1. Ashok, V., Navuluri, K., Alhafdhi, A., Mukkamala, R.: Dataless data mining: association rules-based distributed privacy-preserving data mining. In: 12th International Conference on Information Technology—New Generations (ITNG), 2015, pp. 615–620 (2015)
2. Bertino, E., Lin, D., Jiang, W.: A survey of quantification of privacy preserving data mining algorithms. In: Privacy-preserving data mining, vol. 34, pp. 183–205. Springer (2008)
3. Bogan, E., English, J.: Benchmarking for Best Practices: Winning Through Innovative Adaptation (1994)
4. Brown, G., Pocock, A.C., Zhao, M., Luján, M.: Conditional likelihood maximisation: a unifying framework for information theoretic feature selection. J. Mach. Learn. Res. 13, 27–66 (2012)
5. Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 486–497. CCS 07, ACM (2007)