{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T03:11:40Z","timestamp":1775272300771,"version":"3.50.1"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030046507","type":"print"},{"value":"9783030046514","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04651-4_18","type":"book-chapter","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T14:56:50Z","timestamp":1542293810000},"page":"262-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Defend the Clique-based Attack for Data Privacy"],"prefix":"10.1007","author":[{"given":"Meng","family":"Han","sequence":"first","affiliation":[]},{"given":"Dongjing","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Jinbao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liyuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,16]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, J., Li, Q., Schooler, E.M.: iHEMS: an information-centric approach to secure home energy management. In: 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 217\u2013222. IEEE (2012)","DOI":"10.1109\/SmartGridComm.2012.6485986"},{"issue":"4","key":"18_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1228268.1228277","volume":"35","author":"K Aberer","year":"2006","unstructured":"Aberer, K., Alonso, G., Kossmann, D.: Data management for a smart earth: the swiss NCCR-MICS initiative. ACM SIGMOD Rec. 35(4), 40\u201345 (2006)","journal-title":"ACM SIGMOD Rec."},{"issue":"1","key":"18_CR3","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"C Perera","year":"2014","unstructured":"Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. IEEE Commun. Surv. Tutor. 16(1), 414\u2013454 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/7576307","volume":"2017","author":"Y Liang","year":"2017","unstructured":"Liang, Y., Cai, Z., Han, Q., Li, Y.: Location privacy leakage through sensory data. Secur. Commun. Netw. 2017, 1\u201312 (2017)","journal-title":"Secur. Commun. Netw."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056976"},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1109\/TVT.2016.2585591","volume":"66","author":"Z He","year":"2017","unstructured":"He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh. Technol. 66(3), 2789\u20132800 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173\u2013187. IEEE (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Potharaju, R., Carbunar, B., Nita-Rotaru, C.: iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM (2010) 723\u2013725","DOI":"10.1145\/1866307.1866410"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Guly\u00e1s, G.G., Simon, B., Imre, S.: An efficient and robust social network de-anonymization attack. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 1\u201311. ACM (2016)","DOI":"10.1145\/2994620.2994632"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: 2014 Proceedings IEEE INFOCOM, pp. 754\u2013762. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321. ACM (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"18_CR13","unstructured":"Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429\u2013444 (1977)"},{"issue":"1","key":"18_CR14","first-page":"8","volume":"2","author":"C Dwork","year":"2008","unstructured":"Dwork, C., Naor, M.: On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Priv. Confid. 2(1), 8 (2008)","journal-title":"J. Priv. Confid."},{"issue":"2","key":"18_CR15","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1137\/0210021","volume":"10","author":"M Yannakakis","year":"1981","unstructured":"Yannakakis, M.: Edge-deletion problems. SIAM J. Comput. 10(2), 297\u2013309 (1981)","journal-title":"SIAM J. Comput."},{"issue":"05","key":"18_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"issue":"3\u20134","key":"18_CR17","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"issue":"6221","key":"18_CR18","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"issue":"4","key":"18_CR19","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","volume":"16","author":"AL Young","year":"2013","unstructured":"Young, A.L., Quan-Haase, A.: Privacy protection strategies on facebook: the internet privacy paradox revisited. Inf. Commun. Soc. 16(4), 479\u2013500 (2013)","journal-title":"Inf. Commun. Soc."},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.pmcj.2014.09.010","volume":"17","author":"C Bettini","year":"2015","unstructured":"Bettini, C., Riboni, D.: Privacy protection in pervasive systems: state of the art and technical challenges. Pervasive Mob. Comput. 17, 159\u2013174 (2015)","journal-title":"Pervasive Mob. Comput."