{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:55:58Z","timestamp":1743105358024,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_49","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"726-737","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks"],"prefix":"10.1007","author":[{"given":"Hongyan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Li","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Limei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiaoding","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Campan, A., Truta, T.: A clustering approach for data and structural anonymity in social networks. In: Proceedings the 2nd ACM SIGKDD Int. Workshop Privacy Security Trust in KDD. pp. 33\u201354 (2008)","DOI":"10.1007\/978-3-642-01718-6_4"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Chen, D., L, L., Shang, M., Cheng, Y.: Identifying influential nodes in complex networks. Physica A Statistical Mechanics and Its Applications 39(4) (2012)","DOI":"10.1016\/j.physa.2011.09.017"},{"issue":"6","key":"49_CR3","doi-asserted-by":"publisher","first-page":"3756","DOI":"10.1109\/TNET.2016.2553843","volume":"24","author":"CF Chiasserini","year":"2016","unstructured":"Chiasserini, C.F., Garetto, M., Leonardi, E.: Social network de-anonymization under scale-free user relations. IEEE\/ACM transactions on networking 24(6), 3756\u20133769 (2016)","journal-title":"IEEE\/ACM transactions on networking"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Day, W., Li, N., Min, L.: Publishing graph degree distribution with node differential privacy. In: the 2016 International Conference. pp. 123\u2013138. USA (2016)","DOI":"10.1145\/2882903.2926745"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A., Iii, H.J.H.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. pp. 71\u201380. ACM, USA (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Jung, T., Li., X.Y., Huang, W.C., Qian, J.W., Cheng, S.: Accounttrade: Accountable protocols for big data trading against dishonest consumers. In: IEEE INFOCOM (2017)","DOI":"10.1109\/INFOCOM.2017.8057004"},{"key":"49_CR7","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.eswa.2019.01.059","volume":"125","author":"M Kiabod","year":"2019","unstructured":"Kiabod, M., Dehkordi, M.N., Barekatain, B.: Tsram: A time-saving k-degree anonymization method in social network. Expert Systems with Application 125, 378\u2013396 (2019)","journal-title":"Expert Systems with Application"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Langari, R.K., Sardar, S., Mousavi, S.A., Radfar, R.: Combined fuzzy clustering and fifireflfly algorithm for privacy preserving in social networks. Expert Systems with Application 141, 1\u201315 (2020)","DOI":"10.1016\/j.eswa.2019.112968"},{"key":"49_CR9","unstructured":"Leskovec, J.: Stanford large network dataset collection. http:\/\/snap.stanford.edu\/data\/"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: in Proc. ACM SIGMOD Int. Conf. Manage. Data. pp. 93\u2013106 (2008)","DOI":"10.1145\/1376616.1376629"},{"issue":"5","key":"49_CR11","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/TPDS.2016.2615020","volume":"28","author":"Q Liu","year":"2017","unstructured":"Liu, Q., Wang, G., Li, F., Yang, S., Wu, J.: Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Transactions on Parallel and Distributed Systems 28(5), 1417\u20131429 (2017)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy. pp. 173\u2013187 (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"49_CR13","first-page":"1","volume":"99","author":"J Qian","year":"2017","unstructured":"Qian, J., Li, X., Zhang, C., Chen, L., Jung, T., Han, J.: Social network de-anonymization and privact inference with knowledge graph model. IEEE Transactions on dependable and secure computing 99, 1\u201314 (2017)","journal-title":"IEEE Transactions on dependable and secure computing"},{"issue":"3","key":"49_CR14","first-page":"22","volume":"47","author":"C Shah","year":"2014","unstructured":"Shah, C., Capra, R., Hansen, P.: Collaborative information seeking: Guest editors\u2019 introduction. IEEE transactions on computer 47(3), 22\u201325 (2014)","journal-title":"IEEE transactions on computer"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Sharad, K., Danezis, G.: An automated social graph de-anonymization technique. Computer Science pp. 47\u201358 (2014)","DOI":"10.1145\/2665943.2665960"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Ying, X., Wu, X.: Randomizing social networks:a spectrum preserving approach. In: In Proceedings of the 2008 SIAM International Conference on Data Mining. p. 739-750. No. 12, SIAM (2008)","DOI":"10.1137\/1.9781611972788.67"},{"issue":"3","key":"49_CR17","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/TKDE.2011.259","volume":"25","author":"M Yuan","year":"2013","unstructured":"Yuan, M., Chen, L., Yu, P.S., Yu, T.: Protecting sensitive lables in social network data anonymization. IEEE Transactions on Knowledge and data engineering 25(3), 633\u2013647 (2013)","journal-title":"IEEE Transactions on Knowledge and data engineering"},{"key":"49_CR18","unstructured":"Zheng, X., Luo, G., Cai, Z.: A fair mechanism for private data publication in online social networks. IEEE Transactions on Network Science and Engineering pp. 1\u201311 (2018)"},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Privacy preservation in social networks against neighborhood attacks. In: ICDE. pp. 506\u2013515. IEEE, USA (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Zou, L., Chen, L., Ozsu, M.: K-automorphism: A general framework for privacy preserving network publication. In: in Proceedings of the VLDB Endowment. vol. 2, pp. 946\u2013957 (2009)","DOI":"10.14778\/1687627.1687734"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:43:23Z","timestamp":1619318603000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_49","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}