-
1
-
-
81055138684
-
-
Zürich, Switzerland: McKinsey Global Inst., Jun.
-
J. Manyika et al., Big data: The Next Frontier for Innovation, Competition, and Productivity. Zürich, Switzerland: McKinsey Global Inst., Jun. 2011, pp. 1-137.
-
(2011)
Big Data: The Next Frontier for Innovation, Competition, and Productivity
, pp. 1-137
-
-
Manyika, J.1
-
2
-
-
84928476745
-
Big data security and privacy: A review
-
Apr.
-
B. Matturdi, X. Zhou, S. Li, and F. Lin, "Big data security and privacy: A review," China Commun., vol. 11, no. 14, pp. 135-145, Apr. 2014.
-
(2014)
China Commun.
, vol.11
, Issue.14
, pp. 135-145
-
-
Matturdi, B.1
Zhou, X.2
Li, S.3
Lin, F.4
-
3
-
-
83755217707
-
Extracting value from chaos
-
Jun.
-
J. Gantz and D. Reinsel, "Extracting value from chaos," in Proc. IDC IView, Jun. 2011, pp. 1-12.
-
(2011)
Proc. IDC IView
, pp. 1-12
-
-
Gantz, J.1
Reinsel, D.2
-
4
-
-
84886540532
-
Big data: Issues, challenges, tools and good practices
-
Aug.
-
A. Katal, M. Wazid, and R. H. Goudar, "Big data: Issues, challenges, tools and good practices," in Proc. IEEE Int. Conf. Contemp. Comput., Aug. 2013, pp. 404-409.
-
(2013)
Proc. IEEE Int. Conf. Contemp. Comput.
, pp. 404-409
-
-
Katal, A.1
Wazid, M.2
Goudar, R.H.3
-
5
-
-
84923317932
-
Information security in big data: Privacy and data mining
-
Oct.
-
L. Xu, C. Jiang, J.Wang, J. Yuan, and Y. Ren, "Information security in big data: Privacy and data mining," in IEEE Access, vol. 2, pp. 1149-1176, Oct. 2014.
-
(2014)
IEEE Access
, vol.2
, pp. 1149-1176
-
-
Xu, L.1
Jiang, C.2
Wang, J.3
Yuan, J.4
Ren, Y.5
-
6
-
-
84923224316
-
Toward scalable systems for big data analytics: A technology tutorial
-
Jul.
-
H. Hu, Y. Wen, T.-S. Chua, and X. Li, "Toward scalable systems for big data analytics: A technology tutorial," IEEE Access, vol. 2, pp. 652-687, Jul. 2014.
-
(2014)
IEEE Access
, vol.2
, pp. 652-687
-
-
Hu, H.1
Wen, Y.2
Chua, T.-S.3
Li, X.4
-
7
-
-
84877272118
-
Security and privacy in cloud computing
-
May
-
Z. Xiao and Y. Xiao, "Security and privacy in cloud computing," IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 843-859, May 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
8
-
-
84933038219
-
Secure big data storage and sharing scheme for cloud tenants
-
Jun.
-
C. Hongbing, R. Chunming, H. Kai,W.Weihong, and L. Yanyan, "Secure big data storage and sharing scheme for cloud tenants," China Commun., vol. 12, no. 6, pp. 106-115, Jun. 2015.
-
(2015)
China Commun.
, vol.12
, Issue.6
, pp. 106-115
-
-
Hongbing, C.1
Chunming, R.2
Kai, H.3
Weihong, W.4
Yanyan, L.5
-
9
-
-
84905923774
-
Privacy-preserving multikeyword ranked search over encrypted cloud data
-
Jan.
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multikeyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst.,vol. 25, no. 1, pp. 222-233, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
10
-
-
84979823573
-
Data security and privacy in cloud using RC6 and SHA algorithms
-
Jun.
-
O. M. Soundararajan, Y. Jenifer, S. Dhivya, and T. K. P. Rajagopal, "Data security and privacy in cloud using RC6 and SHA algorithms," Netw. Commun. Eng., vol. 6, no. 5, pp. 202-205, Jun. 2014.
