{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:26Z","timestamp":1775912726449,"version":"3.50.1"},"reference-count":176,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>The application of graph analytics to various domains has yielded tremendous societal and economical benefits in recent years. However, the increasingly widespread adoption of graph analytics comes with a commensurate increase in the need to protect private information in graph data, especially in light of the many privacy breaches in real-world graph data that were supposed to preserve sensitive information. This article provides a comprehensive survey of private graph data release algorithms that seek to achieve the fine balance between privacy and utility, with a specific focus on provably private mechanisms. Many of these mechanisms are natural extensions of the Differential Privacy framework to graph data, but we also investigate more general privacy formulations like Pufferfish Privacy that address some of the limitations of Differential Privacy. We also provide a wide-ranging survey of the applications of private graph data release mechanisms to social networks, finance, supply chain, and health care. This article should benefit practitioners and researchers alike in the increasingly important area of private analytics and data release.<\/jats:p>","DOI":"10.1145\/3569085","type":"journal-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T11:05:19Z","timestamp":1674212719000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Private Graph Data Release: A Survey"],"prefix":"10.1145","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1147-280X","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"first","affiliation":[{"name":"School of Computing, The Australian National University, Acton, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6758-8027","authenticated-orcid":false,"given":"Michael","family":"Purcell","sequence":"additional","affiliation":[{"name":"School of Computing, The Australian National University, Acton, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7698-6214","authenticated-orcid":false,"given":"Thierry","family":"Rakotoarivelo","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8552-1301","authenticated-orcid":false,"given":"David","family":"Smith","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Eveleigh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5405-3704","authenticated-orcid":false,"given":"Thilina","family":"Ranbaduge","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Black Mountain, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0701-8783","authenticated-orcid":false,"given":"Kee Siong","family":"Ng","sequence":"additional","affiliation":[{"name":"School of Computing, The Australian National University, Acton, ACT, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,2,22]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1108\/02652320010315325"},{"key":"e_1_3_3_3_2","first-page":"308","volume-title":"Proceedings of the ACM Special Interest Group Conference on Security, Audit and Control (SIGSAC\u201916)","author":"Abadi Martin","year":"2016","unstructured":"Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the ACM Special Interest Group Conference on Security, Audit and Control (SIGSAC\u201916). ACM, 308\u2013318."},{"issue":"3","key":"e_1_3_3_4_2","doi-asserted-by":"crossref","first-page":"1974","DOI":"10.1109\/COMST.2016.2533668","article-title":"Privacy preserving social network data publication","volume":"18","author":"Abawajy Jemal H.","year":"2016","unstructured":"Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, and Tutut Herawan. 2016. Privacy preserving social network data publication. IEEE Commun. Surv. Tutor. 18, 3 (2016), 1974\u20131997.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"e_1_3_3_5_2","series-title":"Advances in Database Systems","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-6045-0","volume-title":"Managing and Mining Graph Data","author":"Aggarwal Charu C.","year":"2010","unstructured":"Charu C. Aggarwal and Haixun Wang (Eds.). 2010. Managing and Mining Graph Data. Advances in Database Systems, Vol. 40. Springer."},{"issue":"2","key":"e_1_3_3_6_2","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1109\/TNSE.2019.2901716","article-title":"Publishing social network graph eigenspectrum with privacy guarantees","volume":"7","author":"Ahmed Faraz","year":"2019","unstructured":"Faraz Ahmed, Alex X. Liu, and Rong Jin. 2019. Publishing social network graph eigenspectrum with privacy guarantees. IEEE Trans. Netw. Sci. Eng. 7, 2 (2019), 892\u2013906.","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"e_1_3_3_7_2","first-page":"112","article-title":"Graph modelling for tracking the COVID-19 pandemic spread","volume":"6","author":"Alguliyev Rasim","year":"2021","unstructured":"Rasim Alguliyev, Ramiz Aliguliyev, and Farhad Yusifov. 2021. Graph modelling for tracking the COVID-19 pandemic spread. Infect. Dis. Model. 6 (2021), 112\u2013122.","journal-title":"Infect. Dis. Model."},{"issue":"6","key":"e_1_3_3_8_2","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1093\/bioinformatics\/btz837","article-title":"Differential privacy under dependent tuples-the case of genomic privacy","volume":"36","author":"Almadhoun Nour","year":"2020","unstructured":"Nour Almadhoun, Erman Ayday, and \u00d6zg\u00fcr Ulusoy. 2020. Differential privacy under dependent tuples-the case of genomic privacy. Bioinformatics 36, 6 (2020), 1696\u20131703.","journal-title":"Bioinformatics"},{"key":"e_1_3_3_9_2","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/1242572.1242598","volume-title":"Proceedings of the International Conference on the World Wide Web","author":"Backstrom Lars","year":"2007","unstructured":"Lars Backstrom, Cynthia Dwork, and Jon M. Kleinberg. 2007. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the International Conference on the World Wide Web. ACM, 181\u2013190."},{"issue":"1","key":"e_1_3_3_10_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3343038","article-title":"A survey on privacy in social media: Identification, mitigation, and applications","volume":"1","author":"Beigi Ghazaleh","year":"2020","unstructured":"Ghazaleh Beigi and Huan Liu. 2020. A survey on privacy in social media: Identification, mitigation, and applications. ACM Trans. Data Sci. 1, 1 (2020), 1\u201338.","journal-title":"ACM Trans. Data Sci."},{"key":"e_1_3_3_11_2","doi-asserted-by":"crossref","first-page":"46198","DOI":"10.1109\/ACCESS.2019.2909170","article-title":"DL-Tags: DLT and smart tags for decentralized, privacy-preserving, and verifiable supply chain management","volume":"7","author":"Ben\u010di\u0107 Federico Matteo","year":"2019","unstructured":"Federico Matteo Ben\u010di\u0107, Pavle Sko\u010dir, and Ivana Podnar \u017darko. 2019. DL-Tags: DLT and smart tags for decentralized, privacy-preserving, and verifiable supply chain management. IEEE Access 7 (2019), 46198\u201346209.","journal-title":"IEEE Access"},{"key":"e_1_3_3_12_2","first-page":"410","volume-title":"Proceedings of the 53rd IEEE Symposium on Foundations of Computer Science","author":"Blocki Jeremiah","year":"2012","unstructured":"Jeremiah Blocki, Avrim Blum, Anupam Datta, and Or Sheffet. 2012. The Johnson-Lindenstrauss transform itself preserves differential privacy. In Proceedings of the 53rd IEEE Symposium on Foundations of Computer Science. IEEE, 410\u2013419."},{"key":"e_1_3_3_13_2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2422436.2422449","volume-title":"Proceedings of the Conference on Innovations in Theoretical Computer Science (ICTS\u201913)","author":"Blocki Jeremiah","year":"2013","unstructured":"Jeremiah Blocki, Avrim Blum, Anupam Datta, and Or Sheffet. 2013. Differentially private data analysis of social networks via restricted sensitivity. In Proceedings of the Conference on Innovations in Theoretical Computer Science (ICTS\u201913). ACM, 87\u201396."},{"key":"e_1_3_3_14_2","first-page":"128","volume-title":"Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS\u201905)","author":"Blum Avrim","year":"2005","unstructured":"Avrim Blum, Cynthia Dwork, Frank McSherry, and Kobbi Nissim. 2005. Practical privacy: The SulQ framework. In Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS\u201905). ACM, 128\u2013138."},{"key":"e_1_3_3_15_2","first-page":"533","volume-title":"Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS\u201918)","author":"Borgs Christian","year":"2018","unstructured":"Christian Borgs, Jennifer Chayes, Adam Smith, and Ilias Zadik. 2018. Revealing network structure, confidentially: Improved rates for node-private graphon estimation. In Proceedings of the IEEE Symposium on Foundations of Computer Science (FOCS\u201918). IEEE, 533\u2013543."},{"key":"e_1_3_3_16_2","unstructured":"Christian Borgs Jennifer T. Chayes and Adam Smith. 2015. Private graphon estimation for sparse graphs. Advances in Neural Information Processing Systems Vol. 28."},{"key":"e_1_3_3_17_2","first-page":"70","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201908)","author":"Brickell Justin","year":"2008","unstructured":"Justin Brickell and Vitaly Shmatikov. 