Citation: | KANG Haiyan, JI Yuanrui, ZHANG Shuxuan, “Enhanced Privacy Preserving for Social Networks Relational Data Based on Personalized Differential Privacy,” Chinese Journal of Electronics, vol. 31, no. 4, pp. 741-751, 2022, doi: 10.1049/cje.2021.00.274 |
[1] |
Jiang H, Pei J, Yu D, et al.,“Applications of differential privacy in social network analysis: A survey,” IEEE Transactions on Knowledge and Data Engineering, in press, DOI: 10.1109/TKDE.2021.3073062, 2021.
|
[2] |
C. Dwork, “Differential privacy: A Survey of results,” 5th International Conference on Theory and Applications of Models of Computation (TAMC 2008), Xi’an, China, Lecture Notes in Computer Science, vol.4978, Springer, Berlin, Heidelberg, DOI: 10.1007/978-3-540-79228-4_1, 2008.
|
[3] |
F. McSherry, “Privacy integrated queries: An extensible platform for privacy-preserving data analysis,” Communications of the ACM, vol.53, no.9, pp.89–97, 2010. doi: 10.1145/1810891.1810916
|
[4] |
LI Yongkai, Liu Shubo, Li Dan, et al., “Release connection fingerprints in social networks using personalized differential privacy,” Chinese Journal of Electronics, vol.27, no.5, pp.1104–1110, 2018. doi: 10.1049/cje.2017.08.008
|
[5] |
F. McSherry and K. Talwar, “Mechanism design via differential privacy”, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), Providence, RI, USA, pp.94–103, 2007.
|
[6] |
Z. Jorgensen, T. Yu, and G. Cormode, “Conservative or liberal? Personalized differential privacy,” 2015 IEEE 31st International Conference on Data Engineering, Seoul, Korea (South), pp.1023–1034, 2015.
|
[7] |
Andrea De Salve, Paolo Mori, and Laura Ricci, “A survey on privacy in decentralized online social networks,” Computer Science Review, vol.27, pp.154–176, 2018. doi: 10.1016/j.cosrev.2018.01.001
|
[8] |
Mittal P, Papamanthou C, and Song D., “Preserving link privacy in social network based systems,” ArXiv preprint, arXiv: 1208.6189, 2012.
|
[9] |
A. M. Fard and K.Wang, “Neighborhood randomization for link privacy in social network analysis,” World Wide Web, vol.18, pp.9–32, 2015. doi: 10.1007/s11280-013-0240-6
|
[10] |
Cheng J., Fu W. C., and Liu J., “K-Isomorphism: Privacy preserving network publication against structural attacks,” The 2010 ACM SIGMOD International Conference on Management of Data (SIGMOD’10), Indianapolis, Indiana, USA, pp.459–470, 2010.
|
[11] |
F. Ahmed, A. X. Liu, and R. Jin, “Publishing social network graph eigenspectrum with privacy guarantees,” IEEE Transactions on Network Science and Engineering, vol.7, no.2, pp.892–906, 2020.
|
[12] |
Casas-Roma J., Herrera-Joancomartí J., and Torra V., “k-Degree anonymity and edge selection: Improving data utility in large networks,” Knowledge & Information Systems, vol.50, pp.447–474, 2017.
|
[13] |
Zheleva E. and Getoor L., “Preserving the privacy of sensitive relationships in graph data,” The 1st ACM SIGKDD International Conference on Privacy, Security, and Trust in KDD, San Jose, CA, USA, pp.153–171, 2007.
|
[14] |
Gao T. and Li F., “Protecting social network with differential privacy under novel graph model,” IEEE Access, vol.8, pp.185276–185289, 2020. doi: 10.1109/ACCESS.2020.3026008
|
[15] |
Bichsel B., Gehr T., Drachsler-Cohen D., et al., “Dp-finder: Finding differential privacy violations by sampling and optimization,” The 2018 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, pp.508–524, 2018.
|
[16] |
Rubinstein I. P. Benjamin and Francesco Aldà, “Pain-free random differential privacy with sensitivity sampling,” The 34th International Conference on Machine Learning (ICML’17), Sydney, Australia, ArXiv preprint, arXiv: 1706.02562, 2017.
|
[17] |
Leake J., McSwiggen C., and Vishnoi N. K., “Sampling matrices from Harish-Chandra–Itzykson–Zuber densities with applications to quantum inference and differential privacy,” The 53rd Annual ACM SIGACT Symposium on Theory of Computing, virtual event, pp.1384–1397, 2021.
|
[18] |
Liu P., Xu Y. X., Jiang Q., et al., “Local differential privacy for social network publishing,” Neurocomputing, vol.391, pp.273–279, 2020. doi: 10.1016/j.neucom.2018.11.104
|
[19] |
Huang H., Zhang D. J., Xiao F., et al., “Privacy-preserving approach PDP in social network with differential privacy,” IEEE Transactions on Network and Service Management, vol.17, no.2, pp.931–945, 2020.
|