-
(2014)
Netw. Commun. Eng.
, vol.6
, Issue.5
, pp. 202-205
-
-
Soundararajan, O.M.1
Jenifer, Y.2
Dhivya, S.3
Rajagopal, T.K.P.4
-
11
-
-
84940103492
-
Cloud data security using authentication and encryption technique
-
Jul.
-
S. Singla and J. Singh, "Cloud data security using authentication and encryption technique," Global J. Comput. Sci. Technol., vol. 13, no. 3, pp. 2232-2235, Jul. 2013.
-
(2013)
Global J. Comput. Sci. Technol.
, vol.13
, Issue.3
, pp. 2232-2235
-
-
Singla, S.1
Singh, J.2
-
12
-
-
33745634018
-
-
NAS, iSCSI, InfiniBand and FCoE. New York, NY, USA: Wiley
-
U. Troppens, R. Erkens, W. Muller-Friedt, R. Wolafka, and N. Haustein, Storage Networks Explained: Basics and Application of Fibre Channel SAN, NAS, iSCSI, InfiniBand and FCoE. New York, NY, USA: Wiley, 2011.
-
(2011)
Storage Networks Explained: Basics and Application of Fibre Channel SAN
-
-
Troppens, U.1
Erkens, R.2
Muller-Friedt, W.3
Wolafka, R.4
Haustein, N.5
-
14
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Oct.
-
V. Goyal, O. Pandey, A. Sahai, and B.Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Secur., Oct. 2006, pp. 89-98.
-
(2006)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
15
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Int. Conf. Secur. Privacy, May 2007, pp. 321-334.
-
(2007)
Proc. IEEE Int. Conf. Secur. Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
16
-
-
84886903289
-
DAC-MACS: Effective data access control for multiauthority cloud storage systems
-
Nov.
-
K. Yang, X. Jia, K. Ren, B. Zhang, and R. Xie, "DAC-MACS: Effective data access control for multiauthority cloud storage systems," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1790-1801, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1790-1801
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
Xie, R.5
-
17
-
-
84903121888
-
Expressive, efficient, and revocable data access control for multi-Authority cloud storage
-
Jul.
-
K. Yang and X. Jia, "Expressive, efficient, and revocable data access control for multi-Authority cloud storage," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.7
, pp. 1735-1744
-
-
Yang, K.1
Jia, X.2
-
18
-
-
84961742903
-
Secure and verifiable policy update outsourcing for big data access control in the cloud
-
Dec.
-
K. Yang, X. Jia, and K. Ren, "Secure and verifiable policy update outsourcing for big data access control in the cloud," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 12, pp. 3461-3470, Dec. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.12
, pp. 3461-3470
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
19
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
Aug.
-
X. Boyen and B.Waters, "Anonymous hierarchical identity-based encryption (without random oracles)," in Proc. Adv. Cryptol. (ASIACRYPT), vol. 4117. Aug. 2006, pp. 290-307.
-
(2006)
Proc. Adv. Cryptol. (ASIACRYPT).
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
20
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
M. Mambo and E. Okamoto, "Proxy cryptosystems: Delegation of the power to decrypt ciphertexts," Fundam. Electron., Commun. Comput. Sci., vol. E80-A, no. 1, pp. 54-63, 1997.
-
(1997)
Fundam. Electron., Commun. Comput. Sci.
, vol.E80-A
, Issue.1
, pp. 54-63
-
-
Mambo, M.1
Okamoto, E.2
-
21
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. Adv. Cryptol. (ASIACRYPT), 1998, pp. 127-144.
-
(1998)
Proc. Adv. Cryptol. (ASIACRYPT).
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
23
-
-
84864797570
-
Anonymous ID-based proxy re-encryption
-
Jul.
-
J. Shao, "Anonymous ID-based proxy re-encryption," in Proc. Int. Conf. Inf. Secur. Privacy, vol. 7372. Jul. 2012, pp. 364-375.
