{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:26:24Z","timestamp":1767065184056},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11390-014-1466-1","type":"journal-article","created":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T09:42:35Z","timestamp":1411292555000},"page":"762-776","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Protect You More Than Blank: Anti-Learning Sensitive User Information in the Social Networks"],"prefix":"10.1007","volume":"29","author":[{"given":"Mingxuan","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Mei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,12]]},"reference":[{"key":"1466_CR1","unstructured":"Liu L, Wang J, Liu J, Zhang J. Privacy preserving in social networks against sensitive edge disclosure. Technical Report, CMIDA-HiPSCCS 006-08, Department of Computer Science, University of Kentucky, Lexington, USA, 2008."},{"key":"1466_CR2","doi-asserted-by":"crossref","unstructured":"Das S, Egecioglu \u00d6, El Abbadi A. Anonymizing weighted social network graphs. In Proc. the 26th ICDE, March 2010, pp.904\u2013907.","DOI":"10.1109\/ICDE.2010.5447915"},{"key":"1466_CR3","doi-asserted-by":"crossref","unstructured":"Zheleva E, Getoor L. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proc. the 18th International Conference on World Wide Web, April 2009, pp.531\u2013540.","DOI":"10.1145\/1526709.1526781"},{"key":"1466_CR4","doi-asserted-by":"crossref","unstructured":"Mo M, King I. Exploit of online social networks with community-based graph semi-supervised learning. In Proc. the 17th International Conference on Neural Information Processing: Theory and Algorithms - Volume Part I, November 2010, pp.669\u2013678.","DOI":"10.1007\/978-3-642-17537-4_81"},{"key":"1466_CR5","unstructured":"Lu Q, Getoor L. Link-based classification. In Proc. the 20th International Conference on Machine Learning (ICML), August 2003, pp.496\u2013503."},{"key":"1466_CR6","doi-asserted-by":"crossref","unstructured":"Neville J, Jensen D. Relational dependency networks. Journal of Machine Learning Research, 2007, 8(Mar): 653\u2013692.","DOI":"10.7551\/mitpress\/7432.003.0010"},{"key":"1466_CR7","doi-asserted-by":"crossref","unstructured":"Tang L, Liu H. Relational learning via latent social dimensions. In Proc. the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, June 28\u2013July 1, 2009, pp.817\u2013826.","DOI":"10.1145\/1557019.1557109"},{"issue":"1","key":"1466_CR8","doi-asserted-by":"crossref","first-page":"766","DOI":"10.14778\/1687627.1687714","volume":"2","author":"S Bhagat","year":"2009","unstructured":"Bhagat S, Cormode G, Krishnamurthy B, Srivastava D. Class-based graph anonymization for social network data. Proc. VLDB Endow., 2009, 2(1): 766\u2013777.","journal-title":"Proc. VLDB Endow."},{"key":"1466_CR9","doi-asserted-by":"crossref","unstructured":"Cheng J, Fu A W, Liu J. K-isomorphism: Privacy preserving network publication against structural attacks. In Proc. the 2010 International Conference on Management of Data, June 2010, pp.459\u2013470.","DOI":"10.1145\/1807167.1807218"},{"issue":"1","key":"1466_CR10","doi-asserted-by":"crossref","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay M, Miklau G, Jensen D, Towsley D, Weis P. Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow., 2008, 1(1): 102\u2013114.","journal-title":"Proc. VLDB Endow."},{"key":"1466_CR11","doi-asserted-by":"crossref","unstructured":"Liu K, Terzi E. Towards identity anonymization on graphs. In Proc. the 2008 International Conference on Management of Data, June 2008, pp.93\u2013106.","DOI":"10.1145\/1376616.1376629"},{"key":"1466_CR12","doi-asserted-by":"crossref","unstructured":"Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks. In Proc. the 24th ICDE, April 2008, pp.506\u2013515.","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"1466_CR13","doi-asserted-by":"crossref","unstructured":"Liu X, Wang B, Yang X. Efficiently anonymizing social networks with reachability preservation. In Proc. the 22nd ACM International Conference on Information & Knowledge Management, October 27-November 1, 2013, pp.1613\u20131618.","DOI":"10.1145\/2505515.2505731"},{"key":"1466_CR14","doi-asserted-by":"crossref","unstructured":"Campbell C S, Maglio P P, Cozzi A, Dom B. Expertise identification using email communications. In Proc. the 12th International Conference on Information and Knowledge Management, November 2003, pp.528\u2013531.","DOI":"10.1145\/956958.956965"},{"key":"1466_CR15","doi-asserted-by":"crossref","unstructured":"Zhang J, Tang J, Li J. Expert finding in a social network. In Proc. the 12th Int. Conf. Database Systems for Advanced Applications, April 2007, pp.1066\u20131069.","DOI":"10.1007\/978-3-540-71703-4_106"},{"key":"1466_CR16","doi-asserted-by":"crossref","unstructured":"Ying X, Wu X. Randomizing social networks: A spectrum preserving approach. In Proc. SDM, April 2008, pp.739\u2013750.","DOI":"10.1137\/1.9781611972788.67"},{"key":"1466_CR17","doi-asserted-by":"crossref","unstructured":"Zhang J, Tang J, Liu L, Li J. A mixture model for expert finding. In Proc. the 12th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, May 2008, pp.466\u2013478.","DOI":"10.1007\/978-3-540-68125-0_41"},{"key":"1466_CR18","doi-asserted-by":"crossref","unstructured":"Zheleva E, Getoor L. Preserving the privacy of sensitive relationships in graph data. In Proc. the 1st PinKDD, August 2007, pp.153\u2013171.","DOI":"10.1007\/978-3-540-78478-4_9"},{"key":"1466_CR19","doi-asserted-by":"crossref","unstructured":"Campan A, Truta T M. Data and structural k-anonymity in social networks. In Proc. the 2nd PinKDD, August 2008, pp.33\u201354.","DOI":"10.1007\/978-3-642-01718-6_4"},{"key":"1466_CR20","unstructured":"Zou L, Chen L, \u00d6zsu M T. k-automorphism: A general framework for privacy preserving network publication. Proc. VLDB Endow., 2009, 2(1): 946\u2013957."