1. R. Heatherly, M. Kantarcioglu,B. Thuraisingham, “Preventing Private Information Inference Attacks on Social Networks,” inProceedings of IEEE Transactions on Knowledge and Data Engineering, pp. 1849-1862, August 2013 2. W. M. Campbell, C. K. Dagli,C. J. Weinstein, “Social Network Analysis with Content and Graphs,” inProceedings of Lincoln Laboratory Journal, pp. 61-81, January 2013 3. X. Wu, X. Ying, K. Liu K, et al., “A Survey of Privacy-Preservation of Graphs and Social Networks,” inProceedings of Managing and Mining Graph Data, pp. 421-453, Springer, US, 2010 4. S. Ji, P. Mittal,R. Beyah, “Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey,” IEEE Communications Surveys and Tutorials, Vol. 19, No. 2, pp. 1305-1326, 2017 5. C. H. Tai, P. S. Yu, D. N. Yang,M. S. Chen, “Privacy-Preserving Social Network Publication Against Friendship Attacks,” inProceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1262-1270, August 2011 6. L. Sweeney, “K-Anonymity: A model for Protecting Privacy,” Journal of Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, pp. 557-570, 2002 7. J. Casas-Roma, J. Herrera-Joancomartí,V. Torra, “k-Degree Anonymity and Edge Selection: Improving Data Utility in Large Networks,” Knowledge and Information Systems, Vol. 50, No. 2, pp. 447-474, 2017 8. L. Zou, L. Chen,M. T. Özsu, “K-Automorphism: A General Framework for Privacy Preserving Network Publication,” Proceedings of the VLDB Endowment, Vol. 2, No. 1, pp. 946-957, 2009 9. J. H. Abawajy, M. I. H.Ninggal, and T. Herawan, “Privacy Preserving Social Network Data Publication,” IEEE Communications Surveys and Tutorials, Vol. 18, No. 3, pp. 1974-1997, 2016 10. M. Girvan and M. E. J. Newman, “Community Structure in Social and Biological Networks,” Proceedings of the National Academy of Sciences, Vol. 99, No. 12, pp. 7821-7826, 2002 11. M. E. J.Newman, “Modularity and Community Structure in Networks,” Proceedings of the National Academy of Sciences, Vol. 103, No. 23, pp. 8577-8582, 2006 12. K. Liu and E. Terzi, “Towards Identity Anonymization on Graphs,” in Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93-106, 2008 13. X. K. Zhang, S. Fei, C. Song, et al., “Label Propagation Algorithm based on Local Cycles for Community Detection,” International Journal of Modern Physics B, Vol. 29, No. 5, pp. 15-29, 2015 14. L. Waltman and N. J. van Eck, “A Smart Local Moving Algorithm for Large-Scale Modularity-based Community Detection,” The European Physical Journal B, Vol. 86, No. 11, pp. 471, 2013 15. A. Praveen and S. Smys, “Anonymization in Social Networks: A Survey on the Issues of Data Privacy in Social Network Sites,” International Journal of Engineering and Computer Science, Vol. 5, No. 3, pp. 15912-15918, 2016 16. F. Yu, M. Chen, B. Yu, et al., “Privacy Preservation based on Clustering Perturbation Algorithm for Social Network,” Multimedia Tools and Applications, Vol. 77, No. 9, pp. 11241-11258, 2018 17. Y. Lv, T. Ma, M. Tang, et al., “An Efficient and Scalable Density-based Clustering Algorithm for Datasets with Complex Structures,”Neurocomputing, Vol. 171, pp. 9-22, 2016 18. J. Casas-Roma, J. Herrera-Joancomartí,V. Torra, “k-Degree Anonymity and Edge Selection: Improving Data Utility in Large Networks,” Knowledge and Information Systems, Vol. 50, No. 2, pp. 447-474, 2017 19. T. Tassa and D. J. Cohen, “Anonymization of Centralized and Distributed Social Networks by Sequential Clustering,” IEEE Transactions on Knowledge and Data Engineering, Vol. 25, No. 2, pp. 311-324, 2013 20. M. N. Huda, S. Yamada S,N. Sonehara, “An Efficient k-Anonymization Algorithm with Low Information Loss,”Lecture Notes in Electrical Engineering, Vol. 156, pp. 249-254, 2013 21. J. Eustace and X. Wang, “Overlapping Community Detection using Neighborhood Ratio Matrix,”Physica A: Statistical Mechanics and its Applications, Vol. 421, pp. 510-521, 2015 22. T. Ma, Y. Wang, M. Tang, et al., “LED: A Fast Overlapping Communities Detection Algorithm based on Structural Clustering,” Neurocomputing, Vol. 20, No. 7, pp. 488-500, 2016 23. H. Rong, T. Ma, M. Tang,J. Cao, “A Novel Subgraph K+-Isomorphism Method in Social Network based on Graph Similarity Detection,” Soft Computing, Vol. 22, No. 8, pp. 2583-2601, 2017 24. L. Tabourier, A. S. Libert,R. Lambiotte, “Predicting Links in Ego-Networks using Temporal Information,” EPJ Data Science, Vol. 5, No. 1, pp. 1, 2016 25. X. L.Zhang and Y. Tang, “Protecting Encrypted Data Against Inference Attacks in Outsourced Databases,” Applied Mechanics and Materials, Vol. 57, No. 1, pp. 621-625, 2014 |