2008. The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201908). ACM, 70\u201378."},{"key":"e_1_3_3_18_2","unstructured":"Seth Bromberger and other contributors. 2017. JuliaGraphs\/LightGraphs.jl: An Optimized Graphs Package for the Julia Programming Language Zenodo. DOI:https:\/\/doi.org\/10.5281\/zenodo.889971"},{"key":"e_1_3_3_19_2","first-page":"745","article-title":"Novel differentially private mechanisms for graphs.","volume":"2016","author":"Brunet Solenn","year":"2016","unstructured":"Solenn Brunet, S\u00e9bastien Canard, S\u00e9bastien Gambs, and Baptiste Olivier. 2016. Novel differentially private mechanisms for graphs.IACR Cryptol. ePrint Arch. 2016 (2016), 745.","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"4","key":"e_1_3_3_20_2","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s10207-019-00469-4","article-title":"DUEF-GA: Data utility and privacy evaluation framework for graph anonymization","volume":"19","author":"Casas-Roma Jordi","year":"2020","unstructured":"Jordi Casas-Roma. 2020. DUEF-GA: Data utility and privacy evaluation framework for graph anonymization. Int. J. Inf. Secur. 19, 4 (2020), 465\u2013478.","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"e_1_3_3_21_2","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/s10462-016-9484-8","article-title":"A survey of graph-modification techniques for privacy-preserving on networks","volume":"47","author":"Casas-Roma Jordi","year":"2017","unstructured":"Jordi Casas-Roma, Jordi Herrera-Joancomart\u00ed, and Vicen\u00e7 Torra. 2017. A survey of graph-modification techniques for privacy-preserving on networks. Artif. Intell. Rev. 47, 3 (2017), 341\u2013366.","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"e_1_3_3_22_2","doi-asserted-by":"crossref","first-page":"2\u2013es","DOI":"10.1145\/1132952.1132954","article-title":"Graph mining: Laws, generators, and algorithms","volume":"38","author":"Chakrabarti Deepayan","year":"2006","unstructured":"Deepayan Chakrabarti and Christos Faloutsos. 2006. Graph mining: Laws, generators, and algorithms. Comput. Surv. 38, 1 (2006), 2\u2013es.","journal-title":"Comput. Surv."},{"issue":"3","key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola Varun","year":"2009","unstructured":"Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3 (2009), 1\u201358.","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"e_1_3_3_24_2","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s00778-013-0344-8","article-title":"Correlated network data publication via differential privacy","volume":"23","author":"Chen Rui","year":"2014","unstructured":"Rui Chen, Benjamin C. M. Fung, Philip S. Yu, and Bipin C. Desai. 2014. Correlated network data publication via differential privacy. VLDB J. 23, 4 (2014), 653\u2013676.","journal-title":"VLDB J."},{"key":"e_1_3_3_25_2","first-page":"653","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201913)","author":"Chen Shixi","year":"2013","unstructured":"Shixi Chen and Shuigeng Zhou. 2013. Recursive mechanism: Towards node differential privacy and unrestricted joins. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201913). ACM, 653\u2013664."},{"key":"e_1_3_3_26_2","first-page":"1","volume-title":"ICML Workshop on Statistical Network Analysis","author":"Clauset Aaron","year":"2006","unstructured":"Aaron Clauset, Cristopher Moore, and Mark E. J. Newman. 2006. Structural inference of hierarchies in networks. In ICML Workshop on Statistical Network Analysis. Springer, 1\u201313."},{"key":"e_1_3_3_27_2","first-page":"1","volume-title":"Proceedings of the RoEduNet International Conference","author":"Costea Sergiu","year":"2013","unstructured":"Sergiu Costea, Marian Barbu, and Razvan Rughinis. 2013. Qualitative analysis of differential privacy applied over graph structures. In Proceedings of the RoEduNet International Conference. IEEE, 1\u20134."},{"key":"e_1_3_3_28_2","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1080\/01621459.1980.10477481","article-title":"Suppression methodology and statistical disclosure control","volume":"75","author":"Cox Lawrence H.","year":"1980","unstructured":"Lawrence H. Cox. 1980. Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc. 75, 370 (1980), 377\u2013385.","journal-title":"J. Am. Stat. Assoc."},{"key":"e_1_3_3_29_2","first-page":"1695","article-title":"The igraph software package for complex network research","author":"Csardi Gabor","year":"2006","unstructured":"Gabor Csardi and Tamas Nepusz. 2006. The igraph software package for complex network research. InterJournal (2006), 1695.","journal-title":"InterJournal"},{"issue":"1","key":"e_1_3_3_30_2","first-page":"35","article-title":"Practicing differential privacy in health care: A review","volume":"6","author":"Dankar Fida K.","year":"2013","unstructured":"Fida K. Dankar and Khaled El Emam. 2013. Practicing differential privacy in health care: A review. Trans. Data Priv. 6, 1 (2013), 35\u201367.","journal-title":"Trans. Data Priv."},{"key":"e_1_3_3_31_2","first-page":"123","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201916)","author":"Day Wei-Yen","year":"2016","unstructured":"Wei-Yen Day, Ninghui Li, and Min Lyu. 2016. Publishing graph degree distribution with node differential privacy. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201916). ACM, 123\u2013138."},{"key":"e_1_3_3_32_2","first-page":"63","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"35","author":"De Abir","year":"2021","unstructured":"Abir De and Soumen Chakrabarti. 2021. Differentially private link prediction with protected connections. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 35. AAAI, 63\u201371."},{"key":"e_1_3_3_33_2","first-page":"1283","volume-title":"Proceedings of the International Conference on Information and Knowledge Management (CIKM\u201918)","author":"Ding Xiaofeng","year":"2018","unstructured":"Xiaofeng Ding, Xiaodong Zhang, Zhifeng Bao, and Hai Jin. 2018. Privacy-preserving triangle counting in large graphs. In Proceedings of the International Conference on Information and Knowledge Management (CIKM\u201918). ACM, 1283\u20131292."},{"key":"e_1_3_3_34_2","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography Conference (TCC\u201906)","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference (TCC\u201906). Springer, 265\u2013284."},{"issue":"3","key":"e_1_3_3_35_2","first-page":"211","article-title":"The algorithmic foundations of differential privacy.","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy.Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211\u2013407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"issue":"12","key":"e_1_3_3_36_2","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1002\/spe.992","article-title":"A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases","volume":"40","author":"Fayyoumi Ebaa","year":"2010","unstructured":"Ebaa Fayyoumi and B. John Oommen. 2010. A survey on statistical disclosure control and micro-aggregation techniques for secure statistical databases. Softw. Pract. Exp. 40, 12 (2010), 1161\u20131188.","journal-title":"Softw. Pract. Exp."},{"key":"e_1_3_3_37_2","volume-title":"A Programming Framework for OpenDP","author":"Gaboardi Marco","year":"2020","unstructured":"Marco Gaboardi, M. Hay, and S. Vadhan. 2020. A Programming Framework for OpenDP. Technical Report. Harvard."},{"issue":"4","key":"e_1_3_3_38_2","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1109\/TCSS.2018.2877045","article-title":"Local differential privately anonymizing online social networks under HRG-based model","volume":"5","author":"Gao Tianchong","year":"2018","unstructured":"Tianchong Gao, Feng Li, Yu Chen, and XuKai Zou. 2018. Local differential privately anonymizing online social networks under HRG-based model. IEEE Trans. Comput. Soc. Syst. 5, 4 (2018), 1009\u20131020.","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"e_1_3_3_39_2","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-642-19571-6_26","volume-title":"Theory of Cryptography Conference (TCC\u201911)","author":"Gehrke Johannes","year":"2011","unstructured":"Johannes Gehrke, Edward Lui, and Rafael Pass. 2011. Towards privacy for social networks: A zero-knowledge based definition of privacy. In Theory of Cryptography Conference (TCC\u201911). Springer, 432\u2013449."},{"key":"e_1_3_3_40_2","first-page":"9:1\u20139:3","volume-title":"Proceedings of the ACM Conference on Innovations in Theoretical Computer Science","author":"Ghosh Arpita","year":"2017","unstructured":"Arpita Ghosh and Robert Kleinberg. 2017. Inferential privacy guarantees for differentially private mechanisms. In Proceedings of the ACM Conference on Innovations in Theoretical Computer Science. Dagstuhl Publishing, 9:1\u20139:3."},{"issue":"3","key":"e_1_3_3_41_2","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1080\/15427951.2012.680824","article-title":"Moment-based estimation of stochastic Kronecker graph parameters","volume":"8","author":"Gleich David F.","year":"2012","unstructured":"David F. Gleich and Art B. Owen. 2012. Moment-based estimation of stochastic Kronecker graph parameters. Internet Math. 8, 3 (2012), 232\u2013256.","journal-title":"Internet Math."