1. Tan P-N, Steinbach M, Kumar V (2006) Introduction to data mining. Addison-Wesley, Boston
2. Kumar A, Madanu M, Prakash H, Jonnavithula L, Aravilli SR Advaita: big duplicity detection system. https://arxiv.org/abs/2001.10376
3. Kaosar MG, Paulet R, Yi X (2012) Fully homomorphic encryption based two-party association rule mining. Data Knowl Eng 76–78:1–15
4. Clifton C, Kantarcioglu M, Vaidya J (2002) Defining privacy for data mining. In: National science foundation workshop on next generation data mining
5. Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002) Tools for privacy preserving distributed data mining. SIGKDD Explor Newsl 4:28–34