{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:58:10Z","timestamp":1742943490450,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031200984"},{"type":"electronic","value":"9783031200991"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-20099-1_8","type":"book-chapter","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:04:11Z","timestamp":1673535851000},"page":"89-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Federated Community Detection in\u00a0Social Networks"],"prefix":"10.1007","author":[{"given":"Zhiwei","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Zekai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"issue":"1","key":"8_CR1","first-page":"19","volume":"7","author":"K Chan","year":"2006","unstructured":"Chan, K., Liebowitz, J.: The synergy of social network analysis and knowledge mapping: a case study. Int. J. Manage. Decis. Making 7(1), 19\u201335 (2006)","journal-title":"Int. J. Manage. Decis. Making"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TCE.2011.6018863","volume":"57","author":"S Ji-Yeon","year":"2011","unstructured":"Ji-Yeon, S., et al.: Resource-aware smart home management system by constructing resource relation graph. IEEE Trans. Consum. Electr. 57(3), 1112\u20131119 (2011)","journal-title":"IEEE Trans. Consum. Electr."},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-80091-w","volume":"11","author":"A Dhand","year":"2021","unstructured":"Dhand, A., et al.: Social network structure and composition in former NFL football players. Sci. Rep. 11(1), 1\u20139 (2021)","journal-title":"Sci. Rep."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1038\/s41562-020-0898-6","volume":"46","author":"P Block","year":"2020","unstructured":"Block, P., et al.: Social network-based distancing strategies to flatten the COVID-19 curve in a post-lockdown world. Nature Hum. Behav. 46, 588\u2013596 (2020)","journal-title":"Nature Hum. Behav."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Blondel, V.D., et al.: Fast unfolding of communities in large networks. J. Stat. Mech. Theor. Exp. 2008(10), P10008 (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"issue":"10","key":"8_CR6","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/12\/10\/103018","volume":"12","author":"S Gregory","year":"2010","unstructured":"Gregory, S.: Finding overlapping communities in networks by label propagation. New J. Phys. 12(10), 103018 (2010)","journal-title":"New J. Phys."},{"issue":"5","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00264-2","volume":"1","author":"DB Acharya","year":"2020","unstructured":"Acharya, D.B., Zhang, H.: Community detection clustering via gumbel softmax. SN Comput. Sci. 1(5), 1\u201311 (2020). https:\/\/doi.org\/10.1007\/s42979-020-00264-2","journal-title":"SN Comput. Sci."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Wu, X., et al.: A survey of algorithms for privacy-preservation of graphs and social networks (2010)","DOI":"10.1007\/978-1-4419-6045-0_14"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-37456-2_28","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Wu, X., Wu, L.: Differential privacy preserving spectral graph analysis. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS (LNAI), vol. 7819, pp. 329\u2013340. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37456-2_28"},{"key":"8_CR10","unstructured":"Dimple, M.A., Smit, T.: A review paper on privacy preservation of data mining using randomization response technique"},{"key":"8_CR11","unstructured":"Xuan, D., et al.: De-anonymizing dynamic social networks. In: Proceedings of the Global Communications Conference, GLOBECOM 2011, 5\u20139 December 2011, Houston, Texas, USA (2011)"},{"key":"8_CR12","unstructured":"M\u00fclle, Y., Clifton, C., B\u00f6hm, K.: Privacy-integrated graph clustering through differential privacy. In: EDBT\/ICDT Workshops, vol. 157 (2015)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Qin, Z., et al.: Generating synthetic decentralized social graphs with local differential privacy. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 425\u2013438 (2017)","DOI":"10.1145\/3133956.3134086"},{"key":"8_CR14","unstructured":"Yang, M., et al.: Local differential privacy and its applications: a comprehensive survey. arXiv preprint arXiv:2008.03686 (2020)"},{"key":"8_CR15","unstructured":"Pinot, R., et al.: Graph-based clustering under differential privacy (2018)"},{"key":"8_CR16","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of EUROCRYPT\u201999, Czech Republic, May 1999"},{"key":"8_CR17","unstructured":"Hardy, S., et al.: Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption (2017)"},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"ZhouJian, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. In: Knowledge Information Systems (2011). https:\/\/doi.org\/10.1007\/s10115-010-0311-2","DOI":"10.1007\/s10115-010-0311-2"},{"issue":"3","key":"8_CR19","first-page":"15912","volume":"5","author":"A Praveena","year":"2016","unstructured":"Praveena, A., Smys, S.: Anonymization in social networks: a survey on the issues of data privacy in social network sites. J. Int. J. Eng. Comput. Sci. 5(3), 15912\u201315918 (2016)","journal-title":"J. Int. J. Eng. Comput. Sci."