Privacy Preserving Data Mining in Terms of DBSCAN Clustering Algorithm in Distributed Systems
暂无分享,去创建一个
[1] M. Naga Lakshmi,et al. SVD based Data Transformation Methods for Privacy Preserving Clustering , 2013 .
[2] Lotfi A. Zadeh. A Summary and Update of “Fuzzy Logic” , 2010, 2010 IEEE International Conference on Granular Computing.
[3] Chris Clifton,et al. Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.
[4] Vitaly Shmatikov,et al. Privacy-Preserving Classifier Learning , 2009, Financial Cryptography.
[5] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[6] I. Anikin,et al. Pseudo-random number generator based on fuzzy logic , 2016, 2016 International Siberian Conference on Control and Communications (SIBCON).
[7] Animesh Tripathy,et al. A Secure Two Party Hierarchical Clustering Approach for Vertically Partitioned Data Set with Accuracy Measure , 2013, ISI.
[8] lgor Anikin,et al. New Type of Takagi-Sugeno Fuzzy Inference System as Universal Approximator , 2014 .
[9] Somesh Jha,et al. Privacy Preserving Clustering , 2005, ESORICS.
[10] I. Anikin,et al. Fuzzy control based on new type of Takagi-Sugeno fuzzy inference system , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).
[11] Shouhuai Xu,et al. Privacy-Preserving Decision Tree Mining Based on Random Substitutions , 2006, ETRICS.
[12] A. M. Natarajan,et al. An Effective Data Transformation Approach for Privacy Preserving Clustering , 2008 .
[13] Yanchun Zhang,et al. Equally contributory privacy-preserving k-means clustering over vertically partitioned data , 2013, Inf. Syst..
[14] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[15] I. Anikin,et al. Fuzzy stream cipher system , 2015, 2015 International Siberian Conference on Control and Communications (SIBCON).
[16] Igor V. Anikin,et al. Privacy preserving DBSCAN clustering algorithm for vertically partitioned data in distributed systems , 2017, 2017 International Siberian Conference on Control and Communications (SIBCON).
[17] N. Mookhambika,et al. PRIVACY PRESERVING DECISION TREE LEARNING USING UNREALIZED DATA SETS , 2013 .
[18] Keita Emura,et al. Privacy-Preserving Two-Party k-Means Clustering in Malicious Model , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.