Author:
Sheikhalishahi Mina,Mejri Mohamed,Tawbi Nadia,Martinelli Fabio
Publisher
Springer International Publishing
Reference14 articles.
1. Berkhin, P.: A survey of clustering data mining techniques. In: Kogan, J., Nicholas, C., Teboulle, M. (eds.) Grouping Multidimensional Data, pp. 25–71. Springer, Heidelberg (2006)
2. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Explor. Newsl. 4(2), 28–34 (2002)
3. Dershowitz, N., Jouannaud, J.: Rewrite systems. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, vol. b, pp. 243–320. MIT Press, Cambridge (1990)
4. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1–14:53 (2010)
5. Kantarcioǧlu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2004, pp. 599–604. ACM, New York (2004)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction;Communications in Computer and Information Science;2019
2. Privacy-Utility Feature Selection as a tool in Private Data Classification;Distributed Computing and Artificial Intelligence, 14th International Conference;2017-06-21
3. Privacy Preserving Hierarchical Clustering over Multi-party Data Distribution;Security, Privacy, and Anonymity in Computation, Communication, and Storage;2017