{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:36:02Z","timestamp":1725806162640},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/icde.2015.7113272","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T19:23:28Z","timestamp":1433359408000},"page":"54-65","source":"Crossref","is-referenced-by-count":14,"title":["Preserving privacy in social networks against connection fingerprint attacks"],"prefix":"10.1109","author":[{"given":"Yazhe","family":"Wang","sequence":"first","affiliation":[]},{"given":"Baihua","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.4324\/9781410607034","author":"myers","year":"2003","journal-title":"Research Design and Statistical Analysis"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687714"},{"key":"ref13","article-title":"Anonymizing social networks","author":"hay","year":"2007","journal-title":"UMass Amberst Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767905"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739058"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807218"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134277"},{"key":"ref4","article-title":"Media, govt, organizations get hooked on weibo: report","author":"times","year":"2013","journal-title":"WWW"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"ref6","article-title":"Facebook platform now encompasses more than 50m pages and 10m apps","author":"darwell","year":"2013","journal-title":"WWW"},{"key":"ref29","first-page":"548","article-title":"Learning to discover social circles in ego networks","author":"mcauley","year":"2012","journal-title":"NIPS"},{"key":"ref5","article-title":"Maximize your brand power with weibo","author":"weibo","year":"2013","journal-title":"WWW"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref7","first-page":"419","article-title":"Privacy-preserving data analysis on graphs and social networks","author":"liu","year":"2008","journal-title":"Next Generation of Data Mining Chapman & Hall\/CRC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8462-3_10"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"ref20","first-page":"6","article-title":"Prediction promotes privacy in dynamic social networks","author":"bhagat","year":"0","journal-title":"WOSN'10 2010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.12"},{"key":"ref21","first-page":"1","article-title":"De-anonymizing dynamic social networks","author":"ding","year":"2011","journal-title":"GLOBECOM'II"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_38"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.73"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068825"}],"event":{"name":"2015 IEEE 31st International Conference on Data Engineering (ICDE)","start":{"date-parts":[[2015,4,13]]},"location":"Seoul, South Korea","end":{"date-parts":[[2015,4,17]]}},"container-title":["2015 IEEE 31st International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7109453\/7113253\/07113272.pdf?arnumber=7113272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T02:22:06Z","timestamp":1566786126000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7113272\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icde.2015.7113272","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}