},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1109\/TSG.2016.2626317","volume":"9","author":"J Zhao","year":"2016","unstructured":"Zhao, J., Liu, J., Qin, Z., Ren, K.: Privacy protection scheme based on remote anonymous attestation for trusted smart meters. IEEE Trans. Smart Grid 9, 3313\u20133320 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Naor, M., Nissim, K.: Communication preserving protocols for secure function evaluation. In: Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing, pp. 590\u2013599. ACM (2001)","DOI":"10.1145\/380752.380855"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Goldwasser, S.: Multi party computations: past and present. In: Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, pp. 1\u20136. ACM (1997)","DOI":"10.1145\/259380.259405"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Han, M., Li, J., Cai, Z., Han, Q.: Privacy reserved influence maximization in GPS-enabled cyber-physical and online social networks. In: 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom), pp. 284\u2013292. IEEE (2016)","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.51"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Albinali, H., Han, M., Wang, J., Gao, H., Li, Y.: The roles of social network mavens. In: 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/MSN.2016.009"},{"key":"18_CR26","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. (2018)"},{"key":"18_CR27","unstructured":"Zheng, X., Luo, G., Cai, Z.: A fair mechanism for private data publication in online social networks. IEEE Trans. Netw. Sci. Eng. (2018)"},{"issue":"2","key":"18_CR28","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/TCSS.2018.2797225","volume":"5","author":"J Li","year":"2018","unstructured":"Li, J., Cai, Z., Wang, J., Han, M., Li, Y.: Truthful incentive mechanisms for geographical position conflicting mobile crowdsensing systems. IEEE Trans. Comput. Soc. Syst. 5(2), 324\u2013334 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.procs.2018.03.079","volume":"129","author":"M Han","year":"2018","unstructured":"Han, M., Wang, J., Yan, M., Ai, C., Duan, Z., Hong, Z.: Near-complete privacy protection: cognitive optimal strategy in location-based services. Procedia Comput. Sci. 129, 298\u2013304 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"18_CR30","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/978-3-319-78813-5_28","volume-title":"Security and Privacy in Communication Networks","author":"X Ling","year":"2018","unstructured":"Ling, X., Wu, C., Ji, S., Han, M.: H$$_{2}$$DoS: an application-layer DoS attack towards HTTP\/2 protocol. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds.) SecureComm 2017. LNICST, vol. 238, pp. 550\u2013570. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78813-5_28"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Han, M., Li, L., Peng, X., Hong, Z., Li, M.: Information privacy of cyber transportation system: opportunities and challenges. In: Proceedings of the 6th Annual Conference on Research in Information Technology, pp. 23-28. ACM (2017). https:\/\/dl.acm.org\/citation.cfm?id=31256","DOI":"10.1145\/3125649.3125652"},{"issue":"6","key":"18_CR32","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1109\/JIOT.2017.2679483","volume":"4","author":"X Zheng","year":"2017","unstructured":"Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. 4(6), 1868\u20131878 (2017)","journal-title":"IEEE Internet Things J."},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Han, M., Liu, L., He, J.S., Wang, Y.: Deep learning approach for cyberattack detection. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 262\u2013267. IEEE (2018)","DOI":"10.1109\/INFCOMW.2018.8407032"},{"key":"18_CR34","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-981-10-3892-1_4","volume-title":"Secure and Trustworthy Transportation Cyber-Physical Systems","author":"M Han","year":"2017","unstructured":"Han, M., Duan, Z., Li, Y.: Privacy issues for transportation cyber physical systems. In: Sun, Y., Song, H. (eds.) Secure and Trustworthy Transportation Cyber-Physical Systems. SCS, pp. 67\u201386. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-3892-1_4"},{"issue":"2","key":"18_CR35","doi-asserted-by":"publisher","first-page":"121","DOI":"10.3934\/mfc.2018007","volume":"1","author":"AP Joshi","year":"2018","unstructured":"Joshi, A.P., Han, M., Wang, Y.: A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 1(2), 121\u2013147 (2018)","journal-title":"Math. Found. Comput."},{"key":"18_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/978-3-319-94268-1_81","volume-title":"Wireless Algorithms, Systems, and Applications","author":"L Liu","year":"2018","unstructured":"Liu, L., Han, M., Wang, Y., Zhou, Y.: Understanding data breach: a visualization aspect. In: Chellappan, S., Cheng, W., Li, W. (eds.) WASA 2018. LNCS, vol. 10874, pp. 883\u2013892. