Author:
Lekshmy P. L.,Abdul Rahiman M.
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference18 articles.
1. Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.:. Privacy-preserving user clustering in a social network. In First IEEE International Workshop on Information Forensics and Security (WIFS), pp. 96–100. IEEE, New York (2009)
2. Qi, X., Zong, M.: An overview of privacy preserving data mining school of technology. In: International Conference on Environmental Science and Engineering (ICESE 2011). Harbin University, Harbin, 150086
3. Sachan, A., Roy, D., Arun, P. V.: An analysis of privacy preservation techniques in data mining. In: Advances in Computing and Information Technology. Springer Berlin Heidelberg, pp. 119–128, (2013)
4. Vaidya, J., Clifton, C.W.: Privacy-preserving kth element score over vertically partitioned data. IEEE Trans. Knowl. Data Eng. 21(2), 253–258 (2009)
5. Januzaj, E., Kriegel, H.P., Pfeifle, M.: Towards effective and efficient distributed clustering. In: Workshop on Clustering Large Data Sets (ICDM2003). (2003)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献