},{"issue":"4","key":"e_1_3_3_42_2","first-page":"463","article-title":"Post randomisation for statistical disclosure control: Theory and implementation","volume":"14","author":"Gouweleeuw J.","year":"1998","unstructured":"J. Gouweleeuw, P. Kooiman, L. Willenborg, and P.-P. De Wolf. 1998. Post randomisation for statistical disclosure control: Theory and implementation. J. Official Stat. 14, 4 (1998), 463\u2013478.","journal-title":"J. Official Stat."},{"key":"e_1_3_3_43_2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jmsy.2018.04.015","article-title":"A graph-based cost model for supply chain reconfiguration","volume":"48","author":"Guo Weihong","year":"2018","unstructured":"Weihong Guo, Qi Tian, Zhengqian Jiang, and Hui Wang. 2018. A graph-based cost model for supply chain reconfiguration. J. Manufact. Syst. 48 (2018), 55\u201363.","journal-title":"J. Manufact. Syst."},{"key":"e_1_3_3_44_2","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/978-3-642-28914-9_19","volume-title":"Theory of Cryptography Conference (TCC\u201912)","author":"Gupta Anupam","year":"2012","unstructured":"Anupam Gupta, Aaron Roth, and Jonathan Ullman. 2012. Iterative constructions and private data release. In Theory of Cryptography Conference (TCC\u201912). Springer, 339\u2013356."},{"key":"e_1_3_3_45_2","first-page":"623","volume-title":"Proceedings of the IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA\u201918)","author":"Misheva Branka Hadji","year":"2018","unstructured":"Branka Hadji Misheva, Paolo Giudici, and Valentino Pediroda. 2018. Network-based models to improve credit scoring accuracy. In Proceedings of the IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA\u201918). IEEE, 623\u2013630. DOI:https:\/\/doi.org\/10.1109\/DSAA.2018.00080"},{"key":"e_1_3_3_46_2","first-page":"11","volume-title":"Python in Science Conference","author":"Hagberg Aric A.","year":"2008","unstructured":"Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. 2008. Exploring network structure, dynamics, and function using NetworkX. In Python in Science Conference. SciPy.org, 11\u201315."},{"issue":"3","key":"e_1_3_3_47_2","first-page":"52","article-title":"Representation learning on graphs: Methods and applications","volume":"40","author":"Hamilton William L.","year":"2017","unstructured":"William L. Hamilton, Rex Ying, and Jure Leskovec. 2017. Representation learning on graphs: Methods and applications. IEEE Data Eng. Bull. 40, 3 (2017), 52\u201374.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_3_48_2","first-page":"1255","volume-title":"Proceedings of the ACM Symposium on Theory of Computing (STOC\u201912)","author":"Hardt Moritz","year":"2012","unstructured":"Moritz Hardt and Aaron Roth. 2012. Beating randomized response on incoherent matrices. In Proceedings of the ACM Symposium on Theory of Computing (STOC\u201912). ACM, 1255\u20131268."},{"key":"e_1_3_3_49_2","first-page":"61","volume-title":"Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science","author":"Hardt Moritz","year":"2010","unstructured":"Moritz Hardt and Guy N. Rothblum. 2010. A multiplicative weights mechanism for privacy-preserving data analysis. In Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society, 61\u201370."},{"key":"e_1_3_3_50_2","first-page":"169","volume-title":"Proceedings of the IEEE International Conference on Data Mining (ICDM\u201909)","author":"Hay Michael","year":"2009","unstructured":"Michael Hay, Chao Li, Gerome Miklau, and David Jensen. 2009. Accurate estimation of the degree distribution of private networks. In Proceedings of the IEEE International Conference on Data Mining (ICDM\u201909). IEEE, 169\u2013178."},{"key":"e_1_3_3_51_2","first-page":"2669","volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security\u201921)","author":"He Xinlei","year":"2021","unstructured":"Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, and Yang Zhang. 2021. Stealing links from graph neural networks. In Proceedings of the USENIX Security Symposium (USENIX Security\u201921). USENIX Association, 2669\u20132686."},{"key":"e_1_3_3_52_2","first-page":"1447","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201914)","author":"He Xi","year":"2014","unstructured":"Xi He, Ashwin Machanavajjhala, and Bolin Ding. 2014. Blowfish privacy: Tuning privacy-utility trade-offs using policies. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201914). ACM, 1447\u20131458."},{"issue":"2","key":"e_1_3_3_53_2","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1198\/jcgs.2009.07177","article-title":"Simulation of the matrix Bingham\u2013von Mises\u2013Fisher distribution, with applications to multivariate and relational data","volume":"18","author":"Hoff Peter D.","year":"2009","unstructured":"Peter D. Hoff. 2009. Simulation of the matrix Bingham\u2013von Mises\u2013Fisher distribution, with applications to multivariate and relational data. J. Comput. Graph. Stat. 18, 2 (2009), 438\u2013456.","journal-title":"J. Comput. Graph. Stat."},{"key":"e_1_3_3_54_2","unstructured":"Naoise Holohan Stefano Braghin P\u00f3l Mac Aonghusa and Killian Levacher. 2019. Diffprivlib: The IBM Differential Privacy Library. arxiv:1907.02444 [cs.CR]. Retrieved from https:\/\/arxiv.org\/abs\/1907.02444."},{"key":"e_1_3_3_55_2","first-page":"19","volume-title":"Int. J. Inf. Syst. Supply Chain Manage","author":"Hong Young-Chae","year":"2022","unstructured":"Young-Chae Hong and Jing Chen. 2022. Graph database to enhance supply chain resilience for industry 4.0. Int. J. Inf. Syst. Supply Chain Manage 15, 19 (2022)."},{"key":"e_1_3_3_56_2","doi-asserted-by":"crossref","DOI":"10.1002\/9781118348239","volume-title":"Statistical Disclosure Control","author":"Hundepool Anco","year":"2012","unstructured":"Anco Hundepool, Josep Domingo-Ferrer, Luisa Franconi, Sarah Giessing, Eric Schulte Nordholt, Keith Spicer, and Peter-Paul de Wolf. 2012. Statistical Disclosure Control. Wiley."},{"key":"e_1_3_3_57_2","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-030-47436-2_15","volume-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD\u201920)","author":"Iftikhar Masooma","year":"2020","unstructured":"Masooma Iftikhar, Qing Wang, and Yu Lin. 2020. dK-Microaggregation: Anonymizing graphs with differential privacy guarantees. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD\u201920). Springer, 191\u2013203."},{"key":"e_1_3_3_58_2","article-title":"Privacy-preserving graph convolutional networks for text classification","author":"Igamberdiev Timour","year":"2021","unstructured":"Timour Igamberdiev and Ivan Habernal. 2021. Privacy-preserving graph convolutional networks for text classification. arXiv:2102.09604. Retrieved from https:\/\/arxiv.org\/abs\/2102.09604.","journal-title":"arXiv:2102.09604"},{"issue":"8","key":"e_1_3_3_59_2","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2018.3191268","article-title":"User data privacy: Facebook, Cambridge Analytica, and privacy protection","volume":"51","author":"Isaak Jim","year":"2018","unstructured":"Jim Isaak and Mina J. Hanna. 2018. User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer 51, 8 (2018), 56\u201359.","journal-title":"Computer"},{"issue":"10","key":"e_1_3_3_60_2","first-page":"2","article-title":"Gaydar: Facebook friendships expose sexual orientation","volume":"14","author":"Jernigan Carter","year":"2009","unstructured":"Carter Jernigan and Behram F. T. Mistree. 2009. Gaydar: Facebook friendships expose sexual orientation. First Monday 14, 10 (September2009), 2.","journal-title":"First Monday"},{"issue":"2","key":"e_1_3_3_61_2","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1109\/COMST.2016.2633620","article-title":"Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey","volume":"19","author":"Ji Shouling","year":"2017","unstructured":"Shouling Ji, Prateek Mittal, and Raheem Beyah. 2017. Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey. IEEE Commun. Surv. Tutor. 19, 2 (2017), 1305\u20131326.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"e_1_3_3_62_2","first-page":"16","volume-title":"Proceedings of the Asian Conference on Machine Learning (ACML\u201919)","author":"Ji Tianxi","year":"2019","unstructured":"Tianxi Ji, Changqing Luo, Yifan Guo, Jinlong Ji, Weixian Liao, and Pan Li. 2019. Differentially private community detection in attributed social networks. In Proceedings of the Asian Conference on Machine Learning (ACML\u201919). PMLR, 16\u201331."},{"key":"e_1_3_3_63_2","unstructured":"Honglu Jiang Jian Pei Dongxiao Yu Jiguo Yu Bei Gong and Xiuzhen Cheng. 2020. Applications of differential privacy in social network analysis: A survey. arxiv:2010.02973 [cs.SI]. Retrieved from https:\/\/arxiv.org\/abs\/2010.02973."},{"key":"e_1_3_3_64_2","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1090\/conm\/026\/737400","article-title":"Extensions of Lipschitz maps into a Hilbert space","volume":"26","author":"Johnson William B.","year":"1984","unstructured":"William B. Johnson and Joram Lindenstrauss. 1984. Extensions of Lipschitz maps into a Hilbert space. Contemp. Math. 26 (1984), 189\u2013206.","journal-title":"Contemp. Math."