},{"issue":"1","key":"1466_CR21","doi-asserted-by":"crossref","first-page":"833","DOI":"10.14778\/1453856.1453947","volume":"1","author":"G Cormode","year":"2008","unstructured":"Cormode G, Srivastava D, Yu T, Zhang Q. Anonymizing bipartite graph data using safe groupings. Proc. VLDB Endow., 2008, 1(1): 833\u2013844.","journal-title":"Proc. VLDB Endow."},{"key":"1466_CR22","doi-asserted-by":"crossref","unstructured":"Wu W, Xiao Y, Wang W, He Z, Wang Z. k-symmetry model for identity anonymization in social networks. In Proc. the 13th International Conference on Extending Database Technology, March 2010, pp.111\u2013122.","DOI":"10.1145\/1739041.1739058"},{"key":"1466_CR23","doi-asserted-by":"crossref","unstructured":"He X, Vaidya J, Shafiq B, Adam N, Atluri V. Preserving privacy in social networks: A structure-aware approach. In Proc. the 2009 IEEE\/WIC\/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, Sept. 2009, pp.647\u2013654.","DOI":"10.1109\/WI-IAT.2009.108"},{"issue":"2","key":"1466_CR24","doi-asserted-by":"crossref","first-page":"141","DOI":"10.14778\/1921071.1921080","volume":"4","author":"M Yuan","year":"2010","unstructured":"Yuan M, Chen L, Yu P S. Personalized privacy protection in social networks. Proc. VLDB Endow., 2010, 4(2): 141\u2013150.","journal-title":"Proc. VLDB Endow."},{"key":"1466_CR25","doi-asserted-by":"crossref","unstructured":"Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B. Inferring private information using social network data. In Proc. the 18th International Conference on World Wide Web, April 2009, pp.1145\u20131146.","DOI":"10.1145\/1526709.1526899"},{"issue":"7","key":"1466_CR26","doi-asserted-by":"crossref","first-page":"440","DOI":"10.14778\/1988776.1988780","volume":"4","author":"A Machanavajjhala","year":"2011","unstructured":"Machanavajjhala A, Korolova A, Sarma A D. Personalized social recommendations: Accurate or private? Proc. VLDB Endow., 2011, 4(7): 440\u2013450.","journal-title":"Proc. VLDB Endow."},{"key":"1466_CR27","doi-asserted-by":"crossref","unstructured":"Dwork C. Differential privacy. In Proc. the 33rd ICALP Part II, July 2006, pp.1\u201312.","DOI":"10.1007\/11787006_1"},{"key":"1466_CR28","doi-asserted-by":"crossref","unstructured":"Xu J, Zhang Z, Xiao X, Yang Y, Yu G. Differentially private histogram publication. In Proc. the 28th IEEE International Conference on Data Engineering, April 2012, pp.32\u201343.","DOI":"10.1109\/ICDE.2012.48"},{"key":"1466_CR29","doi-asserted-by":"crossref","unstructured":"Qardaji W, Yang W, Li N. Differentially private grids for geospatial data. In Proc. the 29th IEEE International Conference on Data Engineering (ICDE), April 2013, pp.757\u2013768.","DOI":"10.1109\/ICDE.2013.6544872"},{"issue":"10","key":"1466_CR30","doi-asserted-by":"crossref","first-page":"919","DOI":"10.14778\/2732951.2732966","volume":"7","author":"H To","year":"2014","unstructured":"To H, Ghinita G, Shahabi C. A framework for protecting worker location privacy in spatial crowdsourcing. Proc. VLDB Endow., 2014, 7(10): 919\u2013930.","journal-title":"Proc. VLDB Endow."},{"issue":"11","key":"1466_CR31","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.14778\/2350229.2350251","volume":"5","author":"N Li","year":"2012","unstructured":"Li N, Qardaji W, Su D, Cao J. PrivBasis: Frequent itemset mining with differential privacy. Proc. VLDB Endow., 2012, 5(11): 1340\u20131351.","journal-title":"Proc. VLDB Endow."},{"issue":"1","key":"1466_CR32","doi-asserted-by":"crossref","first-page":"25","DOI":"10.14778\/2428536.2428539","volume":"6","author":"C Zeng","year":"2012","unstructured":"Zeng C, Naughton J F, Cai J Y. On differentially private frequent itemset mining. Proc. VLDB Endow., 2012, 6(1): 25\u201336.","journal-title":"Proc. VLDB Endow."},{"key":"1466_CR33","doi-asserted-by":"crossref","unstructured":"Akcora C, Carminati B, Ferrari E. Privacy in social networks: How risky is your social graph? In Proc. the 28th IEEE International Conference on Data Engineering, April 2012, pp.9\u201319.","DOI":"10.1109\/ICDE.2012.99"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1466-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-014-1466-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-014-1466-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T17:52:42Z","timestamp":1689529962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-014-1466-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["1466"],"URL":"https:\/\/doi.org\/10.1007\/s11390-014-1466-1","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9]]}}}