{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:22:35Z","timestamp":1775578955388,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T00:00:00Z","timestamp":1679097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T00:00:00Z","timestamp":1679097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772131"],"award-info":[{"award-number":["61772131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s10115-023-01838-1","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:23:05Z","timestamp":1679880185000},"page":"2965-2989","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["PPDU: dynamic graph publication with local differential privacy"],"prefix":"10.1007","volume":"65","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8328-5878","authenticated-orcid":false,"given":"Lihe","family":"Hou","sequence":"first","affiliation":[]},{"given":"Weiwei","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Sen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Dongyue","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,18]]},"reference":[{"issue":"1","key":"1838_CR1","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10115-018-1313-8","volume":"61","author":"A Karakasidis","year":"2019","unstructured":"Karakasidis A, Pallis G, Dikaiakos MD (2019) Two-hop privacy-preserving nearest friend searches. Knowl Inf Syst 61(1):85\u2013105","journal-title":"Knowl Inf Syst"},{"key":"1838_CR2","doi-asserted-by":"crossref","unstructured":"Mauw S, Ram\u00edrez-Cruz Y, Trujillo-Rasua R (2020) Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. arXiv:2007.05312","DOI":"10.1007\/s10618-019-00631-5"},{"key":"1838_CR3","unstructured":"Yang M, Lyu L, Zhao J, Zhu T, Lam K-Y (2020) Local differential privacy and its applications: a comprehensive survey. arXiv:2008.03686"},{"key":"1838_CR4","doi-asserted-by":"crossref","unstructured":"Qin Z, Yu T, Yang Y, Khalil I, Xiao X, Ren K (2017) Generating synthetic decentralized social graphs with local differential privacy. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 425\u2013438","DOI":"10.1145\/3133956.3134086"},{"key":"1838_CR5","unstructured":"Ye Q, Hu H, Au MH, Meng X, Xiao X (2020) Lf-gdpr: A framework for estimating graph metrics with local differential privacy. IEEE Trans Knowle Data Eng"},{"key":"1838_CR6","doi-asserted-by":"crossref","unstructured":"Aiello W, Chung F, Lu L (2000) A random graph model for massive graphs. In: Proceedings of the thirty-second annual ACM symposium on theory of computing, pp 171\u2013180","DOI":"10.1145\/335305.335326"},{"issue":"5","key":"1838_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.056109","volume":"85","author":"C Seshadhri","year":"2012","unstructured":"Seshadhri C, Kolda TG, Pinar A (2012) Community structure and scale-free collections of erd\u0151s-r\u00e9nyi graphs. Phys Rev E 85(5):056109","journal-title":"Phys Rev E"},{"key":"1838_CR8","unstructured":"Leskovec J, Chakrabarti D, Kleinberg J, Faloutsos C, Ghahramani Z (2010) Kronecker graphs: an approach to modeling networks. J Mach Learn Res 11(2)"},{"issue":"4","key":"1838_CR9","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1109\/TCSS.2018.2877045","volume":"5","author":"T Gao","year":"2018","unstructured":"Gao T, Li F, Chen Y, Zou X (2018) Local differential privately anonymizing online social networks under hrg-based model. IEEE Trans Comput Soc Syst 5(4):1009\u20131020","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1838_CR10","doi-asserted-by":"publisher","first-page":"3239","DOI":"10.1109\/TIFS.2020.2985524","volume":"15","author":"C Wei","year":"2020","unstructured":"Wei C, Ji S, Liu C, Chen W, Wang T (2020) Asgldp: collecting and generating decentralized attributed graphs with local differential privacy. IEEE Trans Inf Forensics Secur 15:3239\u20133254","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1838_CR11","unstructured":"Department SR Facebook: number of monthly active users worldwide 2008\u20132021. https:\/\/www.statista.com\/statistics\/264810\/number-of-monthly-active-facebook-users-worldwide\/"},{"key":"1838_CR12","unstructured":"Department SR Number of monthly active WhatsApp users 2013\u20132020. https:\/\/www.statista.com\/statistics\/260819\/number-of-monthly-active-whatsapp-users\/"},{"key":"1838_CR13","unstructured":"Smith C (2021) WeChat Statistics, User Counts and Facts. https:\/\/expandedramblings.com\/index.php\/wechat-statistics\/"},{"key":"1838_CR14","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Theory of cryptography conference. Springer, pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"issue":"24","key":"1838_CR15","doi-asserted-by":"publisher","first-page":"7030","DOI":"10.3390\/s20247030","volume":"20","author":"T Wang","year":"2020","unstructured":"Wang T, Zhang X, Feng J, Yang X (2020) A comprehensive survey on local differential privacy toward data statistics and analysis. Sensors 20(24):7030","journal-title":"Sensors"},{"issue":"2","key":"1838_CR16","first-page":"127","volume":"6","author":"Y Wang","year":"2013","unstructured":"Wang Y, Wu X (2013) Preserving differential privacy in degree-correlation based graph generation. Trans Data Privacy 6(2):127","journal-title":"Trans Data Privacy"},{"key":"1838_CR17","doi-asserted-by":"crossref","unstructured":"Xiao Q, Chen R, Tan K-L (2014) Differentially private network data release via structural inference. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, pp 911\u2013920","DOI":"10.1145\/2623330.2623642"},{"key":"1838_CR18","doi-asserted-by":"crossref","unstructured":"Bassily R, Smith A (2015) Local, private, efficient protocols for succinct histograms. In: Proceedings of the Forty-seventh annual ACM symposium on theory of computing, pp 127\u2013135","DOI":"10.1145\/2746539.2746632"},{"key":"1838_CR19","doi-asserted-by":"crossref","unstructured":"Erlingsson \u00da, Pihur V, Korolova A (2014) Rappor: Randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp 1054\u20131067","DOI":"10.1145\/2660267.2660348"},{"key":"1838_CR20","doi-asserted-by":"crossref","unstructured":"Sun H, Xiao X, Khalil I, Yang Y, Qin Z, Wang H, Yu T (2019) Analyzing subgraph statistics from extended local views with decentralized differential privacy. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 703\u2013717","DOI":"10.1145\/3319535.3354253"},{"key":"1838_CR21","doi-asserted-by":"crossref","unstructured":"Wang S, Zheng Y, Jia X, Yi X (2022) Privacy-preserving analytics on decentralized social graphs: The case of eigendecomposition. IEEE Trans Knowl Data Eng","DOI":"10.1109\/TKDE.2022.3185079"},{"key":"1838_CR22","doi-asserted-by":"publisher","first-page":"3179","DOI":"10.1109\/TIFS.2022.3201392","volume":"17","author":"S Wang","year":"2022","unstructured":"Wang S, Zheng Y, Jia X, Yi X (2022) Pegraph: A system for privacy-preserving and efficient search over encrypted social graphs. IEEE Trans Inf Forensics Secur 17:3179\u20133194","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1838_CR23","unstructured":"Song S, Little S, Mehta S, Vinterbo S, Chaudhuri K (2018) Differentially private continual release of graph statistics. arXiv:1809.02575"},{"key":"1838_CR24","unstructured":"Fichtenberger H, Henzinger M, Ost W (2021) Differentially private algorithms for graphs under continual observation. arXiv:2106.14756"},{"key":"1838_CR25","doi-asserted-by":"crossref","unstructured":"Gao W, Zhou J, Lin Y, Wei J (2022) Compressed sensing-based privacy preserving in labeled dynamic social networks. IEEE Syst J","DOI":"10.1109\/JSYST.2022.3197150"},{"key":"1838_CR26","doi-asserted-by":"crossref","unstructured":"Lederer S, Mankoff J, Dey AK (2003) Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI\u201903 extended abstracts on human factors in computing systems, pp 724\u2013725","DOI":"10.1145\/765891.765952"},{"key":"1838_CR27","doi-asserted-by":"crossref","unstructured":"Xie J, Knijnenburg BP, Jin H (2014) Location sharing privacy preference: analysis and personalized recommendation. In: Proceedings of the 19th international conference on intelligent user interfaces, pp 189\u2013198","DOI":"10.1145\/2557500.2557504"},{"key":"1838_CR28","doi-asserted-by":"crossref","unstructured":"Lee H, Kobsa A (2017) Privacy preference modeling and prediction in a simulated campuswide iot environment. In: 2017 IEEE international conference on pervasive computing and communications (PerCom). IEEE, pp 276\u2013285","DOI":"10.1109\/PERCOM.2017.7917874"},{"issue":"3","key":"1838_CR29","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1137\/090756090","volume":"40","author":"SP Kasiviswanathan","year":"2011","unstructured":"Kasiviswanathan SP, Lee HK, Nissim K, Raskhodnikova S, Smith A (2011) What can we learn privately? SIAM J Comput 40(3):793\u2013826","journal-title":"SIAM J Comput"},{"key":"1838_CR30","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan SP, Nissim K, Raskhodnikova S, Smith A (2013) Analyzing graphs with node differential privacy. In: Theory of Cryptography Conference. Springer, pp 457\u2013476","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"1838_CR31","doi-asserted-by":"crossref","unstructured":"Blocki J, Blum A, Datta A, Sheffet O (2012) The johnson-lindenstrauss transform itself preserves differential privacy. In: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science. IEEE, pp 410\u2013419","DOI":"10.1109\/FOCS.2012.67"},{"issue":"2","key":"1838_CR32","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1109\/COMST.2016.2633620","volume":"19","author":"S Ji","year":"2016","unstructured":"Ji S, Mittal P, Beyah R (2016) Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: a survey. IEEE Commun Surv Tutor 19(2):1305\u20131326","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3\u20134","key":"1838_CR33","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A et al (2014) The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134):211\u2013407","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"1838_CR34","doi-asserted-by":"crossref","unstructured":"McSherry FD (2009) Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp 19\u201330","DOI":"10.1145\/1559845.1559850"},{"issue":"3","key":"1838_CR35","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic LA, Adar E (2003) Friends and neighbors on the web. Soc Netw 25(3):211\u2013230","journal-title":"Soc Netw"},{"key":"1838_CR36","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy. In: International Colloquium on Automata, Languages, and Programming. Springer, pp 1\u201312","DOI":"10.1007\/11787006_1"},{"key":"1838_CR37","doi-asserted-by":"crossref","unstructured":"Dwork C, Lei J (2009) Differential privacy and robust statistics. In: Proceedings of the Forty-first annual ACM symposium on theory of computing, pp 371\u2013380","DOI":"10.1145\/1536414.1536466"},{"key":"1838_CR38","doi-asserted-by":"crossref","unstructured":"Li C, Wang H, Van\u00a0Mieghem P (2012) Degree and principal eigenvectors in complex networks. In: International conference on research in networking. Springer, pp 149\u2013160","DOI":"10.1007\/978-3-642-30045-5_12"},{"issue":"3","key":"1838_CR39","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/s10115-015-0856-1","volume":"47","author":"P Xiong","year":"2016","unstructured":"Xiong P, Zhu T, Niu W, Li G (2016) A differentially private algorithm for location data release. Knowl Inf Syst 47(3):647\u2013669","journal-title":"Knowl Inf Syst"},{"issue":"3","key":"1838_CR40","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/s10115-017-1132-3","volume":"56","author":"K Al-Hussaeni","year":"2018","unstructured":"Al-Hussaeni K, Fung B, Iqbal F, Liu J, Hung PC (2018) Differentially private multidimensional data publishing. Knowl Inf Syst 56(3):717\u2013752","journal-title":"Knowl Inf Syst"},{"key":"1838_CR41","doi-asserted-by":"crossref","unstructured":"Wasserman S, Faust K, et al (1994) Social network analysis: methods and applications","DOI":"10.1017\/CBO9780511815478"},{"issue":"6684","key":"1838_CR42","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684):440\u2013442","journal-title":"Nature"},{"issue":"2","key":"1838_CR43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.025101","volume":"70","author":"R Guimera","year":"2004","unstructured":"Guimera R, Sales-Pardo M, Amaral LAN (2004) Modularity from fluctuations in random graphs and complex networks. Phys Rev E 70(2):025101","journal-title":"Phys Rev E"},{"issue":"336","key":"1838_CR44","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1080\/01621459.1971.10482356","volume":"66","author":"WM Rand","year":"1971","unstructured":"Rand WM (1971) Objective criteria for the evaluation of clustering methods. J Am Stat Assoc 66(336):846\u2013850","journal-title":"J Am Stat Assoc"},{"key":"1838_CR45","first-page":"2837","volume":"11","author":"NX Vinh","year":"2010","unstructured":"Vinh NX, Epps J, Bailey J (2010) Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance. J Mach Learn Res 11:2837\u20132854","journal-title":"J Mach Learn Res"},{"key":"1838_CR46","unstructured":"Leskovec J, Krevl A (2014) SNAP Datasets: Stanford large network dataset collection"},{"issue":"1","key":"1838_CR47","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/00018730601170527","volume":"56","author":"LdF Costa","year":"2007","unstructured":"Costa LdF, Rodrigues FA, Travieso G, Villas Boas PR (2007) Characterization of complex networks: a survey of measurements. Adv Phys 56(1):167\u2013242","journal-title":"Adv Phys"},{"key":"1838_CR48","doi-asserted-by":"crossref","unstructured":"Qin Z, Yang Y, Yu T, Khalil I, Xiao X, Ren K (2016) Heavy hitter estimation over set-valued data with local differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 192\u2013203","DOI":"10.1145\/2976749.2978409"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01838-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-023-01838-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01838-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T03:31:34Z","timestamp":1684380694000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-023-01838-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,18]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["1838"],"URL":"https:\/\/doi.org\/10.1007\/s10115-023-01838-1","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,18]]},"assertion":[{"value":"8 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}