The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks
Top Cited Papers
- 16 June 2010
- journal article
- Published by Springer Science and Business Media LLC in Knowledge and Information Systems
- Vol. 28 (1), 47-77
- https://doi.org/10.1007/s10115-010-0311-2
Abstract
No abstract availableKeywords
This publication has 45 references indexed in Scilit:
- Differential Privacy for Statistics: What we Know and What we Want to LearnJournal of Privacy and Confidentiality, 2010
- Class-based graph anonymization for social network dataProceedings of the VLDB Endowment, 2009
- The Challenges of Effectively Anonymizing Network DataPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Anonymizing bipartite graph data using safe groupingsProceedings of the VLDB Endowment, 2008
- Differential Privacy: A Survey of ResultsPublished by Springer Science and Business Media LLC ,2008
- Wherefore art thou r3579x?Published by Association for Computing Machinery (ACM) ,2007
- Group formation in large social networksPublished by Association for Computing Machinery (ACM) ,2006
- How to search a social networkSocial Networks, 2005
- R-MAT: A Recursive Model for Graph MiningPublished by Society for Industrial & Applied Mathematics (SIAM) ,2004
- Introduction to AlgorithmsJournal of the Operational Research Society, 1991