Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, WWW, 2007. ,
Identity obfuscation in graphs through the information theoretic lens, 2011 IEEE 27th International Conference on Data Engineering, 2011. ,
DOI : 10.1109/ICDE.2011.5767905
K-isomorphism, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, 2010. ,
DOI : 10.1145/1807167.1807218
Anonymizing bipartite graph data using safe groupings, VLDB, 2008. ,
DOI : 10.1007/s00778-009-0167-9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7895
Characterization of complex networks: A survey of measurements, Adv. Phys, 2007. ,
Privacy preserving mining of association rules, KDD, 2002. ,
Computers and Intractability: A Guide to the Theory of NP-Completeness, 1979. ,
Resisting structural re-identification in anonymized social networks, PVLDB, vol.1, issue.1, pp.102-114, 2008. ,
Towards identity anonymization on graphs, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, 2008. ,
DOI : 10.1145/1376616.1376629
Maintaining Data Privacy in Association Rule Mining, VLDB, 2002. ,
DOI : 10.1016/B978-155860869-6/50066-4
Randomizing Social Networks: a Spectrum Preserving Approach, SIAM SDM, 2008. ,
DOI : 10.1137/1.9781611972788.67
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.6647
Preserving Privacy in Social Networks Against Neighborhood Attacks, 2008 IEEE 24th International Conference on Data Engineering, 2008. ,
DOI : 10.1109/ICDE.2008.4497459
k-automorphism, VLDB, 2009. ,
DOI : 10.14778/1687627.1687734