},{"issue":"18","key":"8_CR20","doi-asserted-by":"publisher","first-page":"25455","DOI":"10.1007\/s11042-019-07745-4","volume":"78","author":"D Mohapatra","year":"2019","unstructured":"Mohapatra, D., Patra, M.R.: Anonymization of attributed social graph using anatomy based clustering. Multimedia Tools Appl. 78(18), 25455\u201325486 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"19383","DOI":"10.1109\/ACCESS.2017.2746258","volume":"5","author":"W Yuan","year":"2017","unstructured":"Yuan, W., et al.: Edge-dual graph preserving sign prediction for signed social networks. IEEE Access 5, 19383\u201319392 (2017)","journal-title":"IEEE Access"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Qian, J., et al.: Social network de-anonymization and privacy inference with knowledge graph model. IEEE Trans. Dependable Secure Comput. 16(4), 679\u2013692 (2017)","DOI":"10.1109\/TDSC.2017.2697854"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Shao, Y., et al.: Fast de-anonymization of social networks with structural information. In: Data Sci. Eng. 4, 76\u201392 (2019)","DOI":"10.1007\/s41019-019-0086-8"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Sala, A., et al.: Sharing graphs using differentially private graph models. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 81\u201398 (2011)","DOI":"10.1145\/2068816.2068825"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Mir, D., Wright, R.N: A differentially private estimator for the stochastic kronecker graph model. In: Proceedings of the 2012 Joint EDBT\/ICDT Workshops, pp. 167\u2013176 (2012)","DOI":"10.1145\/2320765.2320818"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Xiao, Q., Chen, R., Tan, K.-L.: Differentially private network data release via structural inference. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 911\u2013920 (2014)","DOI":"10.1145\/2623330.2623642"},{"key":"8_CR27","unstructured":"Nobari, S., et al.: L-opacity: linkage-aware graph anonymization (2014)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., Imine, A., Rusinowitch, M.: Detecting communities under differential privacy. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 83\u201393 (2016)","DOI":"10.1145\/2994620.2994624"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"4905","DOI":"10.1109\/TKDE.2020.3047124","volume":"34","author":"Q Ye","year":"2020","unstructured":"Ye, Q., et al.: LF-GDPR: a framework for estimating graph metrics with local differential privacy. IEEE Trans. Knowl. Data Eng. 34, 4905\u20134920 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, Z.: LDPCD: a novel method for locally differentially private community detection. Comput. Intell. Neurosci. 2022 (2022)","DOI":"10.1155\/2022\/4080047"},{"key":"8_CR31","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-030-89814-4_33","volume-title":"Mobile Multimedia Communications","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Zheng, Z., Liu, X., Guo, W.: Privacy-preserving computation tookit on floating-point numbers. In: Xiong, J., Wu, S., Peng, C., Tian, Y. (eds.) MobiMedia 2021. LNICST, vol. 394, pp. 462\u2013476. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89814-4_33"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Bost, R., et al.: Machine learning classification over encrypted data. In: NDSS, Vol. 4324, p. 4325 (2015)","DOI":"10.14722\/ndss.2015.23241"},{"issue":"4","key":"8_CR33","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s10994-021-05970-3","volume":"110","author":"SA Grivet","year":"2021","unstructured":"Grivet, S.A., et al.: SPEED: secure, PrivatE, and efficient deep learning. Mach. Learn. 110(4), 675\u2013694 (2021)","journal-title":"Mach. Learn."},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E 69(2), 26113 (2004)","DOI":"10.1103\/PhysRevE.69.026113"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20099-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T15:17:58Z","timestamp":1673536678000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20099-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031200984","9783031200991"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20099-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}