},{"key":"e_1_3_3_65_2","first-page":"107","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201916)","author":"Jorgensen Zach","year":"2016","unstructured":"Zach Jorgensen, Ting Yu, and Graham Cormode. 2016. Publishing attributed social graphs with formal privacy guarantees. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201916). ACM, 107\u2013122."},{"key":"e_1_3_3_66_2","first-page":"1395","volume-title":"Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA\u201913)","author":"Kapralov Michael","year":"2013","unstructured":"Michael Kapralov and Kunal Talwar. 2013. On differentially private low rank approximation. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA\u201913), Sanjeev Khanna (Ed.). SIAM, 1395\u20131414."},{"issue":"11","key":"e_1_3_3_67_2","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.14778\/3402707.3402749","article-title":"Private analysis of graph structure","volume":"4","author":"Karwa Vishesh","year":"2011","unstructured":"Vishesh Karwa, Sofya Raskhodnikova, Adam Smith, and Grigory Yaroslavtsev. 2011. Private analysis of graph structure. VLDB Endow. 4, 11 (2011), 1146\u20131157.","journal-title":"VLDB Endow."},{"key":"e_1_3_3_68_2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/978-3-642-33627-0_21","volume-title":"International Conference on Privacy in Statistical Databases (PSD\u201912)","author":"Karwa Vishesh","year":"2012","unstructured":"Vishesh Karwa and Aleksandra B. Slavkovi\u0107. 2012. Differentially private graphical degree sequences and synthetic graphs. In International Conference on Privacy in Statistical Databases (PSD\u201912). Springer, 273\u2013285."},{"issue":"3","key":"e_1_3_3_69_2","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1137\/090756090","article-title":"What can we learn privately?","volume":"40","author":"Kasiviswanathan Shiva Prasad","year":"2011","unstructured":"Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2011. What can we learn privately?SIAM J. Comput. 40, 3 (2011), 793\u2013826.","journal-title":"SIAM J. Comput."},{"key":"e_1_3_3_70_2","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/978-3-642-36594-2_26","volume-title":"Theory of Cryptography Conference (TCC\u201913)","author":"Kasiviswanathan Shiva Prasad","year":"2013","unstructured":"Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2013. Analyzing graphs with node differential privacy. In Theory of Cryptography Conference (TCC\u201913). Springer, 457\u2013476."},{"issue":"1","key":"e_1_3_3_71_2","first-page":"1","article-title":"On the \u2018semantics\u2019 of differential privacy: A bayesian formulation","volume":"6","author":"Kasiviswanathan Shiva P.","year":"2014","unstructured":"Shiva P. Kasiviswanathan and Adam Smith. 2014. On the \u2018semantics\u2019 of differential privacy: A bayesian formulation. J. Priv. Confident. 6, 1 (2014), 1\u201316.","journal-title":"J. Priv. Confident."},{"issue":"4","key":"e_1_3_3_72_2","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1073\/pnas.1510612113","article-title":"Private algorithms for the protected in social network search","volume":"113","author":"Kearns Michael","year":"2016","unstructured":"Michael Kearns, Aaron Roth, Zhiwei Steven Wu, and Grigory Yaroslavtsev. 2016. Private algorithms for the protected in social network search. Proc. Natl. Acad. Sci. U.S.A. 113, 4 (2016), 913\u2013918.","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"e_1_3_3_73_2","first-page":"193","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201911)","author":"Kifer Daniel","year":"2011","unstructured":"Daniel Kifer and Ashwin Machanavajjhala. 2011. No free lunch in data privacy. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201911). ACM, 193\u2013204."},{"key":"e_1_3_3_74_2","first-page":"77","volume-title":"Proceedings of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS\u201912)","author":"Kifer Daniel","year":"2012","unstructured":"Daniel Kifer and Ashwin Machanavajjhala. 2012. A rigorous and customizable framework for privacy. In Proceedings of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS\u201912). ACM, 77\u201388."},{"issue":"1","key":"e_1_3_3_75_2","first-page":"3:1\u20133:36","article-title":"Pufferfish: A framework for mathematical privacy definitions","volume":"39","author":"Kifer Daniel","year":"2014","unstructured":"Daniel Kifer and Ashwin Machanavajjhala. 2014. Pufferfish: A framework for mathematical privacy definitions. ACM Trans. Database Syst. 39, 1 (2014), 3:1\u20133:36.","journal-title":"ACM Trans. Database Syst."},{"issue":"11","key":"e_1_3_3_76_2","first-page":"1","article-title":"Privacy-preserving aggregation of personal health data streams","volume":"13","author":"Kim Jong Wook","year":"2018","unstructured":"Jong Wook Kim, Beakcheol Jang, and Hoon Yoo. 2018. Privacy-preserving aggregation of personal health data streams. PLoS One 13, 11 (2018), 1\u201315.","journal-title":"PLoS One"},{"key":"e_1_3_3_77_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Kingma Diederik P.","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In Proceedings of the International Conference on Learning Representations, Yoshua Bengio and Yann LeCun (Eds.). ICLR, 13."},{"key":"e_1_3_3_78_2","first-page":"1","article-title":"A review on privacy preservation of social networks using graphs","volume":"16","author":"Kiranmayi M.","year":"2020","unstructured":"M. Kiranmayi and N. Maheswari. 2020. A review on privacy preservation of social networks using graphs. J. Appl. Secur. Res. 16 (2020), 1\u201334.","journal-title":"J. Appl. Secur. Res."},{"key":"e_1_3_3_79_2","first-page":"289","volume-title":"J. Inf. Knowl. Manage","author":"Korolova Aleksandra","year":"2008","unstructured":"Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar, and Ying Xu. 2008. Link privacy in social networks. In J. Inf. Knowl. Manage. ACM, 289\u2013298."},{"key":"e_1_3_3_80_2","first-page":"126546","article-title":"Analysis of centrality measures under differential privacy models","volume":"412","author":"Laeuchli Jesse","year":"2022","unstructured":"Jesse Laeuchli, Yunior Ram\u00edrez-Cruz, and Rolando Trujillo-Rasua. 2022. Analysis of centrality measures under differential privacy models. Appl. Math. Comput. 412 (2022), 126546.","journal-title":"Appl. Math. Comput."},{"key":"e_1_3_3_81_2","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1145\/1273496.1273559","volume-title":"Proceedings of the 24th Annual International Conference on Machine Learning (ICML\u201907)","author":"Leskovec Jure","year":"2007","unstructured":"Jure Leskovec and Christos Faloutsos. 2007. Scalable modeling of real graphs using Kronecker multiplication. In Proceedings of the 24th Annual International Conference on Machine Learning (ICML\u201907). ACM, 497\u2013504."},{"issue":"1","key":"e_1_3_3_82_2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1217299.1217301","article-title":"Graph evolution: Densification and shrinking diameters","volume":"1","author":"Leskovec Jure","year":"2007","unstructured":"Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. 2007. Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1, 1 (2007), 2.","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"e_1_3_3_83_2","first-page":"420","volume-title":"Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD\u201907)","author":"Leskovec Jure","year":"2007","unstructured":"Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD\u201907). ACM, 420\u2013429."},{"key":"e_1_3_3_84_2","article-title":"SNAP Datasets: Stanford Large Network Dataset Collection","author":"Leskovec Jure","year":"2014","unstructured":"Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. Retrieved from http:\/\/snap.stanford.edu\/data.","journal-title":"http:\/\/snap.stanford.edu\/data."},{"issue":"4","key":"e_1_3_3_85_2","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.socnet.2008.07.002","article-title":"Tastes, ties, and time: A new social network dataset using Facebook.com","volume":"30","author":"Lewis Kevin","year":"2008","unstructured":"Kevin Lewis, Jason Kaufman, Marco Gonzalez, Andreas Wimmer, and Nicholas Christakis. 2008. Tastes, ties, and time: A new social network dataset using Facebook.com. Soc. Netw. 30, 4 (2008), 330\u2013342.","journal-title":"Soc. Netw."},{"key":"e_1_3_3_86_2","first-page":"517","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201909)","author":"Li Tiancheng","year":"2009","unstructured":"Tiancheng Li and Ninghui Li. 2009. On the tradeoff between privacy and utility in data publishing. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201909). ACM, 517\u2013526."},{"key":"e_1_3_3_87_2","article-title":"Differential privacy for edge weights in social networks","volume":"2017","author":"Li Xiaoye","year":"2017","unstructured":"Xiaoye Li, Jing Yang, Zhenlong Sun, and Jianpei Zhang. 2017. Differential privacy for edge weights in social networks. Secur. Commun. Netw. 2017 (2017), 10.","journal-title":"Secur. Commun. Netw."},{"key":"e_1_3_3_88_2","first-page":"21","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Liu Changchang","year":"2016","unstructured":"Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. 