{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:07:13Z","timestamp":1748837233909,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1109\/isncc49221.2020.9297349","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:06:21Z","timestamp":1608933981000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering"],"prefix":"10.1109","author":[{"given":"Arinjita","family":"Paul","sequence":"first","affiliation":[]},{"given":"Vorapong","family":"Suppakitpaisarn","sequence":"additional","affiliation":[]},{"given":"Mitali","family":"Bafna","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"article-title":"Kronecker moment based estimation code","year":"2011","author":"gleich","key":"ref32"},{"article-title":"SNAP Datasets: Stanford large network dataset collection","year":"2014","author":"leskovec","key":"ref31"},{"key":"ref30","first-page":"849","article-title":"On spectral clustering: Analysis and an algorithm","author":"ng","year":"2002","journal-title":"NIPS 2002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623642"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2320765.2320818"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48743-4_23"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/3231751.3231769"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357878"},{"key":"ref15","first-page":"985","article-title":"Kronecker graphs: An approach to modeling networks","volume":"11","author":"leskovec","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20335"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719918"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"year":"1997","key":"ref28","article-title":"University of Oregon route views project, online data and reports"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2902251.2902291"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20335"},{"key":"ref3","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"ICALP 2006"},{"key":"ref6","first-page":"457","article-title":"Analyzing graphs with node differential privacy","author":"kasiviswanathan","year":"2013","journal-title":"TCC 2013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2012.680824"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2901716"},{"article-title":"Privacy via the Johnson-Lindenstrauss transform","year":"2012","author":"kenthapadi","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2043174.2043199"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809385"},{"journal-title":"The SAGE Handbook of Social Network Analysis","year":"2011","author":"scott","key":"ref1"},{"key":"ref20","first-page":"33","article-title":"Data and Structural k-Anonymity in Social Networks","author":"campan","year":"2008","journal-title":"PinKDD 2008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837122"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5502-3"},{"key":"ref24","article-title":"Efficient, differentially private point estimators","author":"smith","year":"2008","journal-title":"CoRR"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9484-8"},{"key":"ref26","first-page":"133","article-title":"Realistic, mathematically tractable graph generation and evolution, using kronecker multiplication","author":"leskovec","year":"2005","journal-title":"PKDD 2005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.5"}],"event":{"name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2020,10,20]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,10,22]]}},"container-title":["2020 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9297148\/9297168\/09297349.pdf?arnumber=9297349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:17Z","timestamp":1656453077000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9297349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/isncc49221.2020.9297349","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]}}}