-
(2012)
Proc. Int. Conf. Inf. Secur. Privacy
, vol.7372
, pp. 364-375
-
-
Shao, J.1
-
24
-
-
84933040096
-
Privacy-preserving ciphertext multisharing control for big data storage
-
Aug.
-
K. Liang, W. Susilo, and J. K. Liu, "Privacy-preserving ciphertext multisharing control for big data storage," IEEE Trans. Inf. Forensics Security, vol. 10, no. 8, pp. 1578-1589, Aug. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.8
, pp. 1578-1589
-
-
Liang, K.1
Susilo, W.2
Liu, J.K.3
-
25
-
-
77649261628
-
-
Ph.D. Dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA
-
C. Gentry, "A fully homomorphic encryption scheme," Ph.D. Dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA, 2009.
-
(2009)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
26
-
-
84970003207
-
Trustworthy processing of healthcare big data in hybrid clouds
-
Mar./Apr.
-
S. Nepal, R. Ranjan, and K.-K. R. Choo, "Trustworthy processing of healthcare big data in hybrid clouds," IEEE Trans. Cloud Comput., vol. 2, no. 2, pp. 78-84, Mar./Apr. 2015.
-
(2015)
IEEE Trans. Cloud Comput.
, vol.2
, Issue.2
, pp. 78-84
-
-
Nepal, S.1
Ranjan, R.2
Choo, K.-K.R.3
-
27
-
-
84904510325
-
Achieving big data privacy via hybrid cloud
-
Apr.
-
X. Huang and X. Du, "Achieving big data privacy via hybrid cloud," in Proc. Int. Conf. INFOCOM, Apr. 2014, pp. 512-517.
-
(2014)
Proc. Int. Conf. INFOCOM
, pp. 512-517
-
-
Huang, X.1
Du, X.2
-
28
-
-
84906247213
-
Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
-
Sep.
-
C. Liu et al., "Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2234-2244, Sep. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.9
, pp. 2234-2244
-
-
Liu, C.1
-
29
-
-
84900353889
-
Public auditing for big data storage in cloud computing-A survey
-
Dec.
-
C. Liu, R. Ranjan, X. Zhang, C. Yang, D. Georgakopoulos, and J. Chen, "Public auditing for big data storage in cloud computing-A survey," in Proc. IEEE Int. Conf. Comput. Sci. Eng., Dec. 2013, pp. 1128-1135.
-
(2013)
Proc. IEEE Int. Conf. Comput. Sci. Eng.
, pp. 1128-1135
-
-
Liu, C.1
Ranjan, R.2
Zhang, X.3
Yang, C.4
Georgakopoulos, D.5
Chen, J.6
-
30
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Jan.
-
R. C. Merkle, "A digital signature based on a conventional encryption function," in Proc. Adv. Cryptol. (CRYPTO), Jan. 1988, pp. 369-378.
-
(1988)
Proc. Adv. Cryptol. (CRYPTO).
, pp. 369-378
-
-
Merkle, R.C.1
-
33
-
-
79959823910
-
Remote data checking using provable data possession
-
May
-
G. Ateniese et al., "Remote data checking using provable data possession," Trans. Inf. Syst. Secur., vol. 14, no. 1, May 2011, Art. no. 12.
-
(2011)
Trans. Inf. Syst. Secur.
, vol.14
, Issue.1
-
-
Ateniese, G.1
-
34
-
-
84910598312
-
Outsourced proofs of retrievability
-
Nov.
-
F. Armknecht, J.-M. Bohli, G. O. Karame, Z. Liu, and C. A. Reuter, "Outsourced proofs of retrievability," in Proc. ACM Conf. Comput. Commun. Secur., Nov. 2014, pp. 831-843.
-
(2014)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 831-843
-
-
Armknecht, F.1
Bohli, J.-M.2
Karame, G.O.3
Liu, Z.4
Reuter, C.A.5
-
36
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q.Wang, C.Wang, K. Ren,W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Li, J.4
-
37
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Mar.
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. IEEE Int. Conf. INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE Int. Conf. INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
38
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Jun.
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, no. 4, Jun. 2010, Art. no. 14.
