[1] |
LESKOVEC J, HUTTENLOCHER D, KLEINBERG J. Governance in social media: A case study of the Wikipedia promotion process[C]. Proceedings of the International AAAI Conference on Web and Social Media, 2010, 4(1): 98-105.
|
[2] |
BATTISTON S, PULIGA M, KAUSHIK R, et al. Debtrank: Too central to fail? financial networks, the fed and systemic risk[J]. Scientific reports, 2012, 2(1): 1-6.
|
[3] |
YI H C, YOU Z H, HUANG D S, et al. Graph representation learning in bioinformatics: trends, methods and applications[J]. Briefings in Bioinformatics, 2022, 23(1): bbab340.
doi: 10.1093/bib/bbab340
|
[4] |
WU Y, DAI H N, TANG H. Graph neural networks for anomaly detection in industrial internet of things[J]. IEEE Internet of Things Journal, 2021, 9(12): 9214-9231.
doi: 10.1109/JIOT.2021.3094295
|
[5] |
LOW Y, GONZALEZ J E, KYROLA A, et al GraphLab: a new framework for parallel machine learning[C]. Proceedings of the Twenty-Sixth Conference on Uncertainty in Artificial Intelligence, 2010: 340-349.
|
[6] |
PÉREZ J, ARENAS M, GUTIERREZ C. Semantics and complexity of SPARQL[J]. ACM Transactions on Database Systems (TODS), 2009, 34(3): 1-45.
|
[7] |
REN K, WANG C, WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1):69-73.
|
[8] |
GALLAGHER B. Matching structure and semantics: a survey on graph-based pattern matching[C]. AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection, 2006:45.
|
[9] |
YAO C C. How to generate and exchange secrets[C]. 27th annual symposium on foundations of computer science (Sfcs 1986), IEEE, 1986: 162-167.
|
[10] |
CAO N, YANG Z, WANG C, REN K, LOU W. Privacy-preserving query over encrypted graph-structured data in cloud computing[C]. 2011 31st International Conference on Distributed Computing Systems, IEEE, 2011: 393-402.
|
[11] |
CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on parallel and distributed systems, 2013, 25(1): 222-233.
doi: 10.1109/TPDS.2013.45
|
[12] |
WONG W K, CHEUNG D W, KAO B, et al. Secure kNN computation on encrypted databases[C]. Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, 2009: 139-152.
|
[13] |
ZOU L, CHEN L, ÖZSU M T. K-automorphism: A general framework for privacy preserving network publication[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 946-957.
doi: 10.14778/1687627.1687734
|
[14] |
CHANG Z, ZOU L, LI F. Privacy preserving subgraph matching on large graphs in cloud[C]. Proceedings of the 2016 International Conference on Management of Data, 2016: 199-213.
|
[15] |
SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty, Fuzziness and Kno-wledge-Based Systems, 2002, 10(5): 571-588.
|
[16] |
MOHASSEL P, RINDAL P. ABY3: A mixed protocol framework for machine learning[C]. Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018: 35-52.
|
[17] |
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
doi: 10.1145/359168.359176
|
[18] |
MOHASSEL P, RINDAL P, ROSULEK M. Fast database joins and PSI for secret shared data[C]. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020: 1271-1287.
|
[19] |
BADRINARAYANAN S, DAS S, GARIMELLA G, et al. Secret-shared joins with multiplicity from aggregation trees[C]. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022: 209-222.
|
[20] |
DE CRISTOFARO E, TSUDIK G. Practical private set intersection protocols with linear complexity[C]. Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers 14. Springer Berlin Heidelberg, 2010: 143-159.
|
[21] |
BOGDANOV D, LAUR S, TALVISTE R. A practical analysis of oblivious sorting algorithms for secure multi-party computation[C]. Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings 19. Springer International Publishing, 2014: 59-74.
|
[22] |
LAI L, QIN L, LIN X, et al. Scalable distributed subgraph enumeration[J]. Proceedings of the VLDB Endowment, 2016, 10(3): 217-228.
doi: 10.14778/3021924.3021937
|