{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T20:31:40Z","timestamp":1722457900601},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T00:00:00Z","timestamp":1561507200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T00:00:00Z","timestamp":1561507200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00779-019-01249-6","type":"journal-article","created":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T18:12:20Z","timestamp":1561572740000},"page":"511-519","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Dynamic social privacy protection based on graph mode partition in complex social network"],"prefix":"10.1007","volume":"23","author":[{"given":"Gu","family":"Qiuyang","sequence":"first","affiliation":[]},{"given":"Ni","family":"Qilian","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Xiangzhao","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhijiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,26]]},"reference":[{"key":"1249_CR1","doi-asserted-by":"crossref","unstructured":"Yin C, Xi J, Sun R et al (2017) Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things. IEEE Trans Ind Informatics:1","DOI":"10.1109\/TII.2017.2773646"},{"issue":"4","key":"1249_CR2","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1049\/iet-gtd.2016.0995","volume":"11","author":"F Kong","year":"2017","unstructured":"Kong F, Hao Z, Zhang B (2017) Improved differential current protection scheme for CSC-HVDC transmission lines. IET Gener Transm Distrib 11(4):978\u2013986","journal-title":"IET Gener Transm Distrib"},{"issue":"3","key":"1249_CR3","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1214\/17-STS641","volume":"33","author":"Y Rinott","year":"2018","unstructured":"Rinott Y, O\u2019Keefe CM, Shlomo N, Skinner C (2018) Confidentiality and differential privacy in the dissemination of frequency tables. Stat Sci 33(3):358\u2013385","journal-title":"Stat Sci"},{"key":"1249_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty B, Verma S, Singh KP (2018) Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Comput Secur :S016740481830227X","DOI":"10.1016\/j.cose.2018.03.002"},{"issue":"2","key":"1249_CR5","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/s18020410","volume":"18","author":"W Jun","year":"2018","unstructured":"Jun W, Rongbo Z, Shubo L et al (2018) Node location privacy protection based on differentially private grids in industrial wireless sensor networks. Sensors 18(2):410","journal-title":"Sensors"},{"issue":"4","key":"1249_CR6","first-page":"934","volume":"16","author":"G Ghinita","year":"2017","unstructured":"To H, Ghinita G, Fan L et al (2017) Differentially private location protection for worker datasets in spatial crowdsourcing. IEEE Trans Mob Comput 16(4):934\u2013949","journal-title":"IEEE Trans Mob Comput"},{"key":"1249_CR7","doi-asserted-by":"publisher","first-page":"e2594","DOI":"10.1002\/etep.2594","volume":"28","author":"SP George","year":"2018","unstructured":"George SP, Ashok S (2018) Adaptive differential protection for transformers in grid-connected wind farms. Int Trans Electr Energy Syst 28:e2594","journal-title":"Int Trans Electr Energy Syst"},{"key":"1249_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.ijepes.2017.07.006","volume":"94","author":"J Zheng","year":"2018","unstructured":"Zheng J, Wen M, Chen Y, Shao X (2018) A novel differential protection scheme for HVDC transmission lines. Int J Electr Power Energy Syst 94:171\u2013178","journal-title":"Int J Electr Power Energy Syst"},{"issue":"15","key":"1249_CR9","doi-asserted-by":"publisher","first-page":"3853","DOI":"10.1049\/iet-gtd.2017.0141","volume":"11","author":"Y Zequ","year":"2017","unstructured":"Zequ Y, Peng C, Jiming C (2017) Differential-privacy preserving optimal power flow in smart grid. IET Gener Transm Distrib 11(15):3853\u20133861","journal-title":"IET Gener Transm Distrib"},{"key":"1249_CR10","doi-asserted-by":"crossref","unstructured":"Wang S, Huang L, Nie Y et al (2019) Local differential private data aggregation for discrete distribution estimation. IEEE Trans Parallel Distrib Syst (99):1\u20131","DOI":"10.1109\/TPDS.2019.2899097"},{"key":"1249_CR11","doi-asserted-by":"crossref","unstructured":"Dong X, Gong Y, Ma J et al (2018) Protecting operation-time privacy of primary users in downlink cognitive two-tier networks. IEEE Trans Veh Technol (99):1\u20131","DOI":"10.1109\/TVT.2018.2808347"},{"key":"1249_CR12","doi-asserted-by":"crossref","unstructured":"Proserpio D, Goldberg S, Mcsherry F (2014) Calibrating data to sensitivity in private data analysis: a platform for differentially private analysis of weighted datasets. Proceedings of the VLDB Endowment 7(8):637\u2013648","DOI":"10.14778\/2732296.2732300"},{"key":"1249_CR13","doi-asserted-by":"crossref","unstructured":"Hay M, Rastogi V, Miklau G, Suciu D (2010) Boosting the accuracy of differentially private histograms through consistency. Proceedings of the VLDB Endowment 3(1\u20132):1021\u20131032","DOI":"10.14778\/1920841.1920970"},{"key":"1249_CR14","doi-asserted-by":"publisher","unstructured":"Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11\u201313, 2007. 