{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:47:43Z","timestamp":1760550463379},"reference-count":30,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T00:00:00Z","timestamp":1518048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxy012","type":"journal-article","created":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T09:00:28Z","timestamp":1516352428000},"page":"601-613","source":"Crossref","is-referenced-by-count":17,"title":["k-NMF Anonymization in Social Network Data Publishing"],"prefix":"10.1093","volume":"61","author":[{"given":"Kamalkumar R","family":"Macwan","sequence":"first","affiliation":[{"name":"Sardar Vallabhbhai National Institute of Technology, Surat, Gujarat, India"}]},{"given":"Sankita J","family":"Patel","sequence":"additional","affiliation":[{"name":"Sardar Vallabhbhai National Institute of Technology, Surat, Gujarat, India"}]}],"member":"286","published-online":{"date-parts":[[2018,2,8]]},"reference":[{"key":"key\n\t\t\t\t20180329074334_bxy012C1","author":"facebookstatistics"},{"key":"key\n\t\t\t\t20180329074334_bxy012C2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1540276.1540279","article-title":"A brief survey on anonymization techniques for privacy preserving publishing of social network data","volume":"10","author":"Zhou","year":"2008","journal-title":"ACM Sigkdd Explor. Newsl."},{"key":"key\n\t\t\t\t20180329074334_bxy012C3","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/978-1-4419-6045-0_14","article-title":"A survey of privacy-preservation of graphs and social networks","author":"Wu","year":"2010","journal-title":"Manag. Min. Graph Data"},{"key":"key\n\t\t\t\t20180329074334_bxy012C4","author":"Liu","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C5","doi-asserted-by":"crossref","first-page":"117","DOI":"10.4316\/AECE.2017.04014","article-title":"k-Degree anonymity model for social network data publishing","volume":"17","author":"Macwan","year":"2017","journal-title":"Adv. Electr. Comput. Eng."},{"key":"key\n\t\t\t\t20180329074334_bxy012C6","author":"Liu","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C7","author":"Backstrom","year":"2007"},{"key":"key\n\t\t\t\t20180329074334_bxy012C8","doi-asserted-by":"crossref","first-page":"102","DOI":"10.14778\/1453856.1453873","article-title":"Resisting structural re-identification in anonymized social networks","volume":"1","author":"Hay","year":"2008","journal-title":"Proc. VLDB Endowment"},{"key":"key\n\t\t\t\t20180329074334_bxy012C9","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: a model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"key\n\t\t\t\t20180329074334_bxy012C10","author":"Liu","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C11","first-page":"71","article-title":"Privacy preserving social network publication against mutual friend attacks","volume":"7","author":"Sun","year":"2014","journal-title":"IEEE Trans. Data Priv."},{"key":"key\n\t\t\t\t20180329074334_bxy012C12","author":"Tai","year":"2011"},{"key":"key\n\t\t\t\t20180329074334_bxy012C13","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Foundations Trends\u00ae Theor. Comput. Sci."},{"key":"key\n\t\t\t\t20180329074334_bxy012C14","author":"Zheleva","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C15","author":"He","year":"2009"},{"key":"key\n\t\t\t\t20180329074334_bxy012C16","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"Wasserman","year":"1994"},{"key":"key\n\t\t\t\t20180329074334_bxy012C17","author":"Zhou","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C18","doi-asserted-by":"crossref","first-page":"946","DOI":"10.14778\/1687627.1687734","article-title":"K-automorphism: a general framework for privacy preserving network publication","volume":"2","author":"Zou","year":"2009","journal-title":"Proc. VLDB Endowment"},{"key":"key\n\t\t\t\t20180329074334_bxy012C19","doi-asserted-by":"crossref","first-page":"766","DOI":"10.14778\/1687627.1687714","article-title":"Class-based graph anonymization for social network data","volume":"2","author":"Bhagat","year":"2009","journal-title":"Proc. VLDB Endowment"},{"key":"key\n\t\t\t\t20180329074334_bxy012C20","author":"Korolova","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C21","author":"Lindamood","year":"2009"},{"key":"key\n\t\t\t\t20180329074334_bxy012C22","author":"Narayanan","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C23","author":"Ying","year":"2008"},{"key":"key\n\t\t\t\t20180329074334_bxy012C24","author":"Zhang","year":"2009"},{"key":"key\n\t\t\t\t20180329074334_bxy012C25","first-page":"472","article-title":"Anonymized social networks community preservation attacks","volume":"8","author":"Vadisala","year":"2017","journal-title":"Int. J. Adv. Comput. Appl."},{"key":"key\n\t\t\t\t20180329074334_bxy012C26","article-title":"Complex networks with arbitrary edge multiplicities","volume-title":"Links","author":"Zlatic","year":"2011"},{"key":"key\n\t\t\t\t20180329074334_bxy012C27","author":"Faloutsos","year":"1999"},{"key":"key\n\t\t\t\t20180329074334_bxy012C28","author":"Networkx"},{"key":"key\n\t\t\t\t20180329074334_bxy012C29","author":"Rossi","year":"2015"},{"key":"key\n\t\t\t\t20180329074334_bxy012C30","author":"Cheng","year":"2010"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/601\/24509712\/bxy012.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T11:44:09Z","timestamp":1570621449000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/601\/4843992"}},"subtitle":[],"editor":[{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,2,8]]},"references-count":30,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,2,8]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy012","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2018,2,8]]}}}