{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:14:24Z","timestamp":1761401664630},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T00:00:00Z","timestamp":1374624000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10115-013-0674-2","type":"journal-article","created":{"date-parts":[[2013,7,23]],"date-time":"2013-07-23T10:11:20Z","timestamp":1374574280000},"page":"697-725","source":"Crossref","is-referenced-by-count":25,"title":["High utility K-anonymization for social network publishing"],"prefix":"10.1007","volume":"41","author":[{"given":"Yazhe","family":"Wang","sequence":"first","affiliation":[]},{"given":"Long","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Baihua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ken C. K.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,24]]},"reference":[{"key":"674_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-preserving data mining: models and algorithms","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal CC, Yu PS (2008) Privacy-preserving data mining: models and algorithms. Springer, Berlin"},{"key":"674_CR2","doi-asserted-by":"crossref","unstructured":"Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x? Anonymized social networks, hidden patterns, and structural steganography. In: WWW\u201907, pp 181\u2013190","DOI":"10.1145\/1242572.1242598"},{"issue":"1","key":"674_CR3","doi-asserted-by":"crossref","first-page":"766","DOI":"10.14778\/1687627.1687714","volume":"2","author":"S Bhagat","year":"2009","unstructured":"Bhagat S, Cormode G, Krishnamurthy B, Srivastava D (2009) Class-based graph anonymization for social network data. VLDB Endow 2(1):766\u2013777","journal-title":"VLDB Endow"},{"key":"674_CR4","doi-asserted-by":"crossref","unstructured":"Cheng J, Fu AWC, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: SIGMOD\u201910, pp 459\u2013470","DOI":"10.1145\/1807167.1807218"},{"key":"674_CR5","doi-asserted-by":"crossref","unstructured":"Clauset A, Moore C, Newman MEJ (2007) Structural inference of hierarchies in networks. In: ICML\u201906, pp 1\u201313","DOI":"10.1007\/978-3-540-73133-7_1"},{"issue":"7191","key":"674_CR6","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1038\/nature06830","volume":"453","author":"A Clauset","year":"2008","unstructured":"Clauset A, Moore C, Newman MEJ (2008) Hierarchical structure and the prediction of missing links in networks. Nature 453(7191):98\u2013101","journal-title":"Nature"},{"key":"674_CR7","unstructured":"comScore (2011) It\u2019s a social world: Top 10 need-to-knows about social networking and where it\u2019s headed http:\/\/www.comscore.com\/Press_Events\/Presentations_Whitepapers\/2011\/it_is_a_social_world_top_10_need-to-knows_about_social_networking"},{"key":"674_CR8","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: TAMC\u201908, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"674_CR9","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: TCC\u201906, pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"key":"674_CR10","unstructured":"Frikken KB, Golle P (2006) Private social network analysis: how to assemble pieces of a graph privately. In: WPES\u201906, pp 89\u201398"},{"issue":"4","key":"674_CR11","first-page":"14:1","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung BCM, Wang K, Chen R, Yu PS (2010) Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv 42(4):14:1\u201314:53","journal-title":"ACM Comput Surv"},{"key":"674_CR12","doi-asserted-by":"crossref","unstructured":"Gao J, Yu JX, Jin R, Zhou J, Wang T, Yang D (2011) Neighborhood-privacy protected shortest distance computing in cloud. In: SIGMOD \u201911, pp 409\u2013420","DOI":"10.1145\/1989323.1989367"},{"key":"674_CR13","doi-asserted-by":"crossref","unstructured":"Ghinita G, Tao Y, Kalnis P (2008) On the anonymization of sparse high-dimensional data. In: ICDE \u201908, pp 715\u2013724","DOI":"10.1109\/ICDE.2008.4497480"},{"key":"674_CR14","unstructured":"Hay M, Miklau G, Jensen D (2007) Anonymizing social networks. Tech. rep, UMass Amberst"},{"issue":"1","key":"674_CR15","doi-asserted-by":"crossref","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008) Resisting structural re-identification in anonymized social networks. VLDB Endow 1(1):102\u2013114","journal-title":"VLDB Endow"},{"key":"674_CR16","doi-asserted-by":"crossref","unstructured":"Hay M, Li C, Miklau G, Jensen D (2009) Accurate estimation of the degree distribution of private networks. In: ICDM \u201909, pp 169\u2013178","DOI":"10.1109\/ICDM.2009.11"},{"key":"674_CR17","doi-asserted-by":"crossref","unstructured":"Kifer D, Gehrke J (2006) Injecting utility into anonymized datasets. In: SIGMOD\u201906, pp 217\u2013228","DOI":"10.1145\/1142473.1142499"},{"key":"674_CR18","doi-asserted-by":"crossref","unstructured":"Li T, Li N (2009) On the tradeoff between privacy and utility in data publishing. In: SIGKDD\u201909, pp 517\u2013525","DOI":"10.1145\/1557019.1557079"},{"key":"674_CR19","doi-asserted-by":"crossref","unstructured":"Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: SIGMOD\u201908, pp 