2016. Dependence makes you vulnerable: Differential privacy under dependent tuples. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society, 21\u201324."},{"key":"e_1_3_3_89_2","first-page":"93","volume-title":"Proceedings of the International Conference on Management of Data","author":"Liu Kun","year":"2008","unstructured":"Kun Liu and Evimaria Terzi. 2008. Towards identity anonymization on graphs. In Proceedings of the International Conference on Management of Data, Jason Tsong-Li Wang (Ed.). ACM, 93\u2013106."},{"key":"e_1_3_3_90_2","first-page":"921","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201914)","author":"Lu Wentian","year":"2014","unstructured":"Wentian Lu and Gerome Miklau. 2014. Exponential random graph estimation under differential privacy. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201914). ACM, 921\u2013930."},{"issue":"1","key":"e_1_3_3_91_2","doi-asserted-by":"crossref","first-page":"3\u2013es","DOI":"10.1145\/1217299.1217302","article-title":"l-diversity: Privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala Ashwin","year":"2007","unstructured":"Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. 2007. l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1, 1 (2007), 3\u2013es.","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"4","key":"e_1_3_3_92_2","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/1151659.1159930","article-title":"Systematic topology analysis and generation using degree correlations","volume":"36","author":"Mahadevan Priya","year":"2006","unstructured":"Priya Mahadevan, Dmitri Krioukov, Kevin Fall, and Amin Vahdat. 2006. Systematic topology analysis and generation using degree correlations. ACM SIGCOMM Comput. Commun. Rev. 36, 4 (2006), 135\u2013146.","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"e_1_3_3_93_2","doi-asserted-by":"crossref","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","article-title":"Anonymization techniques for privacy preserving data publishing: A comprehensive survey","volume":"9","author":"Majeed Abdul","year":"2021","unstructured":"Abdul Majeed and Sungchang Lee. 2021. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access 9 (2021), 8512\u20138545. DOI:https:\/\/doi.org\/10.1109\/ACCESS.2020.3045700","journal-title":"IEEE Access"},{"key":"e_1_3_3_94_2","volume-title":"Graph Analytics Market by Component, Deployment Mode, Organization Size, Application, Vertical, and Region\u2014Global Forecast to 2024","year":"2019","unstructured":"Markets and Markets. 2019. Graph Analytics Market by Component, Deployment Mode, Organization Size, Application, Vertical, and Region\u2014Global Forecast to 2024. Markets and Markets Research Private Ltd."},{"key":"e_1_3_3_95_2","first-page":"94","volume-title":"Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907)","author":"McSherry Frank","year":"2007","unstructured":"Frank McSherry and Kunal Talwar. 2007. Mechanism design via differential privacy. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907). IEEE, IEEE, 94\u2013103."},{"key":"e_1_3_3_96_2","first-page":"19","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201909)","author":"McSherry Frank D.","year":"2009","unstructured":"Frank D. McSherry. 2009. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201909). ACM, 19\u201330."},{"key":"e_1_3_3_97_2","first-page":"167","volume-title":"Proceedings of the EDBT\/ICDT Workshops","author":"Mir Darakhshan J.","year":"2012","unstructured":"Darakhshan J. Mir and Rebecca N. Wright. 2012. A differentially private estimator for the stochastic Kronecker graph model. In Proceedings of the EDBT\/ICDT Workshops, Divesh Srivastava and Ismail Ari (Eds.). ACM, 167\u2013176."},{"key":"e_1_3_3_98_2","first-page":"650","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201912)","author":"Mironov Ilya","year":"2012","unstructured":"Ilya Mironov. 2012. On significance of the least significant bits for differential privacy. In Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201912). ACM, 650\u2013661. DOI:https:\/\/doi.org\/10.1145\/2382196.2382264"},{"key":"e_1_3_3_99_2","first-page":"349","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201912)","author":"Mohan Prashanth","year":"2012","unstructured":"Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, Dawn Song, and David Culler. 2012. GUPT: Privacy preserving data analysis made easy. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201912). ACM, 349\u2013360."},{"key":"e_1_3_3_100_2","article-title":"Differentially private graph classification with GNNs","author":"Mueller Tamara T.","year":"2022","unstructured":"Tamara T. Mueller, Johannes C. Paetzold, Chinmay Prabhakar, Dmitrii Usynin, Daniel Rueckert, and Georgios Kaissis. 2022. Differentially private graph classification with GNNs. arXiv:2202.02575. Retrieved from https:\/\/arxiv.org\/abs\/2202.02575.","journal-title":"arXiv:2202.02575"},{"key":"e_1_3_3_101_2","first-page":"247","volume-title":"Proceedings of the EDBT\/ICDT Workshops","author":"M\u00fclle Yvonne","year":"2015","unstructured":"Yvonne M\u00fclle, Chris Clifton, and Klemens B\u00f6hm. 2015. Privacy-integrated graph clustering through differential privacy. In Proceedings of the EDBT\/ICDT Workshops. ACM, 247\u2013254."},{"key":"e_1_3_3_102_2","first-page":"173","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Narayanan Arvind","year":"2009","unstructured":"Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing social networks. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 173\u2013187."},{"key":"e_1_3_3_103_2","unstructured":"Neo4J. 2019. Case Study: Transparency-One Offers Total Supply Chain Transparency to Large Retailers and Manufacturers with Neo4j. Retrieved from https:\/\/neo4j.com\/case-studies\/transparency-one\/."},{"key":"e_1_3_3_104_2","first-page":"596","volume-title":"Proceedings of the International Conference on Advances in Social Networks Analysis and Mining","author":"Nguyen Hiep H.","year":"2015","unstructured":"Hiep H. Nguyen, Abdessamad Imine, and Micha\u00ebl Rusinowitch. 2015. Differentially private publication of social graphs at linear cost. In Proceedings of the International Conference on Advances in Social Networks Analysis and Mining. IEEE, 596\u2013599."},{"key":"e_1_3_3_105_2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/2994620.2994624","volume-title":"Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES\u201916)","author":"Nguyen Hiep H.","year":"2016","unstructured":"Hiep H. Nguyen, Abdessamad Imine, and Micha\u00ebl Rusinowitch. 2016. Detecting communities under differential privacy. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES\u201916). ACM, 83\u201393."},{"key":"e_1_3_3_106_2","volume-title":"Workshop Theory and Practice of Differential Privacy, ICML","author":"Ning Huiyi","year":"2021","unstructured":"Huiyi Ning, Sreeharsha Udayashankar, and Sara Qunaibi Karl Knopf Xi He. 2021. Benchmarking differentially private graph algorithms. In Workshop Theory and Practice of Differential Privacy, ICML. JPC, 5."},{"key":"e_1_3_3_107_2","first-page":"255","volume-title":"Proceedings of the IEEE International Congress on Big Data","author":"Nisar M Usman","year":"2013","unstructured":"M Usman Nisar, Arash Fard, and John A. Miller. 2013. Techniques for graph analytics on big data. In Proceedings of the IEEE International Congress on Big Data. IEEE, 255\u2013262."},{"key":"e_1_3_3_108_2","first-page":"75","volume-title":"Proceedings of the 39th ACM Symposium on Theory of Computing (STOC\u201907)","author":"Nissim Kobbi","year":"2007","unstructured":"Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2007. Smooth sensitivity and sampling in private data analysis. In Proceedings of the 39th ACM Symposium on Theory of Computing (STOC\u201907). ACM, 75\u201384."},{"issue":"2","key":"e_1_3_3_109_2","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/09537287.2020.1810764","article-title":"Big data supply chain analytics: Ethical, privacy and security challenges posed to business, industries and society","volume":"33","author":"Ogbuke Nnamdi Johnson","year":"2022","unstructured":"Nnamdi Johnson Ogbuke, Yahaya Y. Yusuf, Kovvuri Dharma, and Burcu A. Mercangoz. 2022. Big data supply chain analytics: Ethical, privacy and security challenges posed to business, industries and society. Prod. Plan. Contr. 33, 2-3 (2022), 123\u2013137.","journal-title":"Prod. Plan. Contr."},{"key":"e_1_3_3_110_2","article-title":"Releasing graph neural networks with differential privacy guarantees","author":"Olatunji Iyiola E.","year":"2021","unstructured":"Iyiola E. Olatunji, Thorben Funke, and Megha Khosla. 2021. Releasing graph neural networks with differential privacy guarantees. arXiv:2109.08907. Retrieved from https:\/\/arxiv.org\/abs\/2109.08907.","journal-title":"arXiv:2109.08907"},{"key":"e_1_3_3_111_2","first-page":"1043","volume-title":"Proceedings of the IEEE International Conference on Big Data","author":"Palanisamy Balaji","year":"2017","unstructured":"Balaji Palanisamy, Chao Li, and Prashant Krishnamurthy. 2017. Group privacy-aware disclosure of association graph data. In Proceedings of the IEEE International Conference on Big Data. IEEE, 1043\u20131052."