{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:49:40Z","timestamp":1775040580470,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,14]]},"DOI":"10.1145\/3712255.3726678","type":"proceedings-article","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T15:23:44Z","timestamp":1754925824000},"page":"775-778","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Utility-aware Social Network Anonymization using Genetic Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9188-7975","authenticated-orcid":false,"given":"Samuel","family":"Bonello","sequence":"first","affiliation":[{"name":"Leiden Institute of Advanced Computer Science, Leiden, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2680-2816","authenticated-orcid":false,"given":"Rachel G.","family":"de Jong","sequence":"additional","affiliation":[{"name":"Leiden Institute of Advanced Computer Science, Leiden, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6768-1478","authenticated-orcid":false,"given":"Thomas H. W.","family":"B\u00e4ck","sequence":"additional","affiliation":[{"name":"Leiden Institute of Advanced Computer Science, Leiden, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5468-1030","authenticated-orcid":false,"given":"Frank W.","family":"Takes","sequence":"additional","affiliation":[{"name":"Leiden Institute of Advanced Computer Science, Leiden, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2025,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134277"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_11"},{"key":"e_1_3_2_1_3_1","unstructured":"Albert L\u00e1szl\u00f3 Barab\u00e1si. 2016. Network Science."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Alina Campan and Traian Marius Truta. 2009. Data and Structural k-Anonymity in Social Networks. In Privacy Security and Trust in KDD. 33\u201354.","DOI":"10.1007\/978-3-642-01718-6_4"},{"key":"e_1_3_2_1_7_1","volume-title":"Takes","author":"de Jong Rachel G.","year":"2024","unstructured":"Rachel G. de Jong, Mark P. J. van der Loo, and Frank W. Takes. 2024. The anonymization problem in social networks. arXiv preprint arXiv:2409.16163 (2024)."},{"key":"e_1_3_2_1_8_1","volume-title":"Takes","author":"de Jong Rachel G.","year":"2024","unstructured":"Rachel G. de Jong, Mark P. J. van der Loo, and Frank W. Takes. 2024. A systematic comparison of measures for k-anonymity in networks. (2024). arXiv:2407.02290"},{"key":"e_1_3_2_1_9_1","volume-title":"Consensus clustering in complex networks. Scientific reports 2, 1","author":"Lancichinetti Andrea","year":"2012","unstructured":"Andrea Lancichinetti and Santo Fortunato. 2012. Consensus clustering in complex networks. Scientific reports 2, 1 (2012), 336."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_1_11_1","volume-title":"An improved influence maximization method for social networks based on genetic algorithm. Physica A: Statistical Mechanics and its Applications 586","author":"Lotf Jalil Jabari","year":"2022","unstructured":"Jalil Jabari Lotf, Mohammad Azgomi, and Mohammad Dishabi. 2022. An improved influence maximization method for social networks based on genetic algorithm. Physica A: Statistical Mechanics and its Applications 586 (2022), 126480."},{"key":"e_1_3_2_1_12_1","first-page":"911","article-title":"Patterns and dynamics of users' behavior and interaction: Network analysis of an online community","volume":"60","author":"Panzarasa Pietro","year":"2009","unstructured":"Pietro Panzarasa, Tore Opsahl, and Kathleen M Carley. 2009. Patterns and dynamics of users' behavior and interaction: Network analysis of an online community. Journal of the ASIST 60, 5 (2009), 911\u2013932.","journal-title":"Journal of the ASIST"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00655-6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-94283-5"},{"key":"e_1_3_2_1_15_1","volume-title":"Ahmed","author":"Rossi Ryan A.","year":"2015","unstructured":"Ryan A. Rossi and Nesreen K. Ahmed. 2015. The network data repository with interactive graph analytics and visualization. In AAAI. 4292\u20134293."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. 81\u201398","author":"Sala Alessandra","unstructured":"Alessandra Sala, Xiaohan Zhao, Christo Wilson, Haitao Zheng, and Ben Y. Zhao. 2011. Sharing Graphs Using Differentially Private Graph Models. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. 81\u201398."}],"event":{"name":"GECCO '25 Companion: Genetic and Evolutionary Computation Conference Companion","location":"NH Malaga Hotel Malaga Spain","acronym":"GECCO '25 Companion","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"]},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3712255.3726678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T12:07:19Z","timestamp":1759838839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3712255.3726678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,14]]},"references-count":16,"alternative-id":["10.1145\/3712255.3726678","10.1145\/3712255"],"URL":"https:\/\/doi.org\/10.1145\/3712255.3726678","relation":{},"subject":[],"published":{"date-parts":[[2025,7,14]]},"assertion":[{"value":"2025-08-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}