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94268-1_81"},{"issue":"4","key":"18_CR37","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1700349","volume":"32","author":"Y Liang","year":"2018","unstructured":"Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8\u201314 (2018)","journal-title":"IEEE Netw."},{"key":"18_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00779-017-1102-5","volume":"22","author":"J Wang","year":"2018","unstructured":"Wang, J., Cai, Z., Li, Y., Yang, D., Li, J., Gao, H.: Protecting query privacy with differentially private k-anonymity in location-based services. Pers. Ubiquit. Comput. 22, 1\u201317 (2018)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"1","key":"18_CR39","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Dwork, C., Rothblum, G.N., Vadhan, S.: Boosting and differential privacy. In: 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 51\u201360. IEEE (2010)","DOI":"10.1109\/FOCS.2010.12"},{"key":"18_CR41","unstructured":"Chaudhuri, K., Monteleoni, C.: Privacy-preserving logistic regression. In: Advances in Neural Information Processing Systems pp. 289\u2013296 (2009)"},{"key":"18_CR42","unstructured":"Chaudhuri, K., Sarwate, A., Sinha, K.: Near-optimal differentially private principal components. In: Advances in Neural Information Processing Systems, pp. 989\u2013997 (2012)"},{"issue":"5","key":"18_CR43","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSP.2013.2259911","volume":"30","author":"AD Sarwate","year":"2013","unstructured":"Sarwate, A.D., Chaudhuri, K.: Signal processing and machine learning with differential privacy: algorithms and challenges for continuous data. IEEE Sig. Process. Mag. 30(5), 86\u201394 (2013)","journal-title":"IEEE Sig. Process. Mag."},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Ho, S.S., Ruan, S.: Differential privacy for location pattern mining. In: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pp. 17\u201324. ACM (2011)","DOI":"10.1145\/2071880.2071884"},{"issue":"12","key":"18_CR45","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TMC.2012.208","volume":"12","author":"R Dewri","year":"2013","unstructured":"Dewri, R.: Local differential perturbations: location privacy under approximate knowledge attackers. IEEE Trans. Mob. Comput. 12(12), 2360\u20132372 (2013)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"18_CR46","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Xiong, L.: Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1298\u20131309. ACM (2015)","DOI":"10.1145\/2810103.2813640"},{"key":"18_CR47","doi-asserted-by":"crossref","unstructured":"Yildiz, H., Kruegel, C.: Detecting social cliques for automated privacy control in online social networks. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 353\u2013359. IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197509"},{"issue":"8","key":"18_CR48","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2012","unstructured":"Pan, X., Xu, J., Meng, X.: Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans. Knowl. Data Eng. 24(8), 1506\u20131519 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"18_CR49","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shi, E., Rubinstein, B.I.: Link prediction by de-anonymization: How we won the Kaggle social network challenge. In: The 2011 International Joint Conference on Neural Networks (IJCNN), pp. 1825\u20131834. IEEE (2011)","DOI":"10.1109\/IJCNN.2011.6033446"},{"key":"18_CR50","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Hicks, M.: Deanonymizing mobility traces: using social network as a side-channel. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 628\u2013637. ACM (2012)","DOI":"10.1145\/2382196.2382262"},{"key":"18_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-13257-0_14","volume-title":"Information Security","author":"S Ji","year":"2014","unstructured":"Ji, S., Li, W., Srivatsa, M., He, J.S., Beyah, R.: Structure based data de-anonymization of social networks and mobility traces. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC 2014. LNCS, vol. 8783, pp. 237\u2013254. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13257-0_14"},{"issue":"3","key":"18_CR52","first-page":"11","volume":"4","author":"GG Guly\u00e1s","year":"2011","unstructured":"Guly\u00e1s, G.G., Imre, S.: Analysis of identity separation against a passive clique-based de-anonymization attack. Infocommunications J. 4(3), 11\u201320 (2011)","journal-title":"Infocommunications J."