1CAPUTO K E, HAMMER DA. Adhesive dynamics simulation of G-protein-mediated chemokine-activated neutrophil adhesion [J]. Biophysical Journal, 2009, 96(8): 2989-3004.
2Liu K, Terzi E. Towards identity anonymization on graphs. In: Proc. of the 2008 ACM SIGMOD Int'l Conf. on Management of Data. 2008.93-106. [doi: 10.1145/1376616.1376629].
3Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks. In: Proc. of the 24th IEEE Int'l Conf. on Data Engineering. 2008. 506-515. [doi: 10.1109/ICDE.2008.4497459].
4Hay M, Miklau G, Jensen D, Towsley D. Resisting structural identification in anonymized social networks. In: Proc. of the 34th Int'l Conf. on Very Large Databases. 2008. 102-114. [doi: 10.14778/1453856.1453873].
5Zou L, Chen L, Ozsu MT. K-Automorphism: A general framework for privacy preserving network publication. In: Proc. of the 35th Int'l Conf. on Very Large Databases. 2009. 946-957. [doi: 10.14778/1687627.1687734].
6Cormode G, Srivastava D, Yu T, Zhang Q. Anonymizing bipartite graph data using safe groupings. In: Proc. of the 34th Int'l Conf. on Very Large Databases. 2008. 833-844. [doi: 10.14778/1453856.1453947].
7Bhagat S, Cormode G, Krishnamurthy B, Srivastava D. Class-Based graph anonymization for social network data. In: Proc. of the 35th Int'l Conf. on Very Large Databases. 2009. 766-777. [doi: 10.14778/1687627.1687714].
8Fard AM, Wang K, Yu PS. Limiting link disclosure in social network analysis through subgraph-wise perturbation. In: Proc. of the 15th Int'l Conf. on Extending Database Technology. 2012. 109-119. [doi: 10.1145/2247596.2247610].
9Gao J, Xu JY, Jin R, Zhou J, Wang T, Yang D. Neighborhood-Privacy protected shortest distance computing in cloud. In: Proc. of the 2011 ACM SIGMOD Int'l Conf. on Management of Data. 2011. 409-420. [doi: 10.1145/1989323.1989367].
10Wang Y, Zheng B. Preserving privacy in social networks against connection fingerprint attacks. In: Proc. of the 2015 IEEE Int'l Conf. on Data Engineering. 2015.54-65. [doi: 10.1109/ICDE.2015.7113272].