference on internet measurement conference, ACM, 2011, pp. 81–98.Google Scholar - [21] , An information flow model for conflict and fission in small groups, J Anthropol Res 33 (4) (1977) 452–473.Google Scholar
- [22] , The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations, Behav Ecol Sociobiol 54 (4) (2003) 396–405.Google Scholar
- [23] ,
Preserving privacy in social networks against neighborhood attacks , in: Prof. 24th int. conf. on data engineering, 2008, pp. 506–515.Google Scholar - [24] , Privacy-preserving data publishing: an overview, Morgan & Claypool Publishers, San Rafael, Calif., 2010.Google Scholar
- [25] , Collectivedynamics of ’small-world’ networks, Nature (1998) 440–442.Google Scholar
- [26] , The stanford graphbase: a platform for combinatorial computing, Addison-Wesley, Reading, MA, 1993.Google Scholar
- [27] , Shortest connection networks And some generalizations, Bell Syst Tech J 36 (November(6)) (1957) 1389–1401.Google Scholar
- [28] , "A note on two problems in connexion with graphs" (PDF), Numerische Mathematik 1 (1959) 269–271.Google Scholar
Index Terms
- Diffusion Wavelet-based Privacy Preserving in social networks
Recommendations
Personalized privacy-preserving social recommendation
AAAI'18/IAAI'18/EAAI'18: Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial IntelligencePrivacy leakage is an important issue for social recommendation. Existing privacy preserving social recommendation approaches usually allow the recommender to fully control users' information. This may be problematic since the recommender itself may be ...
Privacy Preserving in Dynamic Social Networks
ICIA-16: Proceedings of the International Conference on Informatics and AnalyticsIn recent years, social networks are widely used for representing the relationship between individuals and published for various research purposes. As time changes the relationship between individuals also changes so there exist a privacy breach of ...
Privacy leakage analysis in online social networks
Online Social Networks (OSNs) have become one of the major platforms for social interactions, such as building up relationship, sharing personal experiences, and providing other services. The wide adoption of OSNs raises privacy concerns due to personal ...
Comments