Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/108839
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, Y. | - |
dc.contributor.author | Shen, H. | - |
dc.contributor.author | Lang, C. | - |
dc.contributor.author | Dong, H. | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Neurocomputing, 2016; 218:359-370 | - |
dc.identifier.issn | 0925-2312 | - |
dc.identifier.issn | 1872-8286 | - |
dc.identifier.uri | http://hdl.handle.net/2440/108839 | - |
dc.description.abstract | Abstract not available | - |
dc.description.statementofresponsibility | Yidong Li, Hong Shen, Congyan Lang, Hairong Dong | - |
dc.language.iso | en | - |
dc.publisher | Elsevier | - |
dc.rights | © 2016 Elsevier B.V. All rights reserved. | - |
dc.source.uri | http://dx.doi.org/10.1016/j.neucom.2016.08.084 | - |
dc.subject | Anonymity; weighted graph; privacy preserving graph mining; weight anonymization | - |
dc.title | Practical anonymity models on protecting private weighted graphs | - |
dc.type | Journal article | - |
dc.identifier.doi | 10.1016/j.neucom.2016.08.084 | - |
dc.relation.grant | #2014JBM042 | - |
dc.relation.grant | #2015ZBJ007 | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Shen, H. [0000-0002-3663-6591] [0000-0003-0649-0648] | - |
Appears in Collections: | Aurora harvest 3 Computer Science publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
RA_hdl_108839.pdf Restricted Access | Restricted Access | 1.5 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.