{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:34:03Z","timestamp":1743089643400,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318745"},{"type":"electronic","value":"9783319318752"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31875-2_12","type":"book-chapter","created":{"date-parts":[[2016,3,23]],"date-time":"2016-03-23T05:05:02Z","timestamp":1458709502000},"page":"134-145","source":"Crossref","is-referenced-by-count":4,"title":["Publishing Graph Data with Subgraph Differential Privacy"],"prefix":"10.1007","author":[{"given":"Binh P.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Hoa","family":"Ngo","sequence":"additional","affiliation":[]},{"given":"Jihun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"12_CR4","unstructured":"Ahmed, F., Jin, R., Liu, A.X.: A random matrix approach to differential privacy and structure preserved social network graph publishing. ArXiv preprint (2013). \n                      arXiv:1307.0475"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Sala, A., Zhao, X., Wilson, C., Zheng, H., Zhao, B.Y.: Sharing graphs using differentially private graph models. In: IMC, pp. 81\u201398 (2011)","DOI":"10.1145\/2068816.2068825"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: S&P, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Kapadia, A., Ahn, Y.Y.: Community-enhanced De-anonymization of online social networks. In: CCS (2014)","DOI":"10.1145\/2660267.2660324"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, J., Fu, A.W.C., Fu, J.: K-Isomorphism: privacy preserving network publication against structural attacks. In: SIGMOD (2010)","DOI":"10.1145\/1807167.1807218"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Jamali, M., Ester, M.: TrustWalker: a random walk model for combining trust-based and item-based recommendation. In: KDD, pp. 397\u2013406, Paris, France (2009)","DOI":"10.1145\/1557019.1557067"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., Panconesi, A.: The evolution of sybil defense via social networks. In: S&P (2013)","DOI":"10.1109\/SP.2013.33"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-45294-X_3","volume-title":"FST TCS 2001: Foundations of Software Technology and Theoretical Computer Science","author":"D Harel","year":"2001","unstructured":"Harel, D., Koren, Y.: On clustering using random walks. In: Hariharan, R., Mukund, M., Vinay, V. (eds.) FSTTCS 2001. LNCS, vol. 2245, pp. 18\u201341. Springer, Heidelberg (2001)"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-36594-2_26","volume-title":"Theory of Cryptography","author":"SP Kasiviswanathan","year":"2013","unstructured":"Kasiviswanathan, S.P., Nissim, K., Raskhodnikova, S., Smith, A.: Analyzing graphs with node differential privacy. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 457\u2013476. Springer, Heidelberg (2013)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: SIGMOD, pp. 19\u201330 (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Le Ny, J., Pappas, G.J.: Differentially private filtering. In: CDC, pp. 3398\u20133403 (2012)","DOI":"10.1109\/CDC.2012.6426355"},{"key":"12_CR15","volume-title":"Elements of Information Theory","author":"TM Cover","year":"2006","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley-interscience, Hoboken (2006)"},{"issue":"1\u20132","key":"12_CR16","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the accuracy of differentiallyprivate histograms through consistency. Proc. VLDB Endow. 3(1\u20132), 1021\u20131032 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Chen, S., Zhou, S., Bhowmick, S.S.: Integrating historical noisy answers for improving data utility under differential privacy. In: EDBT, pp. 62\u201373 (2012)","DOI":"10.1145\/2247596.2247605"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31875-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:35:28Z","timestamp":1559410528000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31875-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318745","9783319318752"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31875-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}