93\u2013106","DOI":"10.1145\/1376616.1376629"},{"key":"674_CR20","doi-asserted-by":"crossref","unstructured":"Liu K, Das K, Grandison T, Kargupta H (2008) Privacy-preserving data analysis on graphs and social networks. In: Next generation of data mining, chap 21. Chapman & Hall\/CRC, pp 419\u2013437","DOI":"10.1201\/9781420085877.ch21"},{"key":"674_CR21","doi-asserted-by":"crossref","unstructured":"Liu L, Wang J, Liu J, Zhang J (2009) Privacy preservation in social networks with sensitive edge weights. In: SDM\u201909, pp 954\u2013965","DOI":"10.1137\/1.9781611972795.82"},{"key":"674_CR22","doi-asserted-by":"crossref","unstructured":"Maiya AS, Berger-Wolf TY (2010) Sampling community structure. In: WWW\u201910, pp 701\u2013710","DOI":"10.1145\/1772690.1772762"},{"key":"674_CR23","unstructured":"Mir DJ, Wright RN (2012) A differentially private graph estimator for the stochastic kronecker graph model. In: EDBT, PAIS workshops, pp 122\u2013129"},{"issue":"6","key":"674_CR24","doi-asserted-by":"crossref","first-page":"066,133+","DOI":"10.1103\/PhysRevE.69.066133","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman MEJ (2004) Fast algorithm for detecting community structure in networks. Phys Rev E 69(6):066,133+","journal-title":"Phys Rev E"},{"key":"674_CR25","unstructured":"Rastogi V, Suciu D, Hong S (2007) The boundary between privacy and utility in data publishing. In: VLDB\u201907, pp 531\u2013542"},{"key":"674_CR26","doi-asserted-by":"crossref","unstructured":"Sala A, Zhao X, Wilson C, Zheng H, Zhao BY (2011) Sharing graphs using differentially private graph models. In: IMC \u201911, pp 81\u201398","DOI":"10.1145\/2068816.2068825"},{"key":"674_CR27","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"F Santo","year":"2010","unstructured":"Santo F (2010) Community detection in graphs. Phys Rep 486:75\u2013174","journal-title":"Phys Rep"},{"issue":"3","key":"674_CR28","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s10618-010-0208-4","volume":"23","author":"X Sun","year":"2011","unstructured":"Sun X, Wang H, Li J, Pei J (2011) Publishing anonymous survey rating data. Data Mining Knowl Discov 23(3):379\u2013406","journal-title":"Data Mining Knowl Discov"},{"issue":"5","key":"674_CR29","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"674_CR30","unstructured":"Wong RCW, Fu AWC, Wang K, Pei J (2007) Minimality attack in privacy preserving data publishing. In: VLDB \u201907, pp 543\u2013554"},{"key":"674_CR31","doi-asserted-by":"crossref","unstructured":"Wu W, Xiao Y, Wang W, He Z, Wang Z (2010) K-symmetry model for identity anonymization in social networks. In: EDBT\u201910, pp 111\u2013122","DOI":"10.1145\/1739041.1739058"},{"key":"674_CR32","doi-asserted-by":"crossref","unstructured":"Xiao Q, Wang Z, Tan KL (2011) Lora: link obfuscation by randomization in graphs. In: SDM\u201911, pp 33\u201351","DOI":"10.1007\/978-3-642-23556-6_3"},{"key":"674_CR33","doi-asserted-by":"crossref","unstructured":"Ying X, Wu X (2008) Randomizing social networks: a spectrum preserving approach. In: SDM\u201908, pp 739\u2013750","DOI":"10.1137\/1.9781611972788.67"},{"key":"674_CR34","doi-asserted-by":"crossref","unstructured":"Ying X, Wu X (2009) On link privacy in randomizing social networks. In: PAKDD\u201909, pp 28\u201339","DOI":"10.1007\/978-3-642-01307-2_6"},{"key":"674_CR35","doi-asserted-by":"crossref","unstructured":"Zheleva E, Getoor L (2008) Preserving the privacy of sensitive relationships in graph data. In: PinKDD\u201907, pp 153\u2013171","DOI":"10.1007\/978-3-540-78478-4_9"},{"key":"674_CR36","doi-asserted-by":"crossref","unstructured":"Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: ICDE\u201908, pp 506\u2013515","DOI":"10.1109\/ICDE.2008.4497459"},{"issue":"2","key":"674_CR37","first-page":"1","volume":"24","author":"B Zhou","year":"2010","unstructured":"Zhou B, Pei J (2010) The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl Inf Syst 24(2):1\u201338","journal-title":"Knowl Inf Syst"},{"key":"674_CR38","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B Zhou","year":"2008","unstructured":"Zhou B, Pei J, Luk W (2008) A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor Newsl 10:12\u201322","journal-title":"SIGKDD Explor Newsl"},{"issue":"1","key":"674_CR39","doi-asserted-by":"crossref","first-page":"946","DOI":"10.14778\/1687627.1687734","volume":"2","author":"L Zou","year":"2009","unstructured":"Zou L, Chen L, \u00d6zsu M (2009) K-automorphism: a general framework for privacy preserving network publication. VLDB Endow 2(1):946\u2013957","journal-title":"VLDB Endow"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-013-0674-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-013-0674-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-013-0674-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T04:14:45Z","timestamp":1563509685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-013-0674-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,24]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["674"],"URL":"https:\/\/doi.org\/10.1007\/s10115-013-0674-2","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,24]]}}}