{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:00:50Z","timestamp":1725706850705},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/healthcom.2017.8210763","type":"proceedings-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T23:20:40Z","timestamp":1513639240000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks"],"prefix":"10.1109","author":[{"given":"Xiaoyi","family":"Hu","sequence":"first","affiliation":[]},{"given":"Li-e","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xianxian","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4267921"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2015.7400035"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31235-9_37"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"journal-title":"Privacy preserving in social networks against sensitive edge-disclosure","year":"2008","author":"liu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25781-0_63"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23535-1_12"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0210-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2555904"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017106"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592674"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.202"},{"key":"ref1","first-page":"173","article-title":"De-anonymizing Social Networks[C]\/\/ Security and Privacy, 2009","author":"narayanan","year":"0","journal-title":"IEEE Symposium on"},{"key":"ref9","first-page":"437","author":"medforth","year":"2011","journal-title":"Privacy Risk in Graph Stream Publishing for Social Network Data[J]"}],"event":{"name":"2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom)","start":{"date-parts":[[2017,10,12]]},"location":"Dalian","end":{"date-parts":[[2017,10,15]]}},"container-title":["2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8169616\/8210752\/08210763.pdf?arnumber=8210763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T22:44:22Z","timestamp":1516661062000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8210763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/healthcom.2017.8210763","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}