-
1
-
-
84862609681
-
Training a SVM-based classifier in distributed sensor networks
-
Florence, Italy, Sep
-
Flouri K, Beferull-Lozano B, Tsakalides P (2006) Training a SVM-based classifier in distributed sensor networks. In: European signal processing conference, Florence, Italy, Sep.
-
(2006)
European signal processing conference
-
-
Flouri, K.1
Beferull-Lozano, B.2
Tsakalides, P.3
-
2
-
-
85172423269
-
JAM: java agent for meta-learning over distributed databases
-
Stolfo SJ, Prodromidis AL, Tselepis S, Lee W, Fan DW, Chan PK (1997) JAM: java agent for meta-learning over distributed databases. In: Proceedings of ACM SIGKDD international conference on knowledge discovery data mining, pp 74-81.
-
(1997)
Proceedings of ACM SIGKDD international conference on knowledge discovery data mining
, pp. 74-81
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
3
-
-
33746915636
-
Distributed support vector machines
-
Navia-Vázquez A, Gutiérrez-González D, Parrado-Hernández E, Navarro-Abellán JJ (2006) Distributed support vector machines. IEEE Trans Neural Netw 17(4): 1091-1097.
-
(2006)
IEEE Trans Neural Netw
, vol.17
, Issue.4
, pp. 1091-1097
-
-
Navia-Vázquez, A.1
Gutiérrez-González, D.2
Parrado-Hernández, E.3
Navarro-Abellán, J.J.4
-
5
-
-
51749121564
-
A privacy preserving probabilistic neural network for horizontally partitioned databases
-
Orlando, FL, USA
-
Secretan J, Georgiopoulos M, Castro J (2007) A privacy preserving probabilistic neural network for horizontally partitioned databases. In: Proceedings of international joint conference on neural networks, Orlando, FL, USA.
-
(2007)
Proceedings of international joint conference on neural networks
-
-
Secretan, J.1
Georgiopoulos, M.2
Castro, J.3
-
6
-
-
70350345197
-
Privacy-preserving backpropagation neural network learning
-
Chen T, Zhong S (2009) Privacy-preserving backpropagation neural network learning. IEEE Trans Neural Netw 20(10): 1554-1564.
-
(2009)
IEEE Trans Neural Netw
, vol.20
, Issue.10
, pp. 1554-1564
-
-
Chen, T.1
Zhong, S.2
-
7
-
-
0037361032
-
Predicting drug dissolution profiles with an ensemble of boosted neural networks: a time series approach
-
Goh WY, Lim CP, Peh KK (2003) Predicting drug dissolution profiles with an ensemble of boosted neural networks: a time series approach. IEEE Trans Neural Netw 14(2): 459-463.
-
(2003)
IEEE Trans Neural Netw
, vol.14
, Issue.2
, pp. 459-463
-
-
Goh, W.Y.1
Lim, C.P.2
Peh, K.K.3
-
9
-
-
85127438349
-
Learning with ensembles: how over-fitting can be useful
-
D. S. Touretzky, M. C. Mozer, and M. E. Hasselmo (Eds.), Cambridge, MA: Denvor, CO, MIT Press
-
Sollich P, Krogh A (1996) Learning with ensembles: how over-fitting can be useful. In: Touretzky DS, Mozer MC, Hasselmo ME (eds) Advances, in neural information processing systems 8, Denvor, CO, MIT Press, Cambridge, MA, pp 190-196.
-
(1996)
Advances, in Neural Information Processing Systems 8
, pp. 190-196
-
-
Sollich, P.1
Krogh, A.2
-
10
-
-
85010604994
-
Ensemble methods for handwritten digit recognition
-
IEEE Press, Piscataway, NJ
-
Hansen LK, Liisberg L, Salamon P (1992) Ensemble methods for handwritten digit recognition. In: Proceedings of IEEE workship on neural network for signal processing, Helsingoer, Denmark, IEEE Press, Piscataway, NJ, pp 333-342.
-
(1992)
Proceedings of IEEE workship on neural network for signal processing, Helsingoer, Denmark
, pp. 333-342
-
-
Hansen, L.K.1
Liisberg, L.2
Salamon, P.3
-
11
-
-
13544268431
-
Neural network ensemble strategies for financial decision applications
-
West D, Dellana S, Qian J (2005) Neural network ensemble strategies for financial decision applications. Comput Oper Res 32: 2543-2559.
-
(2005)
Comput Oper Res
, vol.32
, pp. 2543-2559
-
-
West, D.1
Dellana, S.2
Qian, J.3
-
12
-
-
38649113538
-
Using neural network ensembles for bankruptcy prediction and credit scoring
-
Tsai CF, Wu JW (2008) Using neural network ensembles for bankruptcy prediction and credit scoring. Expert Syst Appl 34: 2639-2649.
