• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4616374)   Today's Articles (4)   Subscriber (49395)
For: Zhong S. Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf Sci (N Y) 2007. [DOI: 10.1016/j.ins.2006.08.010] [Citation(s) in RCA: 34] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
Number Cited by Other Article(s)
1
Saccá D, Serra E, Rullo A. Extending inverse frequent itemsets mining to generate realistic datasets: complexity, accuracy and emerging applications. Data Min Knowl Discov 2019. [DOI: 10.1007/s10618-019-00643-1] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
2
The relativity of privacy preservation based on social tagging. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.08.015] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
3
Shi J, Chen C, Zhong S. Privacy preserving growing neural gas over arbitrarily partitioned data. Neurocomputing 2014. [DOI: 10.1016/j.neucom.2014.04.033] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
4
Wu ME, Chang SY, Lu CJ, Sun HM. A communication-efficient private matching scheme in Client–Server model. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.01.016] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
5
Privacy-preserving health data collection for preschool children. COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE 2013;2013:501607. [PMID: 24285984 PMCID: PMC3830827 DOI: 10.1155/2013/501607] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Subscribe] [Scholar Register] [Received: 08/21/2013] [Accepted: 09/23/2013] [Indexed: 11/17/2022]
6
Guo S, Zhong S, Zhang A. Privacy-preserving Kruskal-Wallis test. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2013;112:135-45. [PMID: 23871682 DOI: 10.1016/j.cmpb.2013.05.023] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/04/2013] [Revised: 05/17/2013] [Accepted: 05/28/2013] [Indexed: 05/02/2023]
7
Kaleli C, Polat H. Privacy-Preserving Naïve Bayesian Classifier-Based Recommendations on Distributed Data. Comput Intell 2013. [DOI: 10.1111/coin.12012] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
8
Privacy preserving association rule mining over distributed databases using genetic algorithm. Neural Comput Appl 2013. [DOI: 10.1007/s00521-013-1343-9] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
9
Zhang Y, Zhong S. A privacy-preserving algorithm for distributed training of neural network ensembles. Neural Comput Appl 2012. [DOI: 10.1007/s00521-012-1000-8] [Citation(s) in RCA: 11] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
10
A multi-agent recommender system for supporting device adaptivity in e-Commerce. J Intell Inf Syst 2011. [DOI: 10.1007/s10844-011-0160-9] [Citation(s) in RCA: 20] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
11
Toward boosting distributed association rule mining by data de-clustering. Inf Sci (N Y) 2010. [DOI: 10.1016/j.ins.2010.07.020] [Citation(s) in RCA: 11] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
12
Matatov N, Rokach L, Maimon O. Privacy-preserving data mining: A feature set partitioning approach. Inf Sci (N Y) 2010. [DOI: 10.1016/j.ins.2010.03.011] [Citation(s) in RCA: 36] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
13
Magkos E, Maragoudakis M, Chrissikopoulos V, Gritzalis S. Accurate and large-scale privacy-preserving data mining using the election paradigm. DATA KNOWL ENG 2009. [DOI: 10.1016/j.datak.2009.06.003] [Citation(s) in RCA: 24] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
14
Zhong S, Yang Z, Chen T. k-Anonymous data collection. Inf Sci (N Y) 2009. [DOI: 10.1016/j.ins.2009.05.004] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
15
Kim SW, Park S, Won JI, Kim SW. Privacy preserving data mining of sequential patterns for network traffic data. Inf Sci (N Y) 2008. [DOI: 10.1016/j.ins.2007.08.022] [Citation(s) in RCA: 12] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
16
Shundong L, Daoshun W, Yiqi D, Ping L. Symmetric cryptographic solution to Yao’s millionaires’ problem and an evaluation of secure multiparty computations. Inf Sci (N Y) 2008. [DOI: 10.1016/j.ins.2007.07.015] [Citation(s) in RCA: 23] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
17
Shah D, Zhong S. Two methods for privacy preserving data mining with malicious participants. Inf Sci (N Y) 2007. [DOI: 10.1016/j.ins.2007.07.013] [Citation(s) in RCA: 17] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
18
Yun U. Efficient mining of weighted interesting patterns with a strong weight and/or support affinity. Inf Sci (N Y) 2007. [DOI: 10.1016/j.ins.2007.03.018] [Citation(s) in RCA: 66] [Impact Index Per Article: 3.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA