移动社会网络中基于全局信任模型的用户影响力计算 https://www.ccf.org.cn/upload/resources/image/2022/05/06/190213.png 2022-05-06
http://www.c-s-a.org.cn/csa/article/pdf/8391
Location and Trajectory Identification from Microblogs https://www.ccf.org.cn/upload/resources/image/2022/05/06/190209.png 2022-05-06
https://jcst.ict.ac.cn/EN/10.1007/s11390-019-1939-3
政务大数据安全防护能力建设:基于技术和管理视角的探讨 https://dl.ccf.org.cn/file_server/20220409/114_217_233_65/ppp/19451080e4ed4189b51192fc8dcfe642.jpg 2022-05-06
https://dl.ccf.org.cn/article/articleDetail.html?id=5909043052136448&type=qkwz
社交网络用户隐私泄露量化评估方法 https://dl.ccf.org.cn/file_server/20210827/159_226_43_5/gcykx21-8/5ad6fdfd704948e98612e854edea0eb1.jpg 2022-05-06
https://dl.ccf.org.cn/article/articleDetail.html?id=5590408014202880&type=qkwz
社会网络中基于节点平均度的k-度匿名隐私保护方案 https://www.ccf.org.cn/upload/resources/image/2022/05/06/190214.png 2022-05-06
http://www.c-s-a.org.cn/csa/article/pdf/8230