{"id":"https://openalex.org/W3214636830","doi":"https://doi.org/10.1007/978-981-16-7913-1_9","title":"Anonymizing Global Edge Weighted Social Network Graphs","display_name":"Anonymizing Global Edge Weighted Social Network Graphs","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3214636830","doi":"https://doi.org/10.1007/978-981-16-7913-1_9","mag":"3214636830"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-16-7913-1_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-16-7913-1_9","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014492708","display_name":"Jiaru Wang","orcid":"https://orcid.org/0009-0003-8089-4111"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaru Wang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047872908","display_name":"Ziyi Wan","orcid":"https://orcid.org/0009-0008-2296-6873"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyi Wan","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018411447","display_name":"Jiankang Song","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiankang Song","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078667775","display_name":"Yanze Huang","orcid":"https://orcid.org/0000-0002-9468-8701"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanze Huang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, People\u2019s Republic of China","School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, People's Republic of China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China"],"raw_orcid":"https://orcid.org/0000-0002-9468-8701","affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102809653","display_name":"Yuhang Lin","orcid":"https://orcid.org/0009-0007-7242-2543"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhang Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055176283","display_name":"Limei Lin","orcid":"https://orcid.org/0000-0001-7227-6258"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limei Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China"],"raw_orcid":"https://orcid.org/0000-0001-7227-6258","affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People\u2019s Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, People's Republic of China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5014492708"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":0.7181,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7390702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.778767466545105},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6897404789924622},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.676240861415863},{"id":"https://openalex.org/keywords/kruskals-algorithm","display_name":"Kruskal's algorithm","score":0.6460840702056885},{"id":"https://openalex.org/keywords/spanning-tree","display_name":"Spanning tree","score":0.6265321969985962},{"id":"https://openalex.org/keywords/minimum-spanning-tree","display_name":"Minimum spanning tree","score":0.6048425436019897},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.5561248660087585},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4428696930408478},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4258897006511688},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3655962646007538},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.2749475836753845},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27086973190307617},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21159353852272034},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20864936709403992},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20311275124549866},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12941282987594604},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.08854755759239197}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.778767466545105},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6897404789924622},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.676240861415863},{"id":"https://openalex.org/C63645285","wikidata":"https://www.wikidata.org/wiki/Q797860","display_name":"Kruskal's algorithm","level":3,"score":0.6460840702056885},{"id":"https://openalex.org/C64331007","wikidata":"https://www.wikidata.org/wiki/Q831672","display_name":"Spanning tree","level":2,"score":0.6265321969985962},{"id":"https://openalex.org/C13743678","wikidata":"https://www.wikidata.org/wiki/Q240464","display_name":"Minimum spanning tree","level":2,"score":0.6048425436019897},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.5561248660087585},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4428696930408478},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4258897006511688},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3655962646007538},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.2749475836753845},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27086973190307617},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21159353852272034},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20864936709403992},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20311275124549866},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12941282987594604},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.08854755759239197}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-16-7913-1_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-16-7913-1_9","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1587629899","https://openalex.org/W1971421925","https://openalex.org/W1982785330","https://openalex.org/W1988754161","https://openalex.org/W1996332242","https://openalex.org/W2000133061","https://openalex.org/W2008413086","https://openalex.org/W2017102965","https://openalex.org/W2061820396","https://openalex.org/W2063742835","https://openalex.org/W2076838257","https://openalex.org/W2115022330","https://openalex.org/W2119553540","https://openalex.org/W2121761994","https://openalex.org/W2124849257","https://openalex.org/W2138682683","https://openalex.org/W2163263459","https://openalex.org/W2529689813","https://openalex.org/W2576514511","https://openalex.org/W2917169847","https://openalex.org/W2952675638","https://openalex.org/W2965565142","https://openalex.org/W2972075419","https://openalex.org/W2990922087","https://openalex.org/W3013420945","https://openalex.org/W3099386891","https://openalex.org/W3155045906","https://openalex.org/W3168449176"],"related_works":["https://openalex.org/W4380840098","https://openalex.org/W2418231958","https://openalex.org/W4206043061","https://openalex.org/W2942013815","https://openalex.org/W2387385213","https://openalex.org/W4242086819","https://openalex.org/W2074214908","https://openalex.org/W2138987445","https://openalex.org/W1842018596","https://openalex.org/W4302939663"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
