{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T19:01:46Z","timestamp":1764788506757,"version":"3.46.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Science and Technology Innovation Key R&amp;D Program of Chongqing","award":["CSTB2023TIAD-STX0036"],"award-info":[{"award-number":["CSTB2023TIAD-STX0036"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072065","62272256"],"award-info":[{"award-number":["62072065","62272256"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Chongqing, China","award":["CSTB2024NSCQ-LZX0084"],"award-info":[{"award-number":["CSTB2024NSCQ-LZX0084"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2025.3597347","type":"journal-article","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T17:44:26Z","timestamp":1754934266000},"page":"1586-1598","source":"Crossref","is-referenced-by-count":0,"title":["Node Similarity-Based Synthetic Graphs Releasing With Differential Privacy Guarantees"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2808-0156","authenticated-orcid":false,"given":"Bin","family":"Cai","sequence":"first","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University), Ministry of Education, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3839-8067","authenticated-orcid":false,"given":"Yangrui","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University), Ministry of Education, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5825-2241","authenticated-orcid":false,"given":"Chunqiang","family":"Hu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University), Ministry of Education, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6550-9743","authenticated-orcid":false,"given":"Weihong","family":"Sheng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University), Ministry of Education, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8129-4538","authenticated-orcid":false,"given":"Jiajun","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University), Ministry of Education, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6451-1158","authenticated-orcid":false,"given":"Jiguo","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449844"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.108103"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3661821"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/1331677X.2022.2106264"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/ijsw.12528"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3648470"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10472-w"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0407-2_9"},{"issue":"4","key":"ref9","first-page":"2197","article-title":"Social network analysis and sentiment classification of extended reality product content","volume":"4","author":"Singgalen","year":"2024","journal-title":"KLIK Kaji. Ilm. Inform. Dan Komput"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3579815"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3645086"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103790"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.05.040"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.adn7053"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-024-02289-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3569085"},{"key":"ref22","first-page":"678","article-title":"Sangea: Scalable and attributed network generation","volume-title":"Proc. Mach. Learn. Res.","author":"Lemaire","year":"2024"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.388"},{"issue":"4","key":"ref24","first-page":"145","article-title":"A graph generating method based on local differential privacy for preserving link relationships of social networks","volume":"4","author":"Yan","year":"2025","journal-title":"J. Netw. Netw. Appl."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2584610"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2023.10087251"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2017.2685505"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585241"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3528222"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.11"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00184"},{"key":"ref32","first-page":"3241","article-title":"$\\lbrace$PrivGraph$\\rbrace$: Differentially private graph data publication by exploiting community information","volume-title":"Proc. USENIX Secur. Symp.","author":"Yuan","year":"2023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.252631999"},{"key":"ref34","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"Erd6s","year":"1960","journal-title":"Pub. Math. Inst. Hung. Acad. Sci."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2022.10.036"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21534-6_2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.130"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2952452"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975994.34"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102285"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915215"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134086"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3290480.3290503"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3402162"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3534201"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3224731"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.103985"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2024.3366071"},{"key":"ref49","first-page":"547","article-title":"tude comparative de la distribution florale dans une portion des alpes et des jura","volume":"37","author":"Jaccard","year":"1901","journal-title":"Bull Soc Vaudoise Sci Nat"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/net.22012"},{"volume-title":"Music Recommendation and Discovery in the Long Tail","year":"2011","author":"Herrada","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnab014"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342890"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11122326.pdf?arnumber=11122326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:43:58Z","timestamp":1764787438000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11122326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3597347","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"type":"electronic","value":"2327-4697"},{"type":"electronic","value":"2334-329X"}],"subject":[],"published":{"date-parts":[[2026]]}}}