{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:15:00Z","timestamp":1743016500203,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319159423"},{"type":"electronic","value":"9783319159430"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15943-0_12","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T10:27:17Z","timestamp":1426501637000},"page":"193-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Clustering Approach for Privacy-Preserving in Social Networks"],"prefix":"10.1007","author":[{"given":"Rong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yanyan","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ye, M., Yin, P., Lee, W.C., Lee, D.L.: Exploiting geographical influence for collaborative point-of-interest recommendation. In: 34th international ACM SIGIR Conference on Research and development in Information Retrieval, pp. 325\u2013334. ACM, New York (2011)","DOI":"10.1145\/2009916.2009962"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"17486","DOI":"10.1073\/pnas.1005962107","volume":"107","author":"S Goel","year":"2010","unstructured":"Goel, S., Hofman, J.M., Lahaie, S., et al.: Predicting consumer behavior with web search. Proc. Natl. Acad. Sci. 107, 17486\u201317490 (2010)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Paul, M.J., Dredze, M.: You are what you tweet: analyzing twitter for public health. In: 5th International AAAI Conference on Weblogs and Social Media, ICWSM, pp. 265\u2013272 (2011)","DOI":"10.1609\/icwsm.v5i1.14137"},{"key":"12_CR4","unstructured":"AAramaki, E., Maskawa, S., Morita, M.: Twitter catches the flu: detecting influenza epidemics using twitter. In: The Conference on Empirical Methods in Natural Language Processing, pp. 1568\u20131576. Association for Computational Linguistics, Stroudsburg (2011)"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., et al.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discovey Data (TKDD) 1, 3 (2007)","journal-title":"ACM Trans. Knowl. Discovey Data (TKDD)"},{"key":"12_CR7","unstructured":"Ford, R., Truta, T.M., Campan, A.: P-Sensitive K-anonymity for social networks. In: 5th International Conference on Data Mining, pp. 403\u2013409. DMIN, Las Vegas (2009)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1016\/j.comcom.2010.03.020","volume":"34","author":"X Sun","year":"2011","unstructured":"Sun, X., Sun, L., Wang, H.: Extended k-anonymity models against sensitive attribute disclosure. Comput. Commun. 34, 526\u2013535 (2011)","journal-title":"Comput. Commun."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graph. In: ACM SIGMOD international conference on Management of data, pp. 93\u2013106. ACM, New York (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: 24th IEEE International Conference on Data Engineering, pp. 506\u2013515. IEEE Press, New York (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"12_CR11","unstructured":"Campan, A., Truta, T.M.: A clustering approach for data and structural anonymity in social networks. In: 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD, pp. 93\u2013104. ACM, Las Vegas (2008)"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/TKDE.2011.259","volume":"25","author":"M Yuan","year":"2013","unstructured":"Yuan, M., Chen, L., Yu, P.S., et al.: Protecting sensitive labels in social network data anonymization. IEEE Trans. Knowl. Data Eng. 25, 633\u2013647 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15943-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T22:47:11Z","timestamp":1676933231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15943-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319159423","9783319159430"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15943-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}