{"id":"https://openalex.org/W3000629475","doi":"https://doi.org/10.1145/3371676.3371693","title":"Differentially Private Graph Clustering Algorithm Based on Structure Similarity","display_name":"Differentially Private Graph Clustering Algorithm Based on Structure Similarity","publication_year":2019,"publication_date":"2019-11-15","ids":{"openalex":"https://openalex.org/W3000629475","doi":"https://doi.org/10.1145/3371676.3371693","mag":"3000629475"},"language":"en","primary_location":{"id":"doi:10.1145/3371676.3371693","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371693","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039612665","display_name":"Zijie Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zijie Lin","raw_affiliation_strings":["PLA Strategic Support Force, Information Engineering University, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"PLA Strategic Support Force, Information Engineering University, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046901429","display_name":"Liangliang Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangliang Gao","raw_affiliation_strings":["PLA Strategic Support Force, Information Engineering University, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"PLA Strategic Support Force, Information Engineering University, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082517684","display_name":"Xuexian Hu","orcid":"https://orcid.org/0000-0001-9778-9463"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuexian Hu","raw_affiliation_strings":["PLA Strategic Support Force, Information Engineering University, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"PLA Strategic Support Force, Information Engineering University, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100319895","display_name":"Yuxuan Zhang","orcid":"https://orcid.org/0000-0001-6905-3993"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuxuan Zhang","raw_affiliation_strings":["China Electric Engineering Design, Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Electric Engineering Design, Institute, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091311315","display_name":"Wenfen Liu","orcid":"https://orcid.org/0000-0001-5601-8347"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenfen Liu","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information, Security Guilin, Guangxi, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information, Security Guilin, Guangxi, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5039612665"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.18253193,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"63","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.8425939083099365},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8288915157318115},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.727385401725769},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5755612254142761},{"id":"https://openalex.org/keywords/cure-data-clustering-algorithm","display_name":"CURE data clustering algorithm","score":0.5715344548225403},{"id":"https://openalex.org/keywords/data-stream-clustering","display_name":"Data stream clustering","score":0.5508525371551514},{"id":"https://openalex.org/keywords/correlation-clustering","display_name":"Correlation clustering","score":0.5240628719329834},{"id":"https://openalex.org/keywords/canopy-clustering-algorithm","display_name":"Canopy clustering algorithm","score":0.4986236095428467},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.47228699922561646},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4175896644592285},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37030544877052307},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2685990333557129}],"concepts":[{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.8425939083099365},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8288915157318115},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.727385401725769},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5755612254142761},{"id":"https://openalex.org/C33704608","wikidata":"https://www.wikidata.org/wiki/Q5014717","display_name":"CURE data clustering algorithm","level":4,"score":0.5715344548225403},{"id":"https://openalex.org/C193143536","wikidata":"https://www.wikidata.org/wiki/Q5227360","display_name":"Data stream clustering","level":5,"score":0.5508525371551514},{"id":"https://openalex.org/C94641424","wikidata":"https://www.wikidata.org/wiki/Q5172845","display_name":"Correlation clustering","level":3,"score":0.5240628719329834},{"id":"https://openalex.org/C104047586","wikidata":"https://www.wikidata.org/wiki/Q5033439","display_name":"Canopy clustering algorithm","level":4,"score":0.4986236095428467},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.47228699922561646},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4175896644592285},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37030544877052307},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2685990333557129}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3371676.3371693","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3371676.3371693","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1998091733","https://openalex.org/W2017346967","https://openalex.org/W2022542865","https://openalex.org/W2063575624","https://openalex.org/W2065228400","https://openalex.org/W2091644709","https://openalex.org/W2101771965","https://openalex.org/W2104355163","https://openalex.org/W2109369020","https://openalex.org/W2125678004","https://openalex.org/W2134008243","https://openalex.org/W2134479759","https://openalex.org/W2150611147","https://openalex.org/W2157270607","https://openalex.org/W2168433392","https://openalex.org/W2169861334","https://openalex.org/W2242728483","https://openalex.org/W2293934387","https://openalex.org/W2406036028","https://openalex.org/W2436309872","https://openalex.org/W2468706984","https://openalex.org/W2594311007","https://openalex.org/W2755088640","https://openalex.org/W2766587611","https://openalex.org/W2797942034","https://openalex.org/W2904021822","https://openalex.org/W2911978475","https://openalex.org/W2951827590","https://openalex.org/W4205228770","https://openalex.org/W6824583106"],"related_works":["https://openalex.org/W2559422900","https://openalex.org/W3144143113","https://openalex.org/W2491448268","https://openalex.org/W2892323093","https://openalex.org/W4306940721","https://openalex.org/W2181939267","https://openalex.org/W3174322327","https://openalex.org/W2160785859","https://openalex.org/W2394193399","https://openalex.org/W4301002638"],"abstract_inverted_index":{"With":[0],"the":[1,53,69,88,108,112,121,128,140,156,167,177,182],"widespread":[2],"use":[3],"of":[4,72,90,111,114,127,139,179,184],"new":[5],"information":[6,71],"systems":[7,13],"such":[8],"as":[9,14,16],"social":[10],"networks,":[11],"recommendation":[12],"well":[15],"location-based":[17],"services,":[18],"graph":[19,38,65,98],"data":[20,28,66],"has":[21,31],"become":[22],"a":[23,79,95],"very":[24],"common":[25],"and":[26,49,87,123],"important":[27],"type.":[29],"It":[30],"been":[32],"shown":[33],"that,":[34,163],"from":[35],"these":[36,64],"collected":[37],"data,":[39],"some":[40],"special":[41],"substructures":[42],"can":[43,50,175],"be":[44],"found":[45],"through":[46],"clustering":[47,61,82,99,157,170,173,180],"analysis,":[48],"further":[51],"support":[52],"intelligent":[54],"decision.":[55],"However,":[56],"directly":[57],"publishing":[58],"or":[59],"using":[60],"results":[62,161],"on":[63],"would":[67],"disclose":[68],"privacy":[70],"system":[73],"users.":[74],"To":[75],"this":[76],"end,":[77],"based":[78],"classical":[80],"structural":[81],"algorithm":[83,100,149,174],"for":[84,131],"networks":[85],"(SCAN)":[86],"technology":[89],"differential":[91,133,186],"privacy,":[92,152],"we":[93,104,136],"propose":[94],"differentially":[96],"private":[97],"named":[101],"DP-SCAN.":[102],"Specifically,":[103],"first":[105],"reasonably":[106],"calibrate":[107],"global":[109],"sensitivity":[110],"function":[113],"computing":[115],"structure":[116],"similarity":[117],"between":[118],"nodes":[119],"in":[120],"graph,":[122],"thus":[124],"specify":[125],"parameters":[126],"Laplace":[129],"mechanism":[130],"capturing":[132],"privacy.":[134,187],"Then,":[135],"provide":[137],"details":[138],"DP-SCAN":[141,172],"algorithm.":[142],"The":[143,159],"theoretical":[144],"analysis":[145],"indicates":[146],"that":[147],"DPSCAN":[148],"satisfies":[150],"\u03b5-differential":[151],"without":[153],"trading":[154],"off":[155],"efficiency.":[158],"experimental":[160],"show":[162],"when":[164],"compared":[165],"with":[166],"original":[168],"SCAN":[169],"algorithm,":[171],"maintain":[176],"validity":[178],"under":[181],"premise":[183],"satisfying":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