75\u201384. https:\/\/doi.org\/10.1145\/1250790.1250803","DOI":"10.1145\/1250790.1250803"},{"issue":"3","key":"1249_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2611523","volume":"39","author":"V Karwa","year":"2014","unstructured":"Karwa V, Raskhodnikova S, Smith A, Yaroslavtsev G (2014) Private analysis of graph structure. ACM Trans Database Syst 39(3):1\u201333","journal-title":"ACM Trans Database Syst"},{"issue":"4","key":"1249_CR16","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1007\/s13278-013-0127-7","volume":"3","author":"Y Wang","year":"2013","unstructured":"Wang Y, Wu X, Zhu J, Xiang Y (2013) On learning cluster coefficient of private networks. Soc Netw Anal Min 3(4):925\u2013938","journal-title":"Soc Netw Anal Min"},{"issue":"4","key":"1249_CR17","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s00778-013-0344-8","volume":"23","author":"R Chen","year":"2014","unstructured":"Chen R, Fung BCM, Yu PS, Desai BC (2014) Correlated network data publication via differential privacy. VLDB J 23(4):653\u2013676","journal-title":"VLDB J"},{"key":"1249_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10916-018-1116-1","volume":"43","author":"K-j Xia","year":"2019","unstructured":"Xia K-j, Yin H-s, Zhang Y-d (2019) Deep semantic segmentation of kidney and space-occupying lesion area based on SCNN and ResNet models combined with SIFT-flow algorithm. J Med Syst 43:2","journal-title":"J Med Syst"},{"key":"1249_CR19","first-page":"298","volume":"87","author":"H Gao","year":"2018","unstructured":"Gao H, Huang W, Yang X, Duan Y, Yin Y (2018) Towards service selection for workflow reconfiguration: an Interface-based computing. Future generation. Comput Syst (FGCS) 87:298\u2013311","journal-title":"Comput Syst (FGCS)"},{"issue":"3","key":"1249_CR20","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TCSS.2018.2865217","volume":"5","author":"H Gao","year":"2018","unstructured":"Gao H, Mao S, Huang W, Yang X (2018) Applying probabilistic model checking to financial production risk evaluation and control: a case study of Alibaba\u2019s Yu\u2019e Bao. IEEE Trans Comput Soc Syst 5(3):785\u2013795","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"1","key":"1249_CR21","doi-asserted-by":"publisher","first-page":"11700","DOI":"10.1109\/ACCESS.2017.2715322","volume":"5","author":"H Gao","year":"2017","unstructured":"Gao H, Duan Y, Miao H, Yin Y (2017) An approach to data consistency checking for the dynamic replacement of service process. IEEE Access 5(1):11700\u201311711","journal-title":"IEEE Access"},{"issue":"6","key":"1249_CR22","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1142\/S0218194017500334","volume":"27","author":"H Gao","year":"2017","unstructured":"Gao H, Chu D, Duan Y (2017) The Probabilistic model checking based service selection method for business process modeling. J Softw Eng Knowl Eng 27(6):897\u2013923","journal-title":"J Softw Eng Knowl Eng"},{"key":"1249_CR23","first-page":"1","volume":"3","author":"KJ Xia","year":"2018","unstructured":"Xia KJ, Yin HS, Wang JQ (2018) A novel improved deep convolutional neural network model for medical image fusion. Clust Comput 3:1\u201313","journal-title":"Clust Comput"},{"key":"1249_CR24","unstructured":"Sala A, Zhao X, Wilson C, et al (2011) [ACM Press the 2011 ACM SIGCOMM conference - Berlin, Germany (2011.11.02-2011.11.04)] Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC \\\u201d11 - Sharing graphs using differentially private graph models,81"},{"issue":"9","key":"1249_CR25","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s12243-016-0498-7","volume":"71","author":"C Lin","year":"2016","unstructured":"Lin C, Wang P, Song H, Zhou Y, Liu Q, Wu G (2016) A differential privacy protection scheme for sensitive big data in body sensor networks. Ann Telecommun 71(9):465\u2013475","journal-title":"Ann Telecommun"},{"key":"1249_CR26","doi-asserted-by":"crossref","unstructured":"Ou L, Qin Z, Liu Y, et al (2016) Multi-user location correlation protection with differential privacy. 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS). IEEE","DOI":"10.1109\/ICPADS.2016.0064"},{"key":"1249_CR27","doi-asserted-by":"crossref","unstructured":"Song C, Ge T (2014) Aroma: a new data protection method with differential privacy and accurate query answering. ACM","DOI":"10.1145\/2661829.2661886"},{"key":"1249_CR28","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.ins.2017.08.093","volume":"422","author":"P Qian","year":"2018","unstructured":"Qian P, Xi C, Min X, Jiang Y, Kuan-Hao S, Wang S, Muzic RF Jr (2018) SSC-EKE: semi-supervised classification with extensive knowledge exploitation. Inf Sci 422:51\u201376","journal-title":"Inf Sci"},{"key":"1249_CR29","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.patcog.2015.08.009","volume":"50","author":"P Qian","year":"2016","unstructured":"Qian P, Sun S, Jiang Y, Su K-H, Ni T, Wang S, Muzic RF Jr (2016) Cross-domain, soft-partition clustering with diversity measure and knowledge reference. Pattern Recogn 50:155\u2013177","journal-title":"Pattern Recogn"},{"key":"1249_CR30","doi-asserted-by":"publisher","first-page":"28594","DOI":"10.1109\/ACCESS.2018.2825352","volume":"6","author":"P Qian","year":"2018","unstructured":"Qian P, Zhou J, Jiang Y, Liang F, Zhao K, Wang S, Su K-H, Muzic RF Jr (2018) Multi-view maximum entropy clustering by jointly leveraging inter-view collaborations and intra-view-weighted attributes. IEEE Access 6:28594\u201328610","journal-title":"IEEE Access"},{"key":"1249_CR31","unstructured":"Hong W, Lina GE, Suqing W et al (2018) Improvement of differential privacy protection algorithm based on OPTICS clustering. J Comput Appl"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01249-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01249-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01249-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T00:53:10Z","timestamp":1663807990000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01249-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,26]]},"references-count":31,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1249"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01249-6","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,26]]},"assertion":[{"value":"21 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}