Privacy Protection Method for Sensitive Weighted Edges in Social Networks |
Gong, Weihua
(School of Computer Science and Technology, Zhejiang University of Technology)
Jin, Rong (School of Informatics and Electronics, Zhejiang Sci-Tech University) Li, Yanjun (School of Computer Science and Technology, Zhejiang University of Technology) Yang, Lianghuai (School of Computer Science and Technology, Zhejiang University of Technology) Mei, Jianping (School of Computer Science and Technology, Zhejiang University of Technology) |
1 | A. Zaghian and A. Bagheri, "A combined model of clustering and classification methods for preserving privacy in social networks against inference and neighborhood attacks," International Journal of Security and its Applications, vol. 10, no. 1, pp. 95-102, 2016. DOI |
2 | E. Zheleva and L. Getoor, "Preserving the privacy of sensitive relationships in graph data," in Proc. of the 1st ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD'07), vol. 4890, pp.153-171, 2007. |
3 | M. Hay, K. Liu, G. Miklau, J. Pei, and E. Terzi, "Privacy-aware data management in information networks," in Proc. of International Conference on Management of Data(SIGMOD), pp. 1201-1204, 2011. |
4 | C. Jordi, H. Jordi, and V. Torra, "A survey of graph-modification techniques for privacy-preserving on networks," Artificial Intelligence Review, vol. 47, no. 3, pp. 341-366, 2017. |
5 | X. Li, C. Zhang, T. Jung, J. Qian, and L. Chen, "Graph-based privacy-preserving data publication," in Proc. of the 35th Annual IEEE International Conference on Computer Communications(INFOCOM), pp. 1-9, 2016. |
6 | X. Liu and X. Yang, "A generalization based approach for anonymizing weighted social network graphs," in Proc. of the 12th International Conference on Web-age Information Management(WAIM'11), pp. 118-130, 2011. |
7 | M. Hay, G. Miklau, D. Jensen, D. Towsley, and C. Li, "Resisting structural re-identification in anonymized social networks," The VLDB Journal, vol. 19, no. 6, pp. 797-823, 2010. DOI |
8 | E. Maria, M. Manolis, G. Stefanos, M. Lilian, T. Hannu, and M. Pirjo, "Privacy preservation by k-anonymization of weighted social networks," in Proc. of the International Conference on Advances in Social Networks Analysis and Mining(ASONAM), pp. 423-428, 2012. |
9 | S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava, "Class-based graph anonymization for social network data," the VLDB Endowment (PVLDB), vol. 2, no. 1, pp.766-777, 2009. |
10 | M. Yuan and L. Chen, "Node protection in weighted social networks," in Proc. of the 16th International Conference on Database Systems for Advanced Applications(DASFAA 2011), pp. 123-137, 2011. |
11 | Y. Li and H. Shen, "Anonymizing graphs against weight-based attacks," in Proc. of IEEE International Conference on Data Mining Workshops (ICDMW 2010), pp. 491-498, 2010. |
12 | J. Cheng, A. Fu, and J. Liu, "K-Isomorphism: Privacy preserving network publication against structural attacks," in Proc. of the ACM SIGMOD International Conference on Management of Data, pp. 459-470, 2010. |
13 | A. Campan and M. Truta, "Data and structural k-anonymity in social networks," in Proc. of the 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD(PinKDD'08), vol. 5456, pp. 33-54, 2008. |
14 | F. Yu, M. Chen, B. Yu, W. Li, L. Ma, and H. Gao, "Privacy preservation based on clustering perturbation algorithm for social network," Multimedia Tools and Applications, vol. 77, no. 9, pp. 11241-11258, 2018. DOI |
15 | Z. Wang, X. Pang, Y. Chen, H. Shao, Q. Wang, L. Wu, H. Chen, and H. Qi, "Privacy preserving crowd-sourced statistical data publishing with an untrusted server," IEEE Transactions on Mobile Computing, vol. 18, no. 6, pp. 1356-1367, 2019. DOI |
16 | Y. Lv, T. Ma, M. Tang, J. Cao, Y. Tian, A. Dhelaan, and M. Rodhaan, "An efficient and scalable density based clustering algorithm for datasets with complex structures," Neurocomputing, vol. 171, pp. 9-22, 2016. DOI |
17 | B. Francesco, G. Aristides, and T. Tamir, "Identity obfuscation in graphs through the information theoretic lens," Information Sciences, vol. 275, pp. 232-256, 2014. DOI |
18 | C. Tai, P. Yu, D. Yang, and M. Chen, "Privacy-preserving social network publication against friendship attacks," in Proc. of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD'11), pp. 1262-1270, 2011. |
19 | X. Ying and X. Wu, "Randomizing social networks: a spectrum preserving approach," in Proc. of the SIAM International Conference on Data Mining (SDM'08), pp. 739-750, 2008. |
20 | X. Ying and X. Wu, "On link privacy in randomizing social networks," Knowledge and Information Systems, vol. 28, no. 3, pp. 645-663, 2011. DOI |
21 | L. Zou, L. Chen, and M. Tamer, "K-automorphism: A general framework for privacy preserving network publication," the VLDB Endowment (PVLDB), vol. 2, no. 1, pp. 946-957, 2009. |
22 | X. Liu and X. Yang, "Protecting sensitive relationships against inference attacks in social networks," in Proc. of the 17 th International Conference on Database Systems for Advanced Applications(DASFAA2012), pp. 335-350, 2012. |
23 | M. Yuan, L. Chen, P. Yu, and T. Yu, "Protecting sensitive labels in social network data anonymization," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 3, pp. 633-647, 2013. DOI |
24 | Q. Xiao, R. Chen, and K. Tan, "Differentially private network data release via structural inference," in Proc. of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 911-920, 2014. |
25 | L. Liu, J. Wang, J. Liu, and J. Zhang, "Privacy preservation in social networks with sensitive edge weights," in Proc. of the SIAM International Conference on Data Mining (SDM'09), pp. 954-965, 2009. |
26 | S. Das, O. Egecioglu, and A. Abbadi, "Anonymizing weighted social network graphs," in Proc. of IEEE 26th International Conference on Data Engineering (ICDE 2010), pp. 904-907, 2010. |