[1] |
Wang Jun.Looking at the predicament and way out of privacy protection in the era of artificial intelligence from the "Leak Door" of Facebook [J].Northern Media Research,2018(4):46-50.(in Chinese)
|
[2] |
Dwork C.Differential privacy[C]∥Proc of International Colloquium on Automata Languages and Programming,2006:1-12.
|
[3] |
Lan Li-hui, Ju Shi-guang.Privacypreserving based on diffe- rential privacy for weighted
|
|
social networks[J].Journal on Communications,2015,36(9):145-159.(in Chinese)
|
[4] |
Li X Y, Yang J,Sun Z L,et al.Differential privacy for edge weights in social networks[J].Security and Communication Networks,2017,2017:1-10.
|
[5] |
Huang H,Zhang D J,Xiao F,et al.Privacy-preserving approach PBCN in social network with differential privacy[J].IEEE Transactions on Network and Service Management,2020,17(2):931-945.
|
[6] |
Qin Z,Yu T,Yang Y,et al.Generating synthetic decentra- lized social graphs with local differential privacy[C]∥Proc of
|
|
the 2017 ACM SIGSAC Conference on Computer and Communications Security,2017:425-438.
|
[7] |
Chen X,Mauw S,Ramirezcruz Y,et al.Publishing community-preserving attributed social graphs with a differential privacy guarantee[J].arXiv:1909.00280,2019.
|
[8] |
Sun H P,Xiao X K,Khalil I,et al.Analyzing subgraph statistics from extended local views with decentralized differential privacy[C]∥Proc ofthe 2019 ACM SIGSAC Conference on Computer and Communications Security,2019:703-717.
|
[9] |
Qian Q, Li Z X,Zhao P P,et al.Publishing graph node strength histogram with edge differential privacy[C]∥Proc of International Conference on Database Systems for Advanced Applications,2018:75-91.
|
[10] |
Cai Xiao-yan, Dai Guan-zhong,Yang Li-bin. Survey on spectral clustering algorithms[J].Computer Science,2008,35(7):14-18.(in Chinese)
|
[11] |
Knuth D E.The Stanford GraphBase:A platform for combinatorial computing[M].New Jersey:Addison-Wesley,1993.
|
[12] |
Girvan M,Newman M E J.Community structure in social and biological networks [J].Proceedings of the National Academy of Sciences,2002,99(12):7821-7826.
|
|
附中文参考文献:
|
[1] |
王军.从脸书“泄密门”看人工智能时代隐私保护的困局与出路[J].北方传媒研究,2018(4):46-50.
|
[3] |
兰丽辉,鞠时光.基于差分隐私的权重社会网络隐私保护[J].通信学报,2015,36(9):145-159.
|
[10] |
蔡晓妍,戴冠中,杨黎斌.谱聚类算法综述[J].计算机科学,2008,35(7):14-18.
|