-
(2008)
Expert Syst Appl
, vol.34
, pp. 2639-2649
-
-
Tsai, C.F.1
Wu, J.W.2
-
13
-
-
0036146402
-
Lung cancer cell identification based on artificial neural network ensembles
-
Zhou ZH, Jiang Y, Yang YB, Chen SF (2002) Lung cancer cell identification based on artificial neural network ensembles. Artif Intell Med 24(1): 25-36.
-
(2002)
Artif Intell Med
, vol.24
, Issue.1
, pp. 25-36
-
-
Zhou, Z.H.1
Jiang, Y.2
Yang, Y.B.3
Chen, S.F.4
-
14
-
-
58149316227
-
Diagnosis of valvular heart disease through neural networks ensembles
-
Das R, Turkoglu I, Sengur A (2009) Diagnosis of valvular heart disease through neural networks ensembles. Comput Methods Programs Biomed 93(2): 185-191.
-
(2009)
Comput Methods Programs Biomed
, vol.93
, Issue.2
, pp. 185-191
-
-
Das, R.1
Turkoglu, I.2
Sengur, A.3
-
15
-
-
0030211964
-
Bagging predictors
-
Breiman L (1996) Bagging predictors. Mach Learn 24(2): 123-140.
-
(1996)
Mach Learn
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
16
-
-
0025448521
-
The strength of weak learnability
-
Schapire RE (1990) The strength of weak learnability. Mach Learn 5(2): 197-227.
-
(1990)
Mach Learn
, vol.5
, Issue.2
, pp. 197-227
-
-
Schapire, R.E.1
-
17
-
-
0031211090
-
A decision theoretic generalization of online learning and an application to boosting
-
Freund Y, Schapire RE (1997) A decision theoretic generalization of online learning and an application to boosting. J Comput Syst Sci 55(1): 119-139.
-
(1997)
J Comput Syst Sci
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
20
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
In: Park C, Chee S (eds) Springer, Berlin
-
Goethals B, Laur S, Lipmma H, Mielikäinen T (2004) On private scalar product computation for privacy-preserving data mining. In: Park C, Chee S (eds) Information security and cryptology-ICISC 2004, vol 3506 of lecture notes in computer science. Springer, Berlin, pp 104-120.
-
(2004)
Information security and cryptology-ICISC 2004, vol 3506 of lecture notes in computer science
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmma, H.3
Mielikäinen, T.4
-
21
-
-
33750333499
-
Privacy-preserving algorithms for distributed mining of frequent itemsets
-
Zhong S (2007) Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf Sci 17(2): 490-503.
-
(2007)
Inf Sci
, vol.17
, Issue.2
, pp. 490-503
-
-
Zhong, S.1
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT, pp 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
IT-31
-
ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory IT-31(4): 469-472.
-
(1985)
IEEE Trans Inf Theory
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
26
-
-
36949019777
-
Oblivious neural network computing via homomorphic encryption
-
10
-
Orlandi C, Piva A, Barni M (2007) Oblivious neural network computing via homomorphic encryption. EURASIP J Inf Secur 2007: 18: 1-18: 10.
-
(2007)
EURASIP J Inf Secur 2007
, vol.18
, pp. 1-18
-
-
Orlandi, C.1
Piva, A.2
Barni, M.3
-
29
-
-
33745834241
-
-
University of California, Department of Information and Computer Science, Irvine, CA [Online]. Available
-
Blake CL, Merz CJ (1998) UCI repository of machine learning database. University of California, Department of Information and Computer Science, Irvine, CA [Online]. Available: http://www. ics. uci. edu/mlearn/MLRepository. htm.
-
(1998)
UCI repository of machine learning database
-
-
Blake, C.L.1
Merz, C.J.2
-
32
-
-
0036495711
-
Boosting algorithms for parallel and distributed learning
-
Lazarevic A, Obradovic Z (2002) Boosting algorithms for parallel and distributed learning. Distrib Parallel Databases 11(2): 203-229.
-
(2002)
Distrib Parallel Databases
, vol.11
, Issue.2
, pp. 203-229
-
-
Lazarevic, A.1
Obradovic, Z.2
-
36
-
-
84974555530
-
Privacy preserving data mining
-
Springer, Berlin
-
Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Lecture notes in computer science, vol 1880. Springer, Berlin, pp 36-44.
-
(2000)
Lecture notes in computer science
, vol.1880
, pp. 36-44
-
-
Lindell, Y.1
Pinkas, B.2
-
37
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
Du W, Zhan Z (2003) Using randomized response techniques for privacy-preserving data mining. In: KDD.
-
(2003)
KDD
-
-
Du, W.1
Zhan, Z.2
|