[4]
D. Cynthia, Differential privacy, in Encyclopedia of Cryptography and Security. Springer, 2011, pp. 338-340.
[5]
U. Caroline, A. Slavkovic, and S. E. Fienberg, Privacy preserving data sharing for genome-wide association studies, Journal of Privacy and Confidentiality, vol. 5, no. 1, p. 137, 2013.
[6]
S. Wang, N. Mohammed, and R. Chen, Differentially private genome data dissemination through top-down specialization, BMC Medical Informatics and Decision Making, vol. 14, no. S1, p. S2, 2014.
[7]
S. Simmons and B. Berger, Realizing privacy preserving genome-wide association studies, Bioinformatics, vol. 32, no. 9, pp. 1293-1300, 2016.
[8]
A. Johnson and V. Shmatikov, Privacy-preserving data exploration in genome-wide association studies, in Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013, pp. 1079-1087.
[9]
S. Sankararaman, G. Obozinski, M. I. Jordan, and E. Halperin, Genomic privacy and limits of individual detection in a pool, Nature Genetics, vol. 41, no. 9, pp. 965-967, 2009.
[10]
N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, J. Muehling, J. V. Pearson, D. A. Stephan, S. F. Nelson, and D. W. Craig, Resolving individuals contributing trace amounts of DNA to highly complex mixtures using highdensity SNP genotyping microarrays, PLoS Genet., vol. 4, no. 8, p. e1000167, 2008.
[11]
Z. Cai, Z. He, X. Guan, and Y. Li, Collective datasanitization for preventing sensitive information inference attacks in social networks, IEEE Transactions on Dependable and Secure Computing, .
[12]
Z. He, Z. Cai, Y. Sun, Y. Li, and X. Cheng, Customized privacy preserving for inherent data and latent data, Personal Ubiquitous Comput., vol. 21, no. 1, pp. 1-12, 2017.
[13]
M. Han, M. Yan, Z. Cai, Y. Li, X. Cai, and J. Yu, Influence maximization by probing partial communities in dynamic online social networks, Transactions on Emerging Telecommunications Technologies, vol. 28, no. 4, 2016.
[14]
M. Han, M. Yan, Z. Cai, and Y. Li, An exploration of broader influence maximization in timeliness networks with opportunistic selection, Journal of Network and Computer Applications, vol. 63, pp. 39-49, 2016.
[15]
Z. He, Z. Cai, and J. Yu, Latent-data privacy preserving with customized data utility for social network data, IEEE Transactions on Vehicular Technology, .
[16]
M. Jiang and Y. Zhang, Perfect domination and small cycles, Discrete Mathematics, Algorithms and Applications, vol. 9, no. 3, 2017.
[17]
M. V. Dhanyamol and S. Mathew, On transit functions in weighted graphs, Discrete Mathematics, Algorithms and Applications, vol. 9, no. 3, 2017.
[18]
L. Zhang, Z. Cai, and X. Wang, Fakemask: A novel privacy preserving approach for smartphones, IEEE Transactions on Network and Service Management, vol. 13, no. 2, pp. 335-348, 2016.
[19]
Z. He, Z. Cai, Q. Han, W. Tong, L. Sun, and Y. Li, An energy efficient privacy-preserving content sharing scheme in mobile social networks, Personal Ubiquitous Comput., vol. 20, no.5, pp. 1-14, 2016.
[20]
X. Zheng, Z. Cai, J. Li, and H. Gao, Location privacy-aware review publication mechanism for local business service systems, in The 36th Annual IEEE International Conference on Computer Communications, 2017.
[21]
Y. E. Sun, H. Huang, X. Y. Li, Y. Du, M. Tian, H. Xu, and M. Xiao, Privacy-preserving strategy-proof auction mechanisms for resource allocation, Tsinghua Science and Technology, vol. 22, no. 2, pp. 119-134, 2017.
[22]
B. Zhao, Y. Xiao, Y. Huang, and X. Cui, A private user data protection mechanism in trust-zone architecture based on identity authentication, Tsinghua Science and Technology, vol. 22, no. 2, pp. 218-225, 2017.
[23]
X. Zheng, G. Luo, and Z. Cai, A fair mechanism for private data publication in online social networks, IEEE Transactions on Network Science and Engineering, 2018. (Accepted)
[24]
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta, Discovering frequent patterns in sensitive data, in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2010.
[25]
M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti, Addressing the concerns of the lacks family: Quantification of kin genomic privacy, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013, pp. 1141-1152.