{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:29:34Z","timestamp":1741667374947,"version":"3.38.0"},"reference-count":33,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDA"],"published-print":{"date-parts":[[2018,2,22]]},"DOI":"10.3233\/ida-163482","type":"journal-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T20:51:02Z","timestamp":1520023862000},"page":"3-19","source":"Crossref","is-referenced-by-count":2,"title":["A weighted collaboration network generalization method for privacy protection in C-DBLP"],"prefix":"10.1177","volume":"22","author":[{"given":"Tinghuai","family":"Ma","sequence":"first","affiliation":[{"name":"CICAEET, Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China"}]},{"given":"Yu","family":"Hao","sequence":"additional","affiliation":[{"name":"School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China"}]},{"given":"Xiafei","family":"Suo","sequence":"additional","affiliation":[{"name":"School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China"}]},{"given":"Yu","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Computer & Software, Nanjing University of Information Science & Technology, Jiangsu, Nanjing 210044, Jiangsu, China"}]},{"given":"Jie","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Economics & Management, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China"}]}],"member":"179","reference":[{"key":"10.3233\/IDA-163482_ref2","doi-asserted-by":"crossref","unstructured":"B. Gu, X. Sun and V.S. Sheng, Structural Minimax Probability Machine, IEEE Transactions on Neural Networks and Learning Systems (2016). DOI: 10.1109\/TNNLS.2016.2544779","DOI":"10.1109\/TNNLS.2016.2544779"},{"issue":"7","key":"10.3233\/IDA-163482_ref3","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","article-title":"Incremental Support Vector Learning for Ordinal Regression","volume":"26","author":"Gu","year":"2015","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"10.3233\/IDA-163482_ref4","doi-asserted-by":"crossref","unstructured":"B. Gu and V.S. Sheng, A Robust Regularization Path Algorithm for \u00ce\u00bd-Support Vector Classification, IEEE Transactions on Neural Networks and Learning Systems (2016). DOI: 10.1109\/TNNLS.2016.2527796","DOI":"10.1109\/TNNLS.2016.2527796"},{"key":"10.3233\/IDA-163482_ref5","doi-asserted-by":"crossref","unstructured":"Y. Xue, J. Jiang, B. Zhao and T. Ma, A self-adaptive articial bee colony algorithm based on global best for global optimization, Soft Computing (2017). DOI: 10.1007\/s00500-017-2547-1","DOI":"10.1007\/s00500-017-2547-1"},{"key":"10.3233\/IDA-163482_ref6","doi-asserted-by":"crossref","unstructured":"H. Rong, T.H. Ma, M.L. Tang and J. Cao, A Novel Subgraph K+ -Isomorphism Method in Social Network Based on Graph Similarity Detection, Soft Computing (2017). DOI: 10.1007\/s00500-017-2513-y","DOI":"10.1007\/s00500-017-2513-y"},{"key":"10.3233\/IDA-163482_ref7","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1016\/j.neucom.2016.05.020","article-title":"LED: A Fast Overlapping Communities Detection Algorithm Based on Structural Clustering","volume":"207","author":"Ma","year":"2016","journal-title":"Neurocomputing"},{"key":"10.3233\/IDA-163482_ref8","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.neucom.2015.05.109","article-title":"An efficient and scalable density-based clustering algorithm for datasets with complex structures","volume":"171","author":"Lv","year":"2016","journal-title":"Neurocomputing"},{"key":"10.3233\/IDA-163482_ref9","doi-asserted-by":"crossref","unstructured":"L. Backstrom, D. Huttenlocher, J. Kleinberg and X. Lan, Group formation in large social networks: membership, growth, and evalution, in KDD\u201906: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006, pp. 44\u201354.","DOI":"10.1145\/1150402.1150412"},{"issue":"5","key":"10.3233\/IDA-163482_ref11","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-anonymity privacy protection using generalization and suppression","volume":"10","author":"Sweeney","year":"2002","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"10.3233\/IDA-163482_ref12","unstructured":"E. Zheleva and L. Getoor, Preserving the privacy of sensitive relationships in graph data, Proceedings of the 1st ACM SIGKDD International Conference on Privacy, Security, and Trust in KDD, 2008."},{"key":"10.3233\/IDA-163482_ref13","doi-asserted-by":"crossref","unstructured":"A. Campan and T.M. Truta, A clustering approach for data and structural anonymity in social networks, Proceedings of the 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD, 2008.","DOI":"10.1007\/978-3-642-01718-6_4"},{"key":"10.3233\/IDA-163482_ref14","doi-asserted-by":"crossref","unstructured":"S. Das, O. Egecioglu and A.E. Abbadi, Anonymizing weighted social network graphs, The 26th International Conference on Data Engineering, ICDE 2010, 2010.","DOI":"10.1109\/ICDE.2010.5447915"},{"key":"10.3233\/IDA-163482_ref15","doi-asserted-by":"crossref","unstructured":"Y. Li and H. Shen, Anonymizing graphs against weight-based attacks, International Conference on Data Mining Workshops (ICDMW 2010), 2010, pp. 491\u2013498.","DOI":"10.1109\/ICDMW.2010.112"},{"key":"10.3233\/IDA-163482_ref16","doi-asserted-by":"crossref","unstructured":"L. Liu, J. Wang, J. Liu and J. Zhang, Privacy preservation in social networks with sensitive edge weights, 2009 SIAM International Conference on Data Mining (SDM 2009), Sparks, Nevada, 2009, pp. 954\u2013965.","DOI":"10.1137\/1.9781611972795.82"},{"key":"10.3233\/IDA-163482_ref17","doi-asserted-by":"crossref","unstructured":"B. Zhou and J. Pei, Preserving Privacy in Social Networks Against Neighborhood Attacks, Proceedings of IEEE 24th International Conference on Data Mining (ICDE \u2019,08), 2008, pp. 