4Zhi-Hao Zhang,Xiao-Ming Jin,Jian-Min Wang,De-Yi Li.Watermarking relational database using image. Procoedings of the Third International Conference on Machine Learning and Cybernetics . 2004
6Sion. R,Atallah. M,Sunil Prabhakar.Rights protection for relational data. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data . 2003
7X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
8Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
9Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
10Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)