},{"key":"e_1_3_3_112_2","volume-title":"Proceedings of the International Conference on Learning Representations","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Mart\u00edn Abadi, Ulfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised knowledge transfer for deep learning from private training data. In Proceedings of the International Conference on Learning Representations. ICLR, 16."},{"key":"e_1_3_3_113_2","unstructured":"Tiago P. Peixoto. 2014. The graph-tool python library. Figshare . http:\/\/figshare.com\/articles\/graph_tool\/1164194."},{"key":"e_1_3_3_114_2","first-page":"831","volume-title":"Proceedings of the International World Wide Web Conference (WWW\u201914)","author":"III Joseph J. Pfeiffer","year":"2014","unstructured":"Joseph J. Pfeiffer III, Sebastian Moreno, Timothy La Fond, Jennifer Neville, and Brian Gallagher. 2014. Attributed graph models: Modeling network structure with correlated attributes. In Proceedings of the International World Wide Web Conference (WWW\u201914). ACM, 831\u2013842."},{"key":"e_1_3_3_115_2","unstructured":"Stephen R. Pfohl Andrew M. Dai and Katherine Heller. 2019. Federated and differentially private learning for electronic health records. arXiv preprint arXiv:1911.05861 ."},{"key":"e_1_3_3_116_2","first-page":"329","volume-title":"Proceedings of the 34th Conference on Uncertainty in Artificial Intelligence","author":"Pinot Rafael","year":"2018","unstructured":"Rafael Pinot, Anne Morvan, Florian Yger, Cedric Gouy-Pailler, and Jamal Atif. 2018. Graph-based clustering under differential privacy. In Proceedings of the 34th Conference on Uncertainty in Artificial Intelligence. HAL Archives, 329\u2013338."},{"key":"e_1_3_3_117_2","first-page":"113","article-title":"Fraud detection: A systematic literature review of graph-based anomaly detection approaches","volume":"133","author":"Pourhabibi Tahereh","year":"2020","unstructured":"Tahereh Pourhabibi, Kok-Leong Ong, Booi H. Kam, and Yee Ling Boo. 2020. Fraud detection: A systematic literature review of graph-based anomaly detection approaches. Decis. Supp. Syst. 133 (2020), 113\u2013303.","journal-title":"Decis. Supp. Syst."},{"key":"e_1_3_3_118_2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2342549.2342553","volume-title":"Proceedings of the ACM Workshop on Online Social Networks (WOSN\u201912)","author":"Proserpio Davide","year":"2012","unstructured":"Davide Proserpio, Sharon Goldberg, and Frank McSherry. 2012. A workflow for differentially-private graph synthesis. In Proceedings of the ACM Workshop on Online Social Networks (WOSN\u201912). ACM, 13\u201318."},{"issue":"8","key":"e_1_3_3_119_2","doi-asserted-by":"crossref","first-page":"637","DOI":"10.14778\/2732296.2732300","article-title":"Calibrating data to sensitivity in private data analysis: A platform for differentially-private analysis of weighted datasets","volume":"7","author":"Proserpio Davide","year":"2014","unstructured":"Davide Proserpio, Sharon Goldberg, and Frank McSherry. 2014. Calibrating data to sensitivity in private data analysis: A platform for differentially-private analysis of weighted datasets. VLDB Endow. 7, 8 (2014), 637\u2013648.","journal-title":"VLDB Endow."},{"key":"e_1_3_3_120_2","first-page":"425","volume-title":"Proceedings of the SIGSAC Conference on Computer and Communications Security","author":"Qin Zhan","year":"2017","unstructured":"Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, and Kui Ren. 2017. Generating synthetic decentralized social graphs with local differential privacy. In Proceedings of the SIGSAC Conference on Computer and Communications Security. ACM, 425\u2013438."},{"key":"e_1_3_3_121_2","first-page":"495","volume-title":"Proceedings of the 57th Annual IEEE Symposium on Foundations of Computer Science","author":"Raskhodnikova Sofya","year":"2016","unstructured":"Sofya Raskhodnikova and Adam Smith. 2016. Lipschitz extensions for node-private graph statistics and the generalized exponential mechanism. In Proceedings of the 57th Annual IEEE Symposium on Foundations of Computer Science. IEEE, 495\u2013504."},{"key":"e_1_3_3_122_2","first-page":"107","volume-title":"Proceedings of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems","author":"Rastogi Vibhor","year":"2009","unstructured":"Vibhor Rastogi, Michael Hay, Gerome Miklau, and Dan Suciu. 2009. Relationship privacy: Output perturbation for queries with joins. In Proceedings of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM, 107\u2013116."},{"key":"e_1_3_3_123_2","unstructured":"Philip Rathle. 2019. Driving Innovation in Retail with Graph Technology. Retrieved from https:\/\/neo4j.com\/whitepapers\/retailers-graph-technology-neo4j\/."},{"key":"e_1_3_3_124_2","first-page":"88","volume-title":"Proceedings of the International Conference on Digital Information Management (ICDIM\u201912)","author":"Rehman Saif Ur","year":"2012","unstructured":"Saif Ur Rehman, Asmat Ullah Khan, and Simon Fong. 2012. Graph mining: A survey of graph mining techniques. In Proceedings of the International Conference on Digital Information Management (ICDIM\u201912). IEEE, 88\u201392."},{"key":"e_1_3_3_125_2","volume-title":"Graph Analytics Market by Component, Deployment, Industry Size, Application, End User - Global Forecast to 2027","author":"Research Meticulous","year":"2020","unstructured":"Meticulous Research. 2020. Graph Analytics Market by Component, Deployment, Industry Size, Application, End User - Global Forecast to 2027. Meticulous Market Research Pvt. Ltd."},{"key":"e_1_3_3_126_2","first-page":"2233","volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201919)","author":"Roohi Leyla","year":"2019","unstructured":"Leyla Roohi, Benjamin I. P. Rubinstein, and Vanessa Teague. 2019. Differentially-private two-party egocentric betweenness centrality. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201919). IEEE, 2233\u20132241."},{"key":"e_1_3_3_127_2","first-page":"765","volume-title":"Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC\u201910)","author":"Roth Aaron","year":"2010","unstructured":"Aaron Roth and Tim Roughgarden. 2010. Interactive privacy via the median mechanism. In Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC\u201910), Leonard J. Schulman (Ed.). ACM, 765\u2013774."},{"key":"e_1_3_3_128_2","doi-asserted-by":"crossref","unstructured":"Benjamin I. P. Rubinstein and Francesco Ald\u00e0. 2017. Pain-Free Random Differential Privacy with Sensitivity Sampling. arxiv:1706.02562 [cs.LG]. Retrieved from https:\/\/arxiv.org\/abs\/1706.02562.","DOI":"10.32614\/CRAN.package.diffpriv"},{"key":"e_1_3_3_129_2","doi-asserted-by":"crossref","first-page":"2130","DOI":"10.1145\/3460120.3484565","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (SIGSAC\u201921)","author":"Sajadmanesh Sina","year":"2021","unstructured":"Sina Sajadmanesh and Daniel Gatica-Perez. 2021. Locally private graph neural networks. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (SIGSAC\u201921). ACM, 2130\u20132145."},{"key":"e_1_3_3_130_2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/2068816.2068825","volume-title":"Proceedings of the ACM Conference on Internet Measurement Conference (IMC\u201911)","author":"Sala Alessandra","year":"2011","unstructured":"Alessandra Sala, Xiaohan Zhao, Christo Wilson, Haitao Zheng, and Ben Y. Zhao. 2011. Sharing graphs using differentially private graph models. In Proceedings of the ACM Conference on Internet Measurement Conference (IMC\u201911). ACM, 81\u201398."},{"issue":"6","key":"e_1_3_3_131_2","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","article-title":"Protecting respondents identities in microdata release","volume":"13","author":"Samarati Pierangela","year":"2001","unstructured":"Pierangela Samarati. 2001. Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13, 6 (2001), 1010\u20131027.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"e_1_3_3_132_2","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1109\/TSMC.1983.6313167","article-title":"A distance measure between attributed relational graphs for pattern recognition","volume":"13","author":"Sanfeliu Alberto","year":"1983","unstructured":"Alberto Sanfeliu and King-Sun Fu. 1983. A distance measure between attributed relational graphs for pattern recognition. IEEE Trans. Syst. Man Cybernet. 13, 3 (1983), 353\u2013363.","journal-title":"IEEE Trans. Syst. Man Cybernet."},{"issue":"6","key":"e_1_3_3_133_2","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/TIFS.2013.2253320","article-title":"Utility-privacy tradeoffs in databases: An information-theoretic approach","volume":"8","author":"Sankar Lalitha","year":"2013","unstructured":"Lalitha Sankar, S. Raj Rajagopalan, and H. Vincent Poor. 2013. Utility-privacy tradeoffs in databases: An information-theoretic approach. IEEE Trans. Inf. Forens. Secur. 8, 6 (2013), 838\u2013852.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"3","key":"e_1_3_3_134_2","first-page":"1","article-title":"How social network analysis can be used to monitor online collaborative learning and guide an informed intervention","volume":"13","author":"Saqr Mohammed","year":"2018","unstructured":"Mohammed Saqr, Uno Fors, Matti Tedre, and Jalal Nouri. 