},{"key":"18_CR53","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/acprof:oso\/9780198566076.003.0001","volume-title":"Invitation to Fixed-Parameter Algorithms","author":"Rolf Niedermeier","year":"2006","unstructured":"Niedermeier, R.: Invitation to Fixed-parameter Algorithms (2006)"},{"key":"18_CR54","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.endm.2009.02.008","volume":"32","author":"D Br\u00fcgmann","year":"2009","unstructured":"Br\u00fcgmann, D., Komusiewicz, C., Moser, H.: On generating triangle-free graphs. Electron. Notes Discret. Math. 32, 51\u201358 (2009)","journal-title":"Electron. Notes Discret. Math."},{"key":"18_CR55","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-1-4684-2001-2_9","volume-title":"Complexity of Computer Computations","author":"RM Karp","year":"1972","unstructured":"Karp, R.M.: Reducibility among combinatorial problems. In: Miller, R.E., Thatcher, J.W., Bohlinger, J.D. (eds.) Complexity of Computer Computations, pp. 85\u2013103. Springer, Heidelberg (1972). https:\/\/doi.org\/10.1007\/978-1-4684-2001-2_9"},{"issue":"1","key":"18_CR56","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10115-013-0693-z","volume":"42","author":"J Yang","year":"2015","unstructured":"Yang, J., Leskovec, J.: Defining and evaluating network communities based on ground-truth. Knowl. Inf. Syst. 42(1), 181\u2013213 (2015)","journal-title":"Knowl. Inf. Syst."},{"issue":"1","key":"18_CR57","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2009","unstructured":"Leskovec, J., Lang, K.J., Dasgupta, A., Mahoney, M.W.: Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math. 6(1), 29\u2013123 (2009)","journal-title":"Internet Math."},{"key":"18_CR58","unstructured":"Leskovec, J., Mcauley, J.J.: Learning to discover social circles in ego networks. In: Advances in Neural Information Processing Systems, pp. 539\u2013547 (2012)"},{"key":"18_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-39718-2_23","volume-title":"The Semantic Web - ISWC 2003","author":"M Richardson","year":"2003","unstructured":"Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351\u2013368. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39718-2_23"},{"key":"18_CR60","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D., Kleinberg, J.: Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, pp. 641\u2013650. ACM (2010)","DOI":"10.1145\/1772690.1772756"},{"key":"18_CR61","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Huttenlocher, D., Kleinberg, J.: Signed networks in social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1361\u20131370. ACM (2010)","DOI":"10.1145\/1753326.1753532"},{"key":"18_CR62","unstructured":"Ji, S., Li, W., Mittal, P., Hu, X., Beyah, R.A.: SecGraph: a uniform and open-source evaluation system for graph data anonymization and de-anonymization. In: USENIX Security Symposium, pp. 303\u2013318 (2015)"},{"key":"18_CR63","doi-asserted-by":"crossref","unstructured":"Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: Proceedings of the 2008 SIAM International Conference on Data Mining, pp. 739\u2013750. SIAM (2008)","DOI":"10.1137\/1.9781611972788.67"},{"key":"18_CR64","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013106. ACM (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"18_CR65","doi-asserted-by":"crossref","unstructured":"Sala, A., Zhao, X., Wilson, C., Zheng, H., Zhao, B.Y.: Sharing graphs using differentially private graph models. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 81\u201398. ACM (2011)","DOI":"10.1145\/2068816.2068825"},{"key":"18_CR66","doi-asserted-by":"crossref","unstructured":"Yartseva, L., Grossglauser, M.: On the performance of percolation graph matching. In: Proceedings of the First ACM Conference on Online Social Networks, pp. 119\u2013130. ACM (2013)","DOI":"10.1145\/2512938.2512952"}],"container-title":["Lecture Notes in Computer Science","Combinatorial Optimization and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04651-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:31:58Z","timestamp":1775269918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-04651-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030046507","9783030046514"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04651-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"16 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COCOA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Combinatorial Optimization and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cocoa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spacl.kennesaw.edu\/cocoa2018\/cfp.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}