{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T05:36:25Z","timestamp":1744781785691,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642201486"},{"type":"electronic","value":"9783642201493"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20149-3_11","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T22:41:56Z","timestamp":1302302516000},"page":"123-137","source":"Crossref","is-referenced-by-count":10,"title":["Node Protection in Weighted Social Networks"],"prefix":"10.1007","author":[{"given":"Mingxuan","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving Anonymity via Clustering. In: PODS 2006, pp. 153\u2013162 (2006)","DOI":"10.1145\/1142351.1142374"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: WWW 2007, pp. 181\u2013190 (2007)","DOI":"10.1145\/1242572.1242598"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"766","DOI":"10.14778\/1687627.1687714","volume":"2","author":"S. Bhagat","year":"2009","unstructured":"Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endow.\u00a02(1), 766\u2013777 (2009)","journal-title":"Proc. VLDB Endow."},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Privacy, Security, and Trust in KDD","author":"A. Campan","year":"2008","unstructured":"Campan, A., Truta, T.M.: A clustering approach for data and structural anonymity in social networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PinKDD 2008. LNCS, vol.\u00a05456. Springer, Heidelberg (2008)"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"833","DOI":"10.14778\/1453856.1453947","volume":"1","author":"G. Cormode","year":"2008","unstructured":"Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. Proc. VLDB Endow.\u00a01(1), 833\u2013844 (2008)","journal-title":"Proc. VLDB Endow."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, J., Fu, A., Liu, J.: K-Isomorphism: Privacy Preserving Network Publication against Structural Attacks. In: SIGMOD 2010, pp. 459\u2013470 (2010)","DOI":"10.1145\/1807167.1807218"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Das, S., Egecioglu, O., Abbadi, A.: Privacy Preserving in Weighted Social Network. In: ICDE 2010, pp. 904\u2013907 (2010)","DOI":"10.1109\/ICDE.2010.5447915"},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M. Hay","year":"2008","unstructured":"Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow.\u00a01(1), 102\u2013114 (2008)","journal-title":"Proc. VLDB Endow."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: SIGMOD 2008, pp. 93\u2013106 (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"11_CR10","unstructured":"Liu, L., Wang, J., Liu, J., Zhang, J.: Privacy preserving in social networks against sensitive edge disclosure. Technical Report CMIDA-HiPSCCS 006-08 (2008)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE 2007, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Shrivastava, N., Majumder, A., Rastogi, R.: Mining (social) network graphs to detect random link attacks. In: ICDE 2008, pp. 486\u2013495 (2008)","DOI":"10.1109\/ICDE.2008.4497457"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","first-page":"739","volume-title":"Secure Data Management","author":"X. Ying","year":"2008","unstructured":"Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2008. LNCS, vol.\u00a05159, pp. 739\u2013750. Springer, Heidelberg (2008)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: ICDE 2008, pp. 506\u2013515 (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-78478-4_9","volume-title":"Privacy, Security, and Trust in KDD","author":"E. Zheleva","year":"2008","unstructured":"Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Malin, B., Sayg\u0131n, Y. (eds.) PInKDD 2007. LNCS, vol.\u00a04890, pp. 153\u2013171. Springer, Heidelberg (2008)"},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"946","DOI":"10.14778\/1687627.1687734","volume":"2","author":"L. Zou","year":"2009","unstructured":"Zou, L., Chen, L., \u00d6zsu, M.T.: k-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endow.\u00a02(1), 946\u2013957 (2009)","journal-title":"Proc. VLDB Endow."}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20149-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T23:57:09Z","timestamp":1741132629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20149-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642201486","9783642201493"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20149-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}