2018. How social network analysis can be used to monitor online collaborative learning and guide an informed intervention. PLoS One 13, 3 (032018), 1\u201322. DOI:https:\/\/doi.org\/10.1371\/journal.pone.0194777","journal-title":"PLoS One"},{"key":"e_1_3_3_135_2","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.comnet.2018.11.019","article-title":"Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions","volume":"148","author":"Sarfraz Umair","year":"2019","unstructured":"Umair Sarfraz, Masoom Alam, Sherali Zeadally, and Abid Khan. 2019. Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Comput. Netw. 148 (2019), 361\u2013372.","journal-title":"Comput. Netw."},{"key":"e_1_3_3_136_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/2902251.2902291","volume-title":"Proceedings of the ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS\u201916)","author":"Sealfon Adam","year":"2016","unstructured":"Adam Sealfon. 2016. Shortest paths and distances with differential privacy. In Proceedings of the ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS\u201916). ACM, 29\u201341."},{"key":"e_1_3_3_137_2","article-title":"Efficiently estimating erdos-renyi graphs with node differential privacy","volume":"11","author":"Sealfon Adam","year":"2021","unstructured":"Adam Sealfon and Jonathan Ullman. 2021. Efficiently estimating erdos-renyi graphs with node differential privacy. J. Priv. Confident. 11 (February2021), 14. DOI:https:\/\/doi.org\/10.29012\/jpc.745","journal-title":"J. Priv. Confident."},{"issue":"2","key":"e_1_3_3_138_2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MIC.2018.112102519","article-title":"Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems","volume":"22","author":"Sharma Sagar","year":"2018","unstructured":"Sagar Sharma, Keke Chen, and Amit Sheth. 2018. Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Comput. 22, 2 (2018), 42\u201351.","journal-title":"IEEE Internet Comput."},{"key":"e_1_3_3_139_2","first-page":"545","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201913)","author":"Shen Entong","year":"2013","unstructured":"Entong Shen and Ting Yu. 2013. Mining frequent graph patterns with differential privacy. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201913). ACM, 545\u2013553."},{"key":"e_1_3_3_140_2","article-title":"Differentially private continual release of graph statistics","author":"Song Shuang","year":"2018","unstructured":"Shuang Song, Susan Little, Sanjay Mehta, Staal Vinterbo, and Kamalika Chaudhuri. 2018. Differentially private continual release of graph statistics. arXiv:1809.02575. Retrieved from https:\/\/arxiv.org\/abs\/1809.02575.","journal-title":"arXiv:1809.02575"},{"key":"e_1_3_3_141_2","first-page":"1291","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201917)","author":"Song Shuang","year":"2017","unstructured":"Shuang Song, Yizhen Wang, and Kamalika Chaudhuri. 2017. Pufferfish privacy mechanisms for correlated data. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201917). ACM, 1291\u20131306."},{"key":"e_1_3_3_142_2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.cie.2014.04.019","article-title":"Measuring supply chain resilience using a deterministic modeling approach","volume":"74","author":"Soni Umang","year":"2014","unstructured":"Umang Soni, Vipul Jain, and Sameer Kumar. 2014. Measuring supply chain resilience using a deterministic modeling approach. Comput. Industr. Eng. 74 (2014), 11\u201325.","journal-title":"Comput. Industr. Eng."},{"key":"e_1_3_3_143_2","volume-title":"Causation, Prediction, and Search","author":"Spirtes Peter","year":"2000","unstructured":"Peter Spirtes, Clark N. Glymour, Richard Scheines, and David Heckerman. 2000. Causation, Prediction, and Search. MIT Press."},{"key":"e_1_3_3_144_2","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1007\/978-981-15-1301-5_27","volume-title":"Proceedings of the International Conference on Smart City and Informatization","author":"Srivastava Gautam","year":"2019","unstructured":"Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. Data sharing and privacy for patient iot devices using blockchain. In Proceedings of the International Conference on Smart City and Informatization. Springer, Berlin, 334\u2013348."},{"key":"e_1_3_3_145_2","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.procs.2015.04.098","article-title":"Impact of big data analytics on banking sector: Learning for Indian Banks","volume":"50","author":"Srivastava Utkarsh","year":"2015","unstructured":"Utkarsh Srivastava and Santosh Gopalkrishnan. 2015. Impact of big data analytics on banking sector: Learning for Indian Banks. Proc. Comput. Sci. 50 (2015), 643\u2013652.","journal-title":"Proc. Comput. Sci."},{"key":"e_1_3_3_146_2","first-page":"628","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201912)","author":"Srivatsa Mudhakar","year":"2012","unstructured":"Mudhakar Srivatsa and Mike Hicks. 2012. Deanonymizing mobility traces: Using social network as a side-channel. In Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201912). ACM, 628\u2013637."},{"key":"e_1_3_3_147_2","first-page":"703","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201919)","author":"Sun Haipei","year":"2019","unstructured":"Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Hui Wang, and Ting Yu. 2019. Analyzing subgraph statistics from extended local views with decentralized differential privacy. In Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201919). ACM, 703\u2013717."},{"key":"e_1_3_3_148_2","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1145\/3442188.3445934","volume-title":"Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAT\u201921)","author":"Suriyakumar Vinith M.","year":"2021","unstructured":"Vinith M. Suriyakumar, Nicolas Papernot, Anna Goldenberg, and Marzyeh Ghassemi. 2021. Chasing your long tails: Differentially private prediction in health care settings. In Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAT\u201921). ACM, 723\u2013734."},{"key":"e_1_3_3_149_2","volume-title":"Online Payment Fraud: Emerging Threats, Key Vertical Strategies & Market Forecasts 2017-2022","author":"Susan Morrow","year":"2017","unstructured":"Morrow Susan and Maynard Nick. 2017. Online Payment Fraud: Emerging Threats, Key Vertical Strategies & Market Forecasts 2017-2022. Juniper Research."},{"issue":"05","key":"e_1_3_3_150_2","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney Latanya","year":"2002","unstructured":"Latanya Sweeney. 2002. k-anonymity: A model for protecting privacy. Int. J. Uncert. Fuzz. Knowl.-Bas. Syst. 10, 05 (2002), 557\u2013570.","journal-title":"Int. J. Uncert. Fuzz. Knowl.-Bas. Syst."},{"issue":"20","key":"e_1_3_3_151_2","doi-asserted-by":"crossref","first-page":"6385","DOI":"10.1080\/00207543.2019.1566666","article-title":"A graph-based model to measure structural redundancy for supply chain resilience","volume":"57","author":"Tan Wen Jun","year":"2019","unstructured":"Wen Jun Tan, Allan N. Zhang, and Wentong Cai. 2019. A graph-based model to measure structural redundancy for supply chain resilience. Int. J. Prod. Res. 57, 20 (2019), 6385\u20136404.","journal-title":"Int. J. Prod. Res."},{"key":"e_1_3_3_152_2","first-page":"411","volume-title":"Proceedings of the IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM\u201912)","author":"Task Christine","year":"2012","unstructured":"Christine Task and Chris Clifton. 2012. A guide to differential privacy theory in social network analysis. In Proceedings of the IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM\u201912). IEEE, 411\u2013417."},{"key":"e_1_3_3_153_2","first-page":"2761","article-title":"Achieving graph clustering privacy preservation based on structure entropy in social IoT","volume":"9","author":"Tian Youliang","year":"2021","unstructured":"Youliang Tian, Zhiying Zhang, Jinbo Xiong, Lei Chen, Jianfeng Ma, and Changgen Peng. 2021. Achieving graph clustering privacy preservation based on structure entropy in social IoT. IEEE IoT J. 9 (2021), 2761\u20132777.","journal-title":"IEEE IoT J."},{"key":"e_1_3_3_154_2","series-title":"Proceedings of the Advances in Cryptology (ASIACRYPT\u201913),","first-page":"276","author":"Upadhyay Jalaj","year":"2013","unstructured":"Jalaj Upadhyay. 2013. Random projections, graph sparsification, and differential privacy. In Proceedings of the Advances in Cryptology (ASIACRYPT\u201913),Lecture Notes in Computer Science, Vol. 8269. Springer, 276\u2013295."},{"issue":"1","key":"e_1_3_3_155_2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.ijpe.2009.10.007","article-title":"Assessing the vulnerability of supply chains using graph theory","volume":"126","author":"Wagner Stephan M.","year":"2010","unstructured":"Stephan M. Wagner and Nikrouz Neshat. 2010. Assessing the vulnerability of supply chains using graph theory. Int. J. Prod. Econ. 126, 1 (2010), 121\u2013129.","journal-title":"Int. J. Prod. Econ."