暂无分享,去创建一个
[1] Fred W. Glover,et al. Tabu Search - Part I , 1989, INFORMS J. Comput..
[2] Dániel Marx,et al. RAPH COLORING PROBLEMS AND THEIR APPLICATIONS IN SCHEDULING , 2022 .
[3] Fei Wang,et al. Overlapping Clustering with Sparseness Constraints , 2012, 2012 IEEE 12th International Conference on Data Mining Workshops.
[4] Fred Glover,et al. Tabu Search - Part II , 1989, INFORMS J. Comput..
[5] Ravindra K. Ahuja,et al. Inverse Optimization , 2001, Oper. Res..
[6] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[7] Yuan Hong,et al. A distance matrix based algorithm for solving the traveling salesman problem , 2020, Oper. Res..
[8] Sanjay Goel,et al. Discovering energy communities for microgrids on the power grid , 2017, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[9] Lingyu Wang,et al. Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status , 2017, IEEE Transactions on Information Forensics and Security.
[10] Jaideep Vaidya,et al. Accurate and efficient query clustering via top ranked search results , 2016, Web Intell..
[11] Shigenobu Kobayashi,et al. A genetic algorithm for privacy preserving combinatorial optimization , 2007, GECCO '07.
[12] Vijayalakshmi Atluri,et al. Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition , 2012, IEEE Transactions on Dependable and Secure Computing.
[13] Shengbin Wang,et al. Integrated post-disaster medical assistance team scheduling and relief supply distribution , 2018, The International Journal of Logistics Management.
[14] Yuan Hong,et al. Efficient Energy Consumption Scheduling: Towards Effective Load Leveling , 2017 .
[15] Jaideep Vaidya,et al. A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications , 2014, J. Inf. Syst..
[16] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[17] Haibing Lu,et al. Search Engine Query Clustering Using Top-k Search Results , 2011, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.
[18] Jaideep Vaidya. A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[19] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[20] Jaideep Vaidya,et al. Differentially private search log sanitization with optimal output utility , 2011, EDBT '12.
[21] Jaideep Vaidya,et al. Secure and efficient distributed linear programming , 2012, J. Comput. Secur..
[22] Sanjay Goel,et al. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility , 2015, IEEE Transactions on Dependable and Secure Computing.
[23] Marius-Calin Silaghi,et al. The effect of policies for selecting the solution of a DisCSP on privacy loss , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[24] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[25] Ananth Grama,et al. An efficient protocol for Yao's millionaires' problem , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[26] Basit Shafiq,et al. Privacy-Preserving Tabu Search for Distributed Graph Coloring , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[27] Jaideep Vaidya,et al. Privacy-preserving linear programming , 2009, SAC '09.
[28] Jaideep Vaidya,et al. Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure , 2014, DBSec.
[29] Xiaohang Yue,et al. On the Robust and Stable Flowshop Scheduling Under Stochastic and Dynamic Disruptions , 2017, IEEE Transactions on Engineering Management.
[30] Marius-Calin Silaghi,et al. Distributed constraint satisfaction and optimization with privacy enforcement , 2004 .
[31] Vijayalakshmi Atluri,et al. Effective anonymization of query logs , 2009, CIKM.
[32] Hicham G. Elmongui,et al. Secure supply-chain protocols , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[33] Sanjay Goel,et al. An efficient and privacy‐preserving scheme for P2P energy exchange among smart microgrids , 2016 .
[34] Sanjay Goel,et al. Smart Grid Security , 2015, SpringerBriefs in Cybersecurity.
[35] Jaideep Vaidya,et al. An inference–proof approach to privacy-preserving horizontally partitioned linear programs , 2014, Optim. Lett..
[36] Makoto Yokoo,et al. Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information , 2002, CP.
[37] Privacy-preserving collaborative optimization , 2013 .
[38] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[39] Makoto Yokoo,et al. Secure Generalized Vickrey Auction Using Homomorphic Encryption , 2003, Financial Cryptography.
[40] Yanjiang Yang,et al. Towards user-oriented RBAC model , 2013, J. Comput. Secur..
[41] Han Wang,et al. Privacy Preserving and Collusion Resistant Energy Sharing , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[42] Vijayalakshmi Atluri,et al. Extended Boolean Matrix Decomposition , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[43] Jaideep Vaidya,et al. Efficient Distributed Linear Programming with Limited Disclosure , 2011, DBSec.