{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:07:42Z","timestamp":1748668062393,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/nana.2018.8648740","type":"proceedings-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T02:36:15Z","timestamp":1551148575000},"page":"263-269","source":"Crossref","is-referenced-by-count":5,"title":["Preserving Privacy for Hubs and Links in Social Networks"],"prefix":"10.1109","author":[{"given":"Yao","family":"Guo","sequence":"first","affiliation":[]},{"given":"Zhihong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Ruiheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory of Cryptography Conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICBK.2017.34"},{"key":"ref12","article-title":"Preserving link privacy in social network based systems","author":"mittal","year":"2013","journal-title":"NDSS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"ref14","first-page":"300","article-title":"Comprehensive survey on distance\/similarity measures between probability density functions","volume":"1","author":"cha","year":"2007","journal-title":"Mathematical Models and Methods in Applied Sciences"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2533668"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/978-3-642-14527-8_12","article-title":"Drac: An architecture for anonymous low-volume communications","author":"danezis","year":"2010","journal-title":"International Symposium on Privacy Enhancing Technologies Symposium"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref5","article-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression","author":"samarati","year":"1998","journal-title":"SRI Technical Report Tech Rep"},{"key":"ref8","first-page":"1","article-title":"Privacy-preserving fine-grained data retrieval schemes for mobile social networks","author":"mahmoud","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2615020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935171"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2738018"}],"event":{"name":"2018 International Conference on Networking and Network Applications (NaNA)","start":{"date-parts":[[2018,10,12]]},"location":"Xi'an, China","end":{"date-parts":[[2018,10,15]]}},"container-title":["2018 International Conference on Networking and Network Applications (NaNA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8638646\/8648703\/08648740.pdf?arnumber=8648740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:46:28Z","timestamp":1643269588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8648740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/nana.2018.8648740","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}