The following publications are possibly variants of this publication:
- Anonymizing Shortest Paths on Social Network GraphsShyue-Liang Wang, Zheng-Ze Tsai, Tzung-Pei Hong, I-Hsien Ting. aciids 2011: 129-136 [doi]
- k-symmetry model for identity anonymization in social networksWentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zhihui Wang. edbt 2010: 111-122 [doi]
- --anonymization of multiple shortest pathsShyue-Liang Wang, Yu-Chuan Tsai, Tzung-Pei Hong, Hung-Yu Kao. soco, 21(15):4215-4226, 2017. [doi]
- Extending [K 1 , K 2 ] Anonymization of Shortest Paths for Social NetworksYu-Chuan Tsai, Shyue-Liang Wang, Tzung-Pei Hong, Hung-Yu Kao. misnc 2015: 187-199 [doi]
- Shortest Paths Anonymization on Weighted GraphsShyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, I-Hsien Ting, Tzung-Pei Hong. ijseke, 23(1):65-80, 2013. [doi]
- Degree Anonymization for K-Shortest-Path PrivacyShyue-Liang Wang, Ching-chuan Shih, I-Hsien Ting, Tzung-Pei Hong. SMC 2013: 1093-1097 [doi]
- Confining Edge Types in K-anonymization of Shortest PathsYu-Chuan Tsai, Shyue-Liang Wang, Hung-Yu Kao, Tzung-Pei Hong. ibica 2012: 318-322 [doi]
- K-anonymous path privacy on social graphsShyue-Liang Wang, Zheng-Ze Tsai, I.-Hsien Ting, Tzung-Pei Hong. jifs, 26(3):1191-1199, 2014. [doi]
- Utility-Oriented K-Anonymization on Social NetworksYazhe Wang, Long Xie, Baihua Zheng, Ken C. K. Lee. dasfaa 2011: 78-92 [doi]