[1] 盘点2017全球十大数据泄露事件:一件比一件重量级[EB/OL]. [2018-3-20]. http://www.sohu.com/a/207652321_99931348
[2] 吴振强, 胡静, 田堉攀等. 社交网络下的不确定图隐私保护算法[J]. 软件学报, 2018(已录用)
[3] Backstrom L, Dwork C, Kleinberg J. Wherefore art thou r3579x? : anonymized social networks, hidden patterns, and structural steganography[C]//Proc of the 16th int conf on World Wide Web. ACM, 2007:181-190
[4] Hay M, Li C, Miklau G, et al. Accurate Estimation of the Degree Distribution of Private Networks[C]//IEEE Int Conf on Data Mining. IEEE, 2009:169-178
[5] Zheleva E, Getoor L. Preserving the privacy of sensitive relationships in graph data[C]//ACM SIGKDD Int Conf on Privacy, Security, and Trust in KDD. Springer-Verlag, 2007:153-171
[6] Hay M, Miklau G, Jensen D, et al. Anonymizing Social Networks[J]. VLDB, 2007:173 – 187
[7] Boldi P, Bonchi F, Gionis A, et al. Injecting uncertainty in graphs for identity obfuscation[J]. Proc of the VLDB Endowment,2012, 5(11):1376-1387
[8] 熊文君, 徐正全, 王豪. 基于滤波原理的时间序列差分隐私保护强度评估[J]. 通信学报, 2017, 38(5): 172-181
[9] Narayanan A, Shmatikov V. Robust de-anonymization of large sparse datasets[C]//Security and Privacy, 2008: 111-125
[10] Narayanan A, Shmatikov V. De-anonymizing social networks[C]//Security and Privacy. 2009: 173-187
[11] Abawajy J, Ninggal M I H, Herawan T. Vertex re‐identification attack using neighbourhood‐pair properties[J]. Concurrency and Computation: Practice and Experience, 2016, 28(10): 2906-2919
[12] E. Zheleva and L. Getoor, To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private user Profiles[R]. Technical Report CS-TR-4926,Univ. of Maryland, College Park, July 2008
[13] Mislove A, Viswanath B, Gummadi K P, et al. You are who you know:inferring user profiles in online social networks[J]. 2010:251-260
[14] Zhou Tao, Lü Linyuan, Zhang Yicheng. Predicting missing links via local information[J]. European Physical Journal B, 2009, 71(4):623-630
[15] Huo Zheng, Meng Xiaofeng, Zhang Rui. Feel Free to Check-in: Privacy Alert against Hidden Location Inference Attacks in GeoSNs[C]//Int Conf on Database Systems for Advanced Applications. Springer Berlin Heidelberg, 2013:377-391
[16] 王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014, 25(4): 693-712
[17] 郭世泽, 陆哲明. 复杂网络基础理论[M].北京:科学出版社, 2012
[18] 卢虹冰. 医学成像及处理技术[M].北京:高等教育出版社, 2013
|