{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:49:29Z","timestamp":1725814169719},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319147161"},{"type":"electronic","value":"9783319147178"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14717-8_21","type":"book-chapter","created":{"date-parts":[[2014,12,17]],"date-time":"2014-12-17T14:17:28Z","timestamp":1418825848000},"page":"267-278","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid Algorithm for Privacy Preserving Social Network Publication"],"prefix":"10.1007","author":[{"given":"Peng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xianxian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Company, T.N.: State of the media: The social media report 2012, pp. 1\u201312 (2012)","DOI":"10.1016\/S0969-4765(12)70134-0"},{"issue":"1","key":"21_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"N.B. Ellison","year":"2007","unstructured":"Ellison, N.B., et al.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication\u00a013(1), 210\u2013230 (2007)","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"12","key":"21_CR3","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1109\/TKDE.2005.188","volume":"17","author":"S. Zhang","year":"2005","unstructured":"Zhang, S., Qin, Z., Ling, C.X., Sheng, S.: \u201cMissing is usefu\u201d: Missing values in cost-sensitive decision trees. IEEE Trans. Knowl. Data Eng.\u00a017(12), 1689\u20131693 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"21_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-46027-6","volume-title":"Association Rule Mining","author":"C. Zhang","year":"2002","unstructured":"Zhang, C., Zhang, S.: Association Rule Mining. LNCS (LNAI), vol.\u00a02307. Springer, Heidelberg (2002)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, pp. 181\u2013190. ACM (2007)","DOI":"10.1145\/1242572.1242598"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013106. ACM (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 506\u2013515. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: k-symmetry model for identity anonymization in social networks. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 111\u2013122. ACM (2010)","DOI":"10.1145\/1739041.1739058"},{"key":"21_CR9","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology (JOPT) (2005)"},{"issue":"1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B. Zhou","year":"2011","unstructured":"Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems\u00a028(1), 47\u201377 (2011)","journal-title":"Knowledge and Information Systems"},{"issue":"1","key":"21_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A. Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD)\u00a01(1), 3 (2007)","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"issue":"2","key":"21_CR12","doi-asserted-by":"publisher","first-page":"141","DOI":"10.14778\/1921071.1921080","volume":"4","author":"M. Yuan","year":"2010","unstructured":"Yuan, M., Chen, L., Yu, P.S.: Personalized privacy protection in social networks. Proceedings of the VLDB Endowment\u00a04(2), 141\u2013150 (2010)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"21_CR13","unstructured":"Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing social networks. Computer Science Department Faculty Publication Series, 180 (2007)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Ying, X., Pan, K., Wu, X., Guo, L.: Comparisons of randomization and k-degree anonymization schemes for privacy preserving social network publishing. In: Proceedings of the 3rd Workshop on Social Network Mining and Analysis, p. 10. ACM (2009)","DOI":"10.1145\/1731011.1731021"},{"issue":"3","key":"21_CR15","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s10115-010-0353-5","volume":"28","author":"X. Ying","year":"2011","unstructured":"Ying, X., Wu, X.: On link privacy in randomizing social networks. Knowledge and Information Systems\u00a028(3), 645\u2013663 (2011)","journal-title":"Knowledge and Information Systems"},{"issue":"05","key":"21_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(05), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"1","key":"21_CR17","doi-asserted-by":"publisher","first-page":"946","DOI":"10.14778\/1687627.1687734","volume":"2","author":"L. Zou","year":"2009","unstructured":"Zou, L., Chen, L., \u00d6zsu, M.T.: K-automorphism: A general framework for privacy preserving network publication. Proceedings of the VLDB Endowment\u00a02(1), 946\u2013957 (2009)","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"6684","key":"21_CR18","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D.J. Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world networks. Nature\u00a0393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"key":"21_CR19","unstructured":"McAuley, J.J., Leskovec, J.: Learning to discover social circles in ego networks. In: NIPS, vol.\u00a0272, pp. 548\u2013556 (2012)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 807\u2013816. ACM (2009)","DOI":"10.1145\/1557019.1557108"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14717-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:30:26Z","timestamp":1559093426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14717-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319147161","9783319147178"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14717-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}