• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Tang, Chenxing (Tang, Chenxing.) [1] | Wang, Xiaodong (Wang, Xiaodong.) [2]

Indexed by:

EI Scopus

Abstract:

With the rapid development of internet, explosive growth of social network creates large-scale social network data. In order to discover the potential value of the social network data, many analysis methods have been developed. However, using prior knowledge about the subgraph structure of a given network, it is possible to identify a target node or infer some useful information. In this paper, we mainly consider how to prevent such subgraph attack, and propose a practical method to battle it. We use iterative hash to detect the isomorphic subgraph structures and try to greedily match the anonymous subgraphs. Empirical queries on anonymized social network shows both the security and utility advantage of our algorithm. ©2010 IEEE.

Keyword:

Graph theory Intelligent computing Intelligent systems Iterative methods Social networking (online)

Community:

  • [ 1 ] [Tang, Chenxing]College of Mathematic and Computer Science, Fuzhou University, Fuzhou, China
  • [ 2 ] [Wang, Xiaodong]College of Mathematic and Computer Science, Fuzhou University, Fuzhou, China

Reprint 's Address:

Show more details

Version:

Related Keywords:

Related Article:

Source :

Year: 2010

Volume: 3

Page: 154-158

Language: English

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:189/10114861
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1