{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T22:14:24Z","timestamp":1772748864527,"version":"3.50.1"},"reference-count":18,"publisher":"Association for Computing Machinery (ACM)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2010,11]]},"abstract":"<jats:p>Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background knowledge. However, in practice, different users have different privacy protect requirements. Thus, assuming the attacks with the same background knowledge does not meet the personalized privacy requirements, meanwhile, it looses the chance to achieve better utility by taking advantage of differences of users' privacy requirements. In this paper, we introduce a framework which provides privacy preserving services based on the user's personal privacy requests. Specifically, we define three levels of protection requirements based on the gradually increasing attacker's background knowledge and combine the label generalization protection and the structure protection techniques (i.e. adding noise edge or nodes) together to satisfy different users' protection requirements. We verify the effectiveness of the framework through extensive experiments.<\/jats:p>","DOI":"10.14778\/1921071.1921080","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:17:57Z","timestamp":1403612277000},"page":"141-150","source":"Crossref","is-referenced-by-count":86,"title":["Personalized privacy protection in social networks"],"prefix":"10.14778","volume":"4","author":[{"given":"Mingxuan","family":"Yuan","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science &amp; Technology"}]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science &amp; Technology"}]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago"}]}],"member":"320","published-online":{"date-parts":[[2010,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/1242572.1242598","volume-title":"WWW'07","author":"Backstrom L.","year":"2007"},{"issue":"1","key":"e_1_2_1_2_1","doi-asserted-by":"crossref","first-page":"766","DOI":"10.14778\/1687627.1687714","article-title":"Class-based graph anonymization for social network data","volume":"2","author":"Bhagat S.","year":"2009","journal-title":"Proc. VLDB Endow."},{"key":"e_1_2_1_3_1","volume-title":"PinKDD'08","author":"Campan A.","year":"2008"},{"issue":"1","key":"e_1_2_1_4_1","doi-asserted-by":"crossref","first-page":"833","DOI":"10.14778\/1453856.1453947","article-title":"Anonymizing bipartite graph data using safe groupings","volume":"1","author":"Cormode G.","year":"2008","journal-title":"Proc. VLDB Endow."},{"key":"e_1_2_1_5_1","first-page":"393","volume-title":"ICDMW'07","author":"Eberle W.","year":"2007"},{"issue":"1","key":"e_1_2_1_6_1","doi-asserted-by":"crossref","first-page":"102","DOI":"10.14778\/1453856.1453873","article-title":"Resisting structural re-identification in anonymized social networks","volume":"1","author":"Hay M.","year":"2008","journal-title":"Proc. VLDB Endow."},{"key":"e_1_2_1_7_1","first-page":"106","volume-title":"ICDE'07","author":"Li N.","year":"2007"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/1376616.1376629","volume-title":"SIGMOD'08","author":"Liu K.","year":"2008"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1145\/1055558.1055591","volume-title":"PODS'04","author":"Meyerson A.","year":"2004"},{"key":"e_1_2_1_11_1","first-page":"397","volume-title":"ICDM'09","author":"Neville J.","year":"2009"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1145\/956750.956831","volume-title":"KDD'03","author":"Noble C. C.","year":"2003"},{"key":"e_1_2_1_13_1","first-page":"486","volume-title":"ICDE'08","author":"Shrivastava N.","year":"2008"},{"key":"e_1_2_1_14_1","first-page":"139","volume-title":"VLDB'06","author":"Xiao X.","year":"2006"},{"key":"e_1_2_1_15_1","first-page":"739","volume-title":"SDM'08","author":"Ying X.","year":"2008"},{"key":"e_1_2_1_16_1","first-page":"153","volume-title":"PinKDD'07","author":"Zheleva E.","year":"2007"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1145\/1370042","volume-title":"ICDE'08","author":"Zhou B.","year":"2008"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"},{"issue":"1","key":"e_1_2_1_19_1","doi-asserted-by":"crossref","first-page":"946","DOI":"10.14778\/1687627.1687734","article-title":"a general framework for privacy preserving network publication","volume":"2","author":"Zou L.","year":"2009","journal-title":"Proc. VLDB Endow."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/1921071.1921080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T14:41:42Z","timestamp":1689345702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/1921071.1921080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["10.14778\/1921071.1921080"],"URL":"https:\/\/doi.org\/10.14778\/1921071.1921080","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2010,11]]}}}