• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Tang, C. (Tang, C..) [1] | Wang, X. (Wang, X..) [2]

Indexed by:

Scopus

Abstract:

With the rapid development of internet, explosive growth of social network creates large-scale social network data. In order to discover the potential value of the social network data, many analysis methods have been developed. However, using prior knowledge about the subgraph structure of a given network, it is possible to identify a target node or infer some useful information. In this paper, we mainly consider how to prevent such subgraph attack, and propose a practical method to battle it. We use iterative hash to detect the isomorphic subgraph structures and try to greedily match the anonymous subgraphs. Empirical queries on anonymized social network shows both the security and utility advantage of our algorithm. ©2010 IEEE.

Keyword:

Data publishing; Graph isomorphism; Privacy preservation; Social network; Subgraph attacks

Community:

  • [ 1 ] [Tang, C.]College of Mathematic and Computer Science, Fuzhou University, Fuzhou, China
  • [ 2 ] [Wang, X.]College of Mathematic and Computer Science, Fuzhou University, Fuzhou, China

Reprint 's Address:

  • [Tang, C.]College of Mathematic and Computer Science, Fuzhou University, Fuzhou, China

Show more details

Related Keywords:

Related Article:

Source :

Proceedings - 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010

Year: 2010

Volume: 3

Page: 154-158

Language: English

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:145/10111942
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1