{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:35:24Z","timestamp":1725672924584},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642290374"},{"type":"electronic","value":"9783642290381"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29038-1_27","type":"book-chapter","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T07:57:38Z","timestamp":1333612658000},"page":"367-381","source":"Crossref","is-referenced-by-count":1,"title":["Semi-Edge Anonymity: Graph Publication when the Protection Algorithm Is Available"],"prefix":"10.1007","author":[{"given":"Mingxuan","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Backstrom, L., et al.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: WWW (2007)","DOI":"10.1145\/1242572.1242598"},{"key":"27_CR2","unstructured":"Cormode, G., et al.: Class-based graph anonymization for social network data. In: VLDB (2009)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Bhagat, S., et al.: Prediction promotes privacy in dynamic social networks. In: WOSN (2010)","DOI":"10.1145\/1772690.1772803"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Campan, A., et al.: A clustering approach for data and structural anonymity in social networks. In: PinKDD (2008)","DOI":"10.1007\/978-3-642-01718-6_4"},{"key":"27_CR5","unstructured":"Campan, A., et al.: P-sensitive k-anonymity with generalization constraints. In: TDP (2010)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, J., et al.: K-Isomorphism: Privacy Preserving Network Publication against Structural Attacks. In: SIGMOD 2010 (2010)","DOI":"10.1145\/1807167.1807218"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Cormode, G., et al.: Anonymizing bipartite graph data using safe groupings. In: PVLDB (2008)","DOI":"10.14778\/1453856.1453947"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Cormode, G., et al.: Anonymizing bipartite graph data using safe groupings. In: PVLDB (2008)","DOI":"10.14778\/1453856.1453947"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Hay, M., et al.: Resisting structural re-identification in anonymized social networks. In: PVLDB (2008)","DOI":"10.14778\/1453856.1453873"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Hay, M., et al.: Resisting structural re-identification in anonymized social networks. In: VLDBJ (2010)","DOI":"10.1007\/s00778-010-0210-x"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., et al.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Liu, K., et al.: Towards identity anonymization on graphs. In: SIGMOD (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., et al.: L-diversity: Privacy beyond k-anonymity. In: TKDD (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Sweeney, L., et al.: k-anonymity: a model for protecting privacy. In: FKBS (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"27_CR15","unstructured":"Wong, R., et al.: Minimality attack in privacy preserving data publishing. In: VLDB (2007)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Xiao, X., et al.: Anatomy: Simple and effective privacy preservation. In: VLDB (2006)","DOI":"10.1145\/1142473.1142500"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Ying, X., et al.: Randomizing social networks: a spectrum preserving approach. In: SDM (2008)","DOI":"10.1137\/1.9781611972788.67"},{"key":"27_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-78478-4_9","volume-title":"Privacy, Security, and Trust in KDD","author":"E. Zheleva","year":"2008","unstructured":"Zheleva, E., Getoor, L.: Preserving the Privacy of Sensitive Relationships in Graph Data. In: Bonchi, F., Malin, B., Sayg\u0131n, Y. (eds.) PInKDD 2007. LNCS, vol.\u00a04890, pp. 153\u2013171. Springer, Heidelberg (2008)"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, B., et al.: Preserving privacy in social networks against neighborhood attacks. In: ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Zhou, B., et al.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. In: KAIS (2010)","DOI":"10.1007\/s10115-010-0311-2"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Zou, L., et al.: K-Automorphism: A General Framework For Privacy Preserving Network Publication. In: VLDB (2009)","DOI":"10.14778\/1687627.1687734"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29038-1_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T19:46:58Z","timestamp":1687376818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29038-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290374","9783642290381"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29038-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}