506\u2013515.","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"10.3233\/IDA-163482_ref18","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-642-32600-4_21","article-title":"Fast identity anonymization on graphs","author":"Lu","year":"2012","journal-title":"Database and expert systems applications"},{"issue":"2","key":"10.3233\/IDA-163482_ref19","first-page":"404","article-title":"The structure of scientific collaboration networks","volume":"98","author":"Newman","year":"2001","journal-title":"Working Papers"},{"issue":"2","key":"10.3233\/IDA-163482_ref20","doi-asserted-by":"crossref","first-page":"016131","DOI":"10.1103\/PhysRevE.64.016131","article-title":"Scientific collaboration networks: I. Network construction and fundamental results","volume":"64","author":"Newman","year":"2001","journal-title":"Physical Review E"},{"issue":"1","key":"10.3233\/IDA-163482_ref21","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1103\/PhysRevE.64.016132","article-title":"Scientific collaboration networks: II. Shortest paths, weighted networks, and centrality","volume":"64","author":"Newman","year":"2001","journal-title":"Physical Review E"},{"key":"10.3233\/IDA-163482_ref22","first-page":"413","article-title":"Weighted Social Networks Anonymizing Publication","volume":"124","author":"Li","year":"2012","journal-title":"Recent Advances in Computer Science and Information Engineering, Lecture Notes in Electrical Engineering"},{"issue":"1","key":"10.3233\/IDA-163482_ref23","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1142\/S0218194013400056","article-title":"Shortest path anonymization on weighted graph","volume":"23","author":"Wang","year":"2013","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"10.3233\/IDA-163482_ref24","doi-asserted-by":"crossref","unstructured":"M. Hay, G. Miklau, D. Jensen and D. Towsley, Resisting structural re-identification in anonymized social networks, The Proceedings of the 34th Int\u2019l Conference. on Very Large Databases, 2008, pp. 102\u2013114.","DOI":"10.14778\/1453856.1453873"},{"key":"10.3233\/IDA-163482_ref25","doi-asserted-by":"crossref","unstructured":"J. Cheng, W.C. Fu and J. Liu, K-isomorphism: privacy preserving network publication against structural attacks, Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, 2010.","DOI":"10.1145\/1807167.1807218"},{"issue":"1","key":"10.3233\/IDA-163482_ref26","doi-asserted-by":"crossref","first-page":"946","DOI":"10.14778\/1687627.1687734","article-title":"K-automorphism: a general framework for privacy preserving network publication","volume":"2","author":"Zou","year":"2009","journal-title":"Proc. VLDB Endow"},{"key":"10.3233\/IDA-163482_ref27","doi-asserted-by":"crossref","unstructured":"W. Wu et al., k-symmetry model for identity anonymization in social networks, Proceedings of the 13th International Conference on Extending Database Technology, 2010.","DOI":"10.1145\/1739041.1739058"},{"issue":"12","key":"10.3233\/IDA-163482_ref28","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1007\/s00607-015-0453-x","article-title":"KDVEM: a k-degree anonymity with Vertex and Edge Modification algorithm","volume":"97","author":"Ma","year":"2015","journal-title":"Computing"},{"key":"10.3233\/IDA-163482_ref29","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.neucom.2017.01.064","article-title":"Cross-Heterogeneous-Database Age Estimation Through Correlation Representation Learning","volume":"238","author":"Tian","year":"2017","journal-title":"Neurocomputing"},{"key":"10.3233\/IDA-163482_ref30","doi-asserted-by":"crossref","unstructured":"K. Chen, H.Y. Zhang, B. Wang and X.C. Yang, Protecting Sensitive Labels in Weighted Social Networks, Web Information System and Application Conference (WISA), 2013 10th, 2013, pp. 221\u2013226.","DOI":"10.1109\/WISA.2013.50"},{"key":"10.3233\/IDA-163482_ref31","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-642-15464-5_24","article-title":"Analysis of computer science communities based on dblp","author":"Biryukov","year":"2010","journal-title":"Research and Advanced Technology for Digital Libraries"},{"issue":"3","key":"10.3233\/IDA-163482_ref32","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1103\/PhysRevE.74.036104","article-title":"Finding community structure in networks using the eigenvectors of matrices","volume":"74","author":"Newman","year":"2006","journal-title":"Physical Review E Statistical Nonlinear and Soft Matter Physics"},{"issue":"2","key":"10.3233\/IDA-163482_ref33","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1002\/cpe.3437","article-title":"Detect structural-connected communities based on BSCHEF in C-DBLP","volume":"28","author":"Ma","year":"2016","journal-title":"Concurrency Computat: Pract. Exper."},{"issue":"22","key":"10.3233\/IDA-163482_ref34","doi-asserted-by":"crossref","first-page":"228701-1","DOI":"10.1103\/PhysRevLett.99.228701","article-title":"Emergence of communities in weighted networks","volume":"99","author":"Kumpula","year":"2007","journal-title":"Physical Review Letters"},{"issue":"2","key":"10.3233\/IDA-163482_ref35","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1214\/088342306000000222","article-title":"Network-based marketing: Identifying likely adopters via consumer networks","volume":"22","author":"Hill","year":"2006","journal-title":"Statistical Science"}],"container-title":["Intelligent Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDA-163482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T18:50:17Z","timestamp":1741632617000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDA-163482"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,22]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/ida-163482","relation":{},"ISSN":["1088-467X","1571-4128"],"issn-type":[{"type":"print","value":"1088-467X"},{"type":"electronic","value":"1571-4128"}],"subject":[],"published":{"date-parts":[[2018,2,22]]}}}