{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:27:21Z","timestamp":1767065241573},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T00:00:00Z","timestamp":1436918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61202087"],"award-info":[{"award-number":["61202087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["N120404012"],"award-info":[{"award-number":["N120404012"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Projects in the National Science & Technology Pillar Program","award":["2014BAI17B02-03"],"award-info":[{"award-number":["2014BAI17B02-03"]}]},{"name":"Open Foundation of WUHAN University","award":["SKLSE2012-09-40"],"award-info":[{"award-number":["SKLSE2012-09-40"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61332006, U1401256, 61328202"],"award-info":[{"award-number":["61332006, U1401256, 61328202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10115-015-0855-2","type":"journal-article","created":{"date-parts":[[2015,7,14]],"date-time":"2015-07-14T14:58:34Z","timestamp":1436885914000},"page":"595-623","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Splitting anonymization: a novel privacy-preserving approach of social network"],"prefix":"10.1007","volume":"47","author":[{"given":"Yongjiao","family":"Sun","sequence":"first","affiliation":[]},{"given":"Ye","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yurong","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,15]]},"reference":[{"key":"855_CR1","doi-asserted-by":"crossref","unstructured":"Wu X (2004) Data mining: artificial intelligence in data analysis. Intelligent agent technology, 2004 (IAT 2004). In: Proceedings of IEEE\/WIC\/ACM international conference on, p 7, 20-24 Sept. 2004. doi: 10.1109\/IAT.2004.1342916 , http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=1342916&isnumber=29567","DOI":"10.1109\/IAT.2004.1342916"},{"key":"855_CR2","doi-asserted-by":"crossref","unstructured":"Srivastava J (2008) Data mining for social network analysis. Intelligence and security informatics, 2008. ISI 2008. IEEE international conference on, pp xxxiii\u2013xxxiv, 17\u201320 June 2008. doi: 10.1109\/ISI.2008.4565015 , http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=4565015&isnumber=4565003","DOI":"10.1109\/ISI.2008.4565015"},{"key":"855_CR3","doi-asserted-by":"crossref","unstructured":"Jamali M, Abolhassani H (2006) Different aspects of social network analysis. Web intelligence, 2006. WI 2006. IEEE\/WIC\/ACM international conference on, pp 66\u201372, 18\u201322 Dec. 2006. doi: 10.1109\/WI.2006.61 , http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=4061343&isnumber=4061322","DOI":"10.1109\/WI.2006.61"},{"key":"855_CR4","doi-asserted-by":"crossref","unstructured":"Narayanan A, Shmatikov V (2009) De-anonymizing Social Networks. In: IEEE symposium on security and privacy, pp 173\u2013187","DOI":"10.1109\/SP.2009.22"},{"key":"855_CR5","doi-asserted-by":"crossref","unstructured":"Song W, Zhang Y, Bai W (2010) Anonymizing path nodes in social network. Database technology and applications (DBTA), 2010 2nd international workshop on, pp 1\u20134, 27\u201328 Nov. 2010. doi: 10.1109\/DBTA.2010.5658931 , http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=5658931&isnumber=5658597","DOI":"10.1109\/DBTA.2010.5658931"},{"key":"855_CR6","doi-asserted-by":"crossref","unstructured":"Zhu Y, Huang L, Yang W, Li D, Luo Y, Dong F (2009) Three new approaches to privacy-preserving add to multiply protocol and its application. Knowledge discovery and data mining, 2009. WKDD 2009. Second international workshop on, pp 554\u2013558, 23\u201325 Jan. 2009. doi: 10.1109\/WKDD.2009.34 , http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=4771997&isnumber=4771855","DOI":"10.1109\/WKDD.2009.34"},{"key":"855_CR7","unstructured":"Tassa T, Cohen D Anonymization of centralized and distributed social networks by sequential clustering. Knowl Data Eng IEEE Trans (99):1, 0. doi: 10.1109\/TKDE.2011.232 , http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=6081867&isnumber=4358933"},{"key":"855_CR8","doi-asserted-by":"crossref","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557\u2013570. doi: 10.1142\/S0218488502001648 , http:\/\/arbor.ee.ntu.edu.tw\/archive\/ppdm\/Anonymity\/SweeneyKA02.pdf","DOI":"10.1142\/S0218488502001648"},{"issue":"6","key":"855_CR9","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s00778-010-0210-x","volume":"19","author":"M Hay","year":"2010","unstructured":"Hay M, Miklau G, Jensen D, Towsley DF, Li C (2010) Resisting structural re-identification in anonymizedsocialnetworks. VLDB J 19(6):797\u2013823","journal-title":"VLDB J"},{"issue":"1","key":"855_CR10","first-page":"102","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay M, Miklau G, Jensen D, Towsley DF, Weis P (2008) Resisting structural re-identification in anonymizedsocialnetworks. PVLDB 1(1):102\u2013114","journal-title":"PVLDB"},{"key":"855_CR11","unstructured":"Campan A, Truta T (2008) A clustering approach for dataand structural anonymity in social networks. In: PinKDD, pp 33\u201354"},{"issue":"2","key":"855_CR12","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1109\/TKDE.2011.232","volume":"25","author":"T Tassa","year":"2013","unstructured":"Tassa T, Cohen D (2013) Anonymization of centralized and distributed social networks by sequential clustering. IEEE Trans Knowl Data Eng 25(2):311\u2013324","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"855_CR13","first-page":"766","volume":"2","author":"G Cormode","year":"2009","unstructured":"Cormode G, Srivastava D, Bhagat S, Krishnamurthy B (2009) Class-based graph anonymizationforsocial network data. PVLDB 2(1):766\u2013777","journal-title":"PVLDB"},{"issue":"1","key":"855_CR14","first-page":"833","volume":"1","author":"G Cormode","year":"2008","unstructured":"Cormode G, Srivastava D, Yu T, Zhang Q (2008) Anonymizing bipartite graph data using safe groupings. PVLDB 1(1):833\u2013844","journal-title":"PVLDB"},{"key":"855_CR15","unstructured":"Zheleva E, Getoor L (2007) Preserving the privacy of sensitive relationships in graph data. In: Bonchi F, Malin B, Saygin Y (eds) PinKDD 2007, vol 4890. Springer, Heidelberg, pp 153\u2013171"},{"key":"855_CR16","unstructured":"Liu K, Terzi E (2008) Towards identity anonymizationongraphs. In: SIGMOD conference, pp 93\u2013106"},{"key":"855_CR17","doi-asserted-by":"crossref","unstructured":"Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: ICDE 2008, pp 506\u2013515","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"855_CR18","doi-asserted-by":"crossref","unstructured":"Thompson B, Yao D (2009) The union-split algorithm and cluster-based anonymization of social networks. In: ASIACCS, pp 218\u2013227","DOI":"10.1145\/1533057.1533088"},{"issue":"1","key":"855_CR19","first-page":"946","volume":"2","author":"L Zou","year":"2009","unstructured":"Zou L, Chen L, \u00d6zsu MT (2009) K-automorphism: ageneral framework for privacy preserving networkpublication. PVLDB 2(1):946\u2013957","journal-title":"PVLDB"},{"key":"855_CR20","doi-asserted-by":"crossref","unstructured":"Wu W, Xiao Y, Wang W, He Z, Wang Z (2010) k-Symmetry model for identity anonymization in socialnetworks. In: EDBT, pp 111\u2013122","DOI":"10.1145\/1739041.1739058"},{"key":"855_CR21","unstructured":"Hay M, Miklau G, Jensen D, Weis P, Srivastava S (2007) Anonymizing social networks. Computer science department faculty publication series, p 180"},{"issue":"2","key":"855_CR22","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/261342.571216","volume":"28","author":"D Hochba","year":"1997","unstructured":"Hochba D (1997) Approximation algorithms for NP-Hard problems. SIGACT News 28(2):40\u201352","journal-title":"SIGACT News"},{"key":"855_CR23","doi-asserted-by":"crossref","unstructured":"Zou L, Chen L, Tamer \u00d6zsu M (2009) Distance join: pattern match query in a large graph database international conference on very large data bases, VLDB","DOI":"10.14778\/1687627.1687727"},{"issue":"1","key":"855_CR24","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s00778-011-0238-6","volume":"21","author":"L Zou","year":"2012","unstructured":"Zou L, Chen L, Tamer \u00d6zsu M, Zhao D (2012) Answering pattern match queries in large graph databases via graph embedding. VLDB J 21(1):97\u2013120","journal-title":"VLDB J"},{"key":"855_CR25","doi-asserted-by":"crossref","unstructured":"Zou L, Mo J, Chen L, Tamer \u00d6zsu M, Zhao D (2011) gStore: answering SPARQL queries via subgraph matching international conference on very large data bases, VLDB","DOI":"10.14778\/2002974.2002976"},{"key":"855_CR26","unstructured":"Xifeng Y, Yu PS, Han J (2004) Graph indexing: a frequent structure-based approach. In: Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM"},{"key":"855_CR27","doi-asserted-by":"crossref","unstructured":"Zheng W, Zou L, Feng Y, Chen L, Zhao D (2013) Efficient sim rank-based similarity join over large graphs international conference on very large data bases, VLDB","DOI":"10.14778\/2536349.2536350"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0855-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-015-0855-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0855-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T13:35:55Z","timestamp":1589549755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-015-0855-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,15]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["855"],"URL":"https:\/\/doi.org\/10.1007\/s10115-015-0855-2","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,15]]}}}