[1]
Rakesh Agrawal and Rama Krishnan Srikant, Privacy-Preserving Data Mining, Dallas, TX, USA, 2009, pp.439-450.
Google Scholar
[2]
Yehuda Lindell and Benny Pinkas, Privacy-Preserving Data Mining, Santa Barbara, CA, USA, 2010, pp.36-54.
Google Scholar
[3]
Somesh Jha, Louis Kruger, and Patrick Me Daniel, Privacy Presevring Clustering, Milan, Italy, 2010, pp.397-417.
Google Scholar
[4]
Jaideep Vaidya and Chris Clifton, Privacy-Preserving k-means Clustering over Vertically Partitioned Data, Washington DC, USA, 2012, pp.206-215.
DOI: 10.1145/956750.956776
Google Scholar
[5]
C. Clifton, M. Kantarcioglu, and J. Vaidya, Defining Privacy For Data Mining, Baltimore, MD, USA, 2009, pp.126-133.
Google Scholar
[6]
Murat Kantarcioglu and Chris Clifton, Privacy Preserving Distributed Mining of Association Rules on Horizontal Partitioned Data, 16 (2009) 1026-1037.
DOI: 10.1109/tkde.2004.45
Google Scholar
[7]
Saeed Samet and Ali Miri, Privacy Preserving Protocols for Perception Learning Algorithm in Neural Networks, Varna, Bulgaria, 2008, pp.1065-1070.
Google Scholar
[8]
Zhiqiang Yang and Rebacca N. Wright, Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data, 18 (2010) 1253-1264.
DOI: 10.1109/tkde.2006.147
Google Scholar
[9]
R. Rivest, L. Adleman, and M. Dertouzos, On data banks and privacy homomorphisms, R.A. DeMillo (Eds. ), In Foundations of Secure Computation, Academic Press, 1988, pp.169-179.
Google Scholar
[10]
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Prague, Czech Republic, 1999, pp.223-238.
DOI: 10.1007/3-540-48910-x_16
Google Scholar
[11]
J. Zhan, Privacy Preserving Collaborative Data Mining. PhD thesis, Depatrment of Computer Science, University of Ottawa, (2009).
Google Scholar
[12]
J. Vaidya, H. Yu and X. Jiang, Privacy-preserving svm classification, Knowl. Inf. Syst., 14 (2008) 161-178.
DOI: 10.1007/s10115-007-0073-7
Google Scholar
[13]
T. Chen and S. Zhong, Privacy-preserving backpropagation neural network learning, Trans. Neur. Netw., 20 (2009) 1554–1564.
DOI: 10.1109/tnn.2009.2026902
Google Scholar
[14]
W. Du and Z. Zhan, Building decision tree classifier on private data, In IEEE Intertional Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, (2009).
Google Scholar
[15]
Madhushri Banerjee, Zhiyuan Chen, Aryya Gangopadhyay, A generic and distributed privacy preserving classification method with a worst-privacy guarantee, America, 2013, pp.5-35.
DOI: 10.1007/s10619-013-7126-6
Google Scholar