{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:08:28Z","timestamp":1748668108218,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030718510"},{"type":"electronic","value":"9783030718527"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-71852-7_18","type":"book-chapter","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T07:02:45Z","timestamp":1615532565000},"page":"277-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach"],"prefix":"10.1007","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,13]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. In: Proceedings of the VLDB Endowment, vol. 1, pp. 833\u2013844 (2008)","DOI":"10.14778\/1453856.1453947"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkata, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, April, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"18_CR3","unstructured":"Dwork, C., Kobliner, Y.: Preserving privacy when statistically analyzing a large database. U.S. Patent Application 11\/038,446, (2006)."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Shen, E., Yu, T.: Mining frequent graph patterns with differential privacy. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2013)","DOI":"10.1145\/2487575.2487601"},{"key":"18_CR5","unstructured":"Wang, Q.: Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans. Dependable Secure Comput. 15(4), 591\u2013606 (2016)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Baden, R.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39 (2009)","DOI":"10.1145\/1594977.1592585"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/2775051.2677005","volume":"50","author":"H Ebadi","year":"2015","unstructured":"Ebadi, H., Sands, D., Schneider, G.: Differential privacy: now it\u2019s getting personal. ACM Sigplan Notices 50, 69\u201381 (2015)","journal-title":"ACM Sigplan Notices"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: 2015 IEEE 31St International Conference on Data Engineering (2015).","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"18_CR9","unstructured":"Zhang, S., Kang, H., Yan, H.: Privacy preserving for social network relational data based on Skyline computing. J. Comput. Appl. 39, 1394-1399 (2019)"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Chamikara, M.A.P., Bert\u00f3k, P., Liu, D.: An efficient and scalable privacy preserving algorithm for big data and data streams. Comput. Secur. 87, 101570 (2019)","DOI":"10.1016\/j.cose.2019.101570"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Cui, L., Qu, Y., Yu, S., Gao, L.: A Trust-grained personalized privacy-preserving scheme for big social data. In: 2018 IEEE International Conference on Communications (ICC). 20\u201324 May, pp. 1938\u20131883 (2018)","DOI":"10.1109\/ICC.2018.8422439"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0024-3795(03)00483-X","volume":"373","author":"ER Van Dam","year":"2003","unstructured":"Van Dam, E.R., Haemers, W.H.: Which graphs are determined by their spectrum. Linear Algebra Appl. 373, 241\u2013272 (2003)","journal-title":"Linear Algebra Appl."},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s10115-006-0001-2","volume":"10","author":"S Xu","year":"2006","unstructured":"Xu, S., Zhang, J., Han, D.: Singular value decomposition-based data distortion strategy for privacy protection. Knowl. Inf. Syst. 10, 383\u2013397 (2006)","journal-title":"Knowl. Inf. Syst."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Wu, L., Ying, X., Wu, X.: Reconstruction from randomized graph via low rank approximation. In: Proceedings of the 2010 SIAM International Conference on Data Mining, Society for Industrial and Applied Mathematics, pp. 60\u201371 (2010)","DOI":"10.1137\/1.9781611972801.6"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"016101","DOI":"10.1103\/PhysRevE.81.016101","volume":"81","author":"D Liu","year":"2010","unstructured":"Liu, D., Wang, H., Van Mieghem, P.: Spectral perturbation and reconstructability of complex networks. Phys. Rev. E 81, 016101 (2010)","journal-title":"Phys. Rev. E"},{"key":"18_CR16","unstructured":"Yong, Z., Lingjie, Z., Zhongyuan, J.: Security analysis of weighted network anonymity based on singular value decomposition. J. Commun. 39, 23 (2018)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-37456-2_28","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Wu, X., Wu, L.: Differential privacy preserving spectral graph analysis. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS (LNAI), vol. 7819, pp. 329\u2013340. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37456-2_28"},{"key":"18_CR18","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. 9, 211\u2013407 (2014)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Li, C., Hay, M., Miklau, G., Wang, Y.: A data-and workload-aware algorithm for range queries under differential privacy. PVLDB 7(5) (2014)","DOI":"10.14778\/2732269.2732271"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Shekhar S., Xiong H., Zhou X.: Root-Mean-Square Error. Encyclopedia of GIS. Springer, Cham (2017).https:\/\/doi.org\/10.1007\/978-3-319-17885-1_101137","DOI":"10.1007\/978-3-319-17885-1_101137"},{"key":"18_CR21","unstructured":"Stanford network dataset collection. https:\/\/snap.stanford.edu\/dat"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-71852-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T07:09:09Z","timestamp":1615532949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-71852-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030718510","9783030718527"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-71852-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"13 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}