{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:17Z","timestamp":1750306757192,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,25]],"date-time":"2013-08-25T00:00:00Z","timestamp":1377388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,25]]},"DOI":"10.1145\/2492517.2500267","type":"proceedings-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:40:06Z","timestamp":1389706806000},"page":"1161-1166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["GASNA"],"prefix":"10.1145","author":[{"given":"Mayank Singh","family":"Shishodia","sequence":"first","affiliation":[{"name":"Vellore Institute of Technology, Vellore, India"}]},{"given":"Sumeet","family":"Jain","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology, Vellore, India"}]},{"given":"B. K.","family":"Tripathy","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology, Vellore, India"}]}],"member":"320","published-online":{"date-parts":[[2013,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"e_1_3_2_1_4_1","first-page":"216","volume-title":"Proceedings National Conference on recent trends in soft computing","author":"Tripathy B. K.","year":"2009","unstructured":"Tripathy , B. K. , Janaki , L. and Jain Neha: Security against Neighbourhood Attacks in Social Networks , Proceedings National Conference on recent trends in soft computing , Bangalore , ( 2009 ), pp. 216 -- 223 . Tripathy, B. K., Janaki, L. and Jain Neha: Security against Neighbourhood Attacks in Social Networks, Proceedings National Conference on recent trends in soft computing, Bangalore, (2009), pp. 216--223."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.69"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739058"},{"key":"e_1_3_2_1_8_1","first-page":"V2","volume-title":"Proc. Of the third International Conference on Computer Modeling and Simulation (ICCMS 2011","author":"Tripathy B. K.","year":"2011","unstructured":"Tripathy , B. K. , Panda , G. K. and Kumaran , K .: A Fast l - Diversity Anonymization Algorithm , Proc. Of the third International Conference on Computer Modeling and Simulation (ICCMS 2011 ), Mumbai, 7- -9 January , ( 2011 ), pp. V2 - 648 --652. Tripathy, B. K., Panda, G. K. and Kumaran, K.: A Fast l - Diversity Anonymization Algorithm, Proc. Of the third International Conference on Computer Modeling and Simulation (ICCMS 2011), Mumbai, 7--9 January, (2011), pp. V2-648--652."},{"key":"e_1_3_2_1_9_1","first-page":"126","volume-title":"2012 Fourth International Conference on, vol., no.","author":"Tripathy B. K.","year":"2012","unstructured":"Tripathy , B. K. ; Mitra , A. , \" An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks,\" Computational Aspects of Social Networks (CASoN) , 2012 Fourth International Conference on, vol., no. , pp. 126 , 131, 21--23 Nov. 2012 . Tripathy, B. K.; Mitra, A., \"An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks,\" Computational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on, vol., no., pp. 126, 131, 21--23 Nov. 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/978-1-4471-4051-1_12","volume-title":"Computational Social networks: Security and Privacy","author":"Tripathy B. K.","year":"2012","unstructured":"Tripathy , B. K. : Anonymization of social Networks and Rough Set Approach , In: A. Abraham (ed.), Computational Social networks: Security and Privacy , Springer Verlag London , ( 2012 ), pp. 269 -- 309 . Tripathy, B. K.: Anonymization of social Networks and Rough Set Approach, In: A. Abraham (ed.), Computational Social networks: Security and Privacy, Springer Verlag London, (2012), pp. 269--309."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.43"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.112"},{"key":"e_1_3_2_1_13_1","volume-title":"Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3), 036104","author":"Newman M. E.","year":"2006","unstructured":"Newman , M. E. ( 2006 ). Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3), 036104 . Newman, M. E. (2006). Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3), 036104."}],"event":{"name":"ASONAM '13: Advances in Social Networks Analysis and Mining 2013","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Niagara Ontario Canada","acronym":"ASONAM '13"},"container-title":["Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492517.2500267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2492517.2500267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:37Z","timestamp":1750231717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492517.2500267"}},"subtitle":["greedy algorithm for social network anonymization"],"short-title":[],"issued":{"date-parts":[[2013,8,25]]},"references-count":13,"alternative-id":["10.1145\/2492517.2500267","10.1145\/2492517"],"URL":"https:\/\/doi.org\/10.1145\/2492517.2500267","relation":{},"subject":[],"published":{"date-parts":[[2013,8,25]]},"assertion":[{"value":"2013-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}