},{"issue":"2","key":"e_1_3_3_156_2","first-page":"127","article-title":"Preserving differential privacy in degree-correlation based graph generation","volume":"6","author":"Wang Yue","year":"2013","unstructured":"Yue Wang and Xintao Wu. 2013. Preserving differential privacy in degree-correlation based graph generation. Trans. Data Priv. 6, 2 (2013), 127.","journal-title":"Trans. Data Priv."},{"key":"e_1_3_3_157_2","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/978-3-642-37456-2_28","volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD\u201913)","author":"Wang Yue","year":"2013","unstructured":"Yue Wang, Xintao Wu, and Leting Wu. 2013. Differential privacy preserving spectral graph analysis. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD\u201913). Springer, 329\u2013340."},{"issue":"4","key":"e_1_3_3_158_2","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1007\/s13278-013-0127-7","article-title":"On learning cluster coefficient of private networks","volume":"3","author":"Wang Yue","year":"2013","unstructured":"Yue Wang, Xintao Wu, Jun Zhu, and Yang Xiang. 2013. On learning cluster coefficient of private networks. Soc. Netw. Anal. Min. 3, 4 (2013), 925\u2013938.","journal-title":"Soc. Netw. Anal. Min."},{"key":"e_1_3_3_159_2","volume-title":"NeurIPS Workshop on Challenges and Opportunities for AI in Financial Services","author":"Weber Mark","year":"2018","unstructured":"Mark Weber, Jie Chen, Toyotaro Suzumura, Aldo Pareja, Tengfei Ma, Hiroki Kanezashi, Tim Kaler, Charles E. Leiserson, and Tao B. Schardl. 2018. Scalable graph learning for anti-money laundering: A first look. In NeurIPS Workshop on Challenges and Opportunities for AI in Financial Services. ACM, 7."},{"key":"e_1_3_3_160_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"Willenborg Leon","year":"2001","unstructured":"Leon Willenborg and Ton de Waal. 2001. Elements of Statistical Disclosure Control. Springer."},{"key":"e_1_3_3_161_2","unstructured":"Royce J. Wilson Celia Yuxin Zhang William Lam Damien Desfontaines Daniel Simmons-Marengo and Bryant Gipson. 2019. Differentially Private SQL with bounded user contribution. arxiv:1909.01917 [cs.CR]. Retrieved from https:\/\/arxiv.org\/abs\/1909.01917."},{"key":"e_1_3_3_162_2","first-page":"421","volume-title":"A Survey of Privacy-preservation of Graphs and Social Networks","author":"Wu Xintao","year":"2010","unstructured":"Xintao Wu, Xiaowei Ying, Kun Liu, and Lei Chen. 2010. A Survey of Privacy-preservation of Graphs and Social Networks. Springer, 421\u2013453."},{"issue":"1","key":"e_1_3_3_163_2","first-page":"4","article-title":"A comprehensive survey on graph neural networks","volume":"32","author":"Wu Zonghan","year":"2020","unstructured":"Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi Zhang, and S. Yu Philip. 2020. A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32, 1 (2020), 4\u201324.","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"e_1_3_3_164_2","first-page":"2808","volume-title":"Proceedings of the International Conference on Management of Data","author":"Xia Siyuan","year":"2021","unstructured":"Siyuan Xia, Beizhen Chang, Karl Knopf, Yihan He, Yuchao Tao, and Xi He. 2021. DPGraph: A benchmark platform for differentially private graph analysis. In Proceedings of the International Conference on Management of Data. ACM, 2808\u20132812."},{"key":"e_1_3_3_165_2","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1145\/2623330.2623642","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201914)","author":"Xiao Qian","year":"2014","unstructured":"Qian Xiao, Rui Chen, and Kian-Lee Tan. 2014. Differentially private network data release via structural inference. In Proceedings of the ACM International Conference on Knowledge Discovery and Data Mining (KDD\u201914). ACM, 911\u2013920."},{"key":"e_1_3_3_166_2","first-page":"235","volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD\u201918)","author":"Xu Depeng","year":"2018","unstructured":"Depeng Xu, Shuhan Yuan, Xintao Wu, and HaiNhat Phan. 2018. DPNE: Differentially private network embedding. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD\u201918). Springer, 235\u2013246."},{"key":"e_1_3_3_167_2","first-page":"229","volume-title":"Proceedings of the International Conference on Data Engineering (ICDE\u201916)","author":"Xu Shengzhi","year":"2016","unstructured":"Shengzhi Xu, Sen Su, Li Xiong, Xiang Cheng, and Ke Xiao. 2016. Differentially private frequent subgraph mining. In Proceedings of the International Conference on Data Engineering (ICDE\u201916). IEEE, 229\u2013240."},{"key":"e_1_3_3_168_2","first-page":"747","volume-title":"Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201915)","author":"Yang Bin","year":"2015","unstructured":"Bin Yang, Issei Sato, and Hiroshi Nakagawa. 2015. Bayesian differential privacy on correlated data. In Proceedings of the ACM International Conference on Management of Data (SIGMOD\u201915). ACM, 747\u2013762."},{"key":"e_1_3_3_169_2","article-title":"LF-GDPR: A framework for estimating graph metrics with local differential privacy","volume":"1","author":"Ye Qingqing","year":"2020","unstructured":"Qingqing Ye, Haibo Hu, Man Ho Au, Xiaofeng Meng, and Xiaokui Xiao. 2020. LF-GDPR: A framework for estimating graph metrics with local differential privacy. IEEE Trans. Knowl. Data Eng. 1 (2020), 16.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"e_1_3_3_170_2","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1007\/s00779-019-01287-0","article-title":"Utility analysis on privacy-preservation algorithms for online social networks: An empirical study","volume":"25","author":"Zhang Cheng","year":"2019","unstructured":"Cheng Zhang, Honglu Jiang, Xiuzhen Cheng, Feng Zhao, Zhipeng Cai, and Zhi Tian. 2019. Utility analysis on privacy-preservation algorithms for online social networks: An empirical study. Pers. Ubiq. Comput. 25 (2019), 1063\u20131079.","journal-title":"Pers. Ubiq. Comput."},{"key":"e_1_3_3_171_2","first-page":"731","volume-title":"Proceedings of the ACM International Conference on Management of Data","author":"Zhang Jun","year":"2015","unstructured":"Jun Zhang, Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, and Xiaokui Xiao. 2015. Private release of graph statistics using ladder functions. In Proceedings of the ACM International Conference on Management of Data. ACM, 731\u2013745."},{"key":"e_1_3_3_172_2","article-title":"Graph embedding matrix sharing with differential privacy","volume":"7","author":"Zhang Sen","year":"2019","unstructured":"Sen Zhang and Weiwei Ni. 2019. Graph embedding matrix sharing with differential privacy. IEEEAccess 7 (2019), 10.","journal-title":"IEEEAccess"},{"key":"e_1_3_3_173_2","volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security\u201922)","author":"Zhang Zhikun","year":"2022","unstructured":"Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, and Yang Zhang. 2022. Inference attacks against graph neural networks. In Proceedings of the USENIX Security Symposium (USENIX Security\u201922). USENIX Association, 18."},{"key":"e_1_3_3_174_2","first-page":"3749","volume-title":"Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI\u201921)","author":"Zhang Zaixi","year":"2021","unstructured":"Zaixi Zhang, Qi Liu, Zhenya Huang, Hao Wang, Chengqiang Lu, Chuanren Liu, and Enhong Chen. 2021. GraphMI: Extracting private graph data from graph neural networks. In Proceedings of the 30th International Joint Conference on Artificial Intelligence (IJCAI\u201921), Zhi-Hua Zhou (Ed.). International Joint Conferences on Artificial Intelligence Organization, 3749\u20133755. DOI:https:\/\/doi.org\/10.24963\/ijcai.2021\/516Main Track."},{"key":"e_1_3_3_175_2","first-page":"1","volume-title":"Proceedings of the IEEE Globecom Workshops","author":"Zhao Jun","year":"2017","unstructured":"Jun Zhao, Junshan Zhang, and H. Vincent Poor. 2017. Dependent differential privacy for correlated data. In Proceedings of the IEEE Globecom Workshops. IEEE, 1\u20137."},{"key":"e_1_3_3_176_2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","article-title":"Graph neural networks: A review of methods and applications","volume":"1","author":"Zhou Jie","year":"2020","unstructured":"Jie Zhou, Ganqu Cui, Zhengyan Zhang, Cheng Yang, Zhiyuan Liu, and Maosong Sun. 2020. Graph neural networks: A review of methods and applications. AI Open 1 (2020), 57\u201381.","journal-title":"AI Open"},{"issue":"8","key":"e_1_3_3_177_2","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/TKDE.2017.2697856","article-title":"Differentially private data publishing and analysis: A survey","volume":"29","author":"Zhu Tianqing","year":"2017","unstructured":"Tianqing Zhu, Gang Li, Wanlei Zhou, and S. Yu Philip. 2017. Differentially private data publishing and analysis: A survey. IEEE Trans. Knowl. Data Eng. 29, 8 (2017), 1619\u20131638.","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:41Z","timestamp":1750182701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,22]]},"references-count":176,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3569085"],"URL":"https:\/\/doi.org\/10.1145\/3569085","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,22]]},"assertion":[{"value":"2021-07-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}