{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:09:29Z","timestamp":1767856169886,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642312342","type":"print"},{"value":"9783642312359","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31235-9_37","type":"book-chapter","created":{"date-parts":[[2012,6,14]],"date-time":"2012-06-14T12:12:45Z","timestamp":1339675965000},"page":"562-571","source":"Crossref","is-referenced-by-count":19,"title":["Sensitive Label Privacy Protection on Social Network Data"],"prefix":"10.1007","author":[{"given":"Yi","family":"Song","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Karras","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Bressan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Adamic, L.A., Glance, N.: The political blogosphere and the 2004 U.S. election: divided they blog. In: LinkKDD (2005)","DOI":"10.1145\/1134271.1134277"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.M.: Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography. Commun. ACM\u00a054(12) (2011)","DOI":"10.1145\/2043174.2043199"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. PVLDB\u00a02(1) (2009)","DOI":"10.14778\/1687627.1687714"},{"key":"37_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-01718-6_4","volume-title":"Privacy, Security, and Trust in KDD","author":"A. Campan","year":"2009","unstructured":"Campan, A., Truta, T.M.: Data and Structural k-Anonymity in Social Networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PinKDD 2008. LNCS, vol.\u00a05456, pp. 33\u201354. Springer, Heidelberg (2009)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, J., Fu, A.W.-C., Liu, J.: K-isomorphism: privacy-preserving network publication against structural attacks. In: SIGMOD (2010)","DOI":"10.1145\/1807167.1807218"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. PVLDB\u00a019(1) (2010)","DOI":"10.1007\/s00778-009-0167-9"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Das, S., Egecioglu, \u00d6., Abbadi, A.E.: Anonymizing weighted social network graphs. In: ICDE (2010)","DOI":"10.1109\/ICDE.2010.5447915"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Francesco Bonchi, A.G., Tassa, T.: Identity obfuscation in graphs through the information theoretic lens. In: ICDE (2011)","DOI":"10.1109\/ICDE.2011.5767905"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. PVLDB\u00a01(1) (2008)","DOI":"10.14778\/1453856.1453873"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Li, Y., Shen, H.: Anonymizing graphs against weight-based attacks. In: ICDM Workshops (2010)","DOI":"10.1109\/ICDMW.2010.112"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: SIGMOD (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, J., Liu, J., Zhang, J.: Privacy preserving in social networks against sensitive edge disclosure. In: SIAM International Conference on Data Mining (2009)","DOI":"10.1137\/1.9781611972795.82"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: \u2113-diversity: privacy beyond k-anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"37_CR14","unstructured":"MPI, \n                    \n                      http:\/\/socialnetworks.mpi-sws.org\/"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Song, Y., Karras, P., Xiao, Q., Bressan, S.: Sensitive label privacy protection on social network data. Technical report TRD3\/12 (2012)","DOI":"10.1007\/978-3-642-31235-9_37"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Song, Y., Nobari, S., Lu, X., Karras, P., Bressan, S.: On the privacy and utility of anonymized social networks. In: iiWAS, pp. 246\u2013253 (2011)","DOI":"10.1145\/2095536.2095578"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5) (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Tai, C.-H., Yu, P.S., Yang, D.-N., Chen, M.-S.: Privacy-preserving social network publication against friendship attacks. In: SIGKDD (2011)","DOI":"10.1145\/2020408.2020599"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Tore, O., Filip, A., John, S.: Node centrality in weighted networks: generalizing degree and shortest paths. Social Networks\u00a032(3) (2010)","DOI":"10.1016\/j.socnet.2010.03.006"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Wu, W., Xiao, Y., Wang, W., He, Z., Wang, Z.: K-symmetry model for identity anonymization in social networks. In: EDBT (2010)","DOI":"10.1145\/1739041.1739058"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Ying, X., Wu, X.: Randomizing social networks: a spectrum perserving approach. In: SDM (2008)","DOI":"10.1137\/1.9781611972788.67"},{"key":"37_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-01307-2_6","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"X. Ying","year":"2009","unstructured":"Ying, X., Wu, X.: On Link Privacy in Randomizing Social Networks. In: Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) PAKDD 2009. LNCS, vol.\u00a05476, pp. 28\u201339. Springer, Heidelberg (2009)"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Yuan, M., Chen, L., Yu, P.S.: Personalized privacy protection in social networks. PVLDB\u00a04(2) (2010)","DOI":"10.14778\/1921071.1921080"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhang, W.: Edge anonymity in social network graphs. In: CSE (2009)","DOI":"10.1109\/CSE.2009.310"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: The k-anonymity and \u2113-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems\u00a028(1) (2010)","DOI":"10.1007\/s10115-010-0311-2"},{"key":"37_CR27","doi-asserted-by":"crossref","unstructured":"Zou, L., Chen, L., \u00d6zsu, M.T.: K-automorphism: a general framework for privacy-preserving network publication. PVLDB\u00a02(1) (2009)","DOI":"10.14778\/1687627.1687734"}],"container-title":["Lecture Notes in Computer Science","Scientific and Statistical Database Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31235-9_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:52:54Z","timestamp":1620129174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31235-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312342","9783642312359"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31235-9_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}