-
(2010)
ACM Comput. Surv.
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
39
-
-
84918548025
-
Privacy-preserving data publishing: An overview
-
R. C. W. Wong and A. W.-C. Fu, "Privacy-preserving data publishing: An overview," Synth. Lectures Data Manage., vol. 2, no. 1, pp. 1-138, 2010.
-
(2010)
Synth. Lectures Data Manage.
, vol.2
, Issue.1
, pp. 1-138
-
-
Wong, R.C.W.1
Fu, A.W.-C.2
-
40
-
-
0036811662
-
Anonymity: A model for protecting privacy
-
L. Sweeney, "anonymity: A model for protecting privacy," Int. J. Uncer-Tainty, Fuzziness Knowl. Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncer-Tainty, Fuzziness Knowl. Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
41
-
-
28444449426
-
Data privacy through optimal -Anonymization
-
Apr.
-
R. J. Bayardo and R. Agrawal, "Data privacy through optimal -Anonymization," in Proc. Int. Conf. Data Eng., Apr. 2005, pp. 217-228.
-
(2005)
Proc. Int. Conf. Data Eng.
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
42
-
-
33749606641
-
Mondrian multidimensional k-Anonymity
-
Apr.
-
K. LeFevre, D. J. Dewitt, and R. Ramakrishnan, "Mondrian multidimensional k-Anonymity," in Proc. Int. Conf. Data Eng., Apr. 2006, p. 25.
-
(2006)
Proc. Int. Conf. Data Eng.
, pp. 25
-
-
LeFevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
43
-
-
41849123637
-
Utility-based anonymization for privacy preservation with less information loss
-
Dec.
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, "Utility-based anonymization for privacy preservation with less information loss," ACM SIGKDD Explorations Newslett., vol. 8, no. 2, pp. 21-30, Dec. 2006.
-
(2006)
ACM SIGKDD Explorations Newslett.
, vol.8
, Issue.2
, pp. 21-30
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.-C.6
-
44
-
-
69549119179
-
Anonymization with minimal loss of information
-
Feb.
-
A. Gionis and T. Tassa, "anonymization with minimal loss of information," IEEE Trans. Knowl. Data Eng., vol. 21, no. 2, pp. 206-219, Feb. 2009.
-
(2009)
IEEE Trans. Knowl. Data Eng.
, vol.21
, Issue.2
, pp. 206-219
-
-
Gionis, A.1
Tassa, T.2
-
45
-
-
84942327005
-
Privacy or utility in data collection A contract theoretic approach
-
Oct.
-
L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. Ray Liu, "Privacy or utility in data collection A contract theoretic approach," IEEE J. Sel. Topics Signal Process., vol. 9, no. 7, pp. 1256-1269, Oct. 2015.
-
(2015)
IEEE J. Sel. Topics Signal Process.
, vol.9
, Issue.7
, pp. 1256-1269
-
-
Xu, L.1
Jiang, C.2
Chen, Y.3
Ren, Y.4
Ray Liu, K.J.5
-
46
-
-
84893405732
-
Data clustering: A review
-
Sep.
-
A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering: A review," ACM Comput. Surv., vol. 31, no. 3, pp. 264-323, Sep. 1999.
-
(1999)
ACM Comput. Surv.
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
48
-
-
84908602473
-
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
-
Sep.
-
A. Fahad et al., "A survey of clustering algorithms for big data: Taxonomy and empirical analysis," IEEE Trans. Emerg. Topics Comput., vol. 2, no. 3, pp. 267-279, Sep. 2014.
-
(2014)
IEEE Trans. Emerg. Topics Comput.
, vol.2
, Issue.3
, pp. 267-279
-
-
Fahad, A.1
-
49
-
-
84904893872
-
Big data clustering: A review
-
A. S. Shirkhorshidi, S. R. Aghabozorgi, Y. W. Teh, and T. Herawan, "Big data clustering: A review," in Proc. Int. Conf. Comput. Sci. Appl., 2014, pp. 707-720.
-
(2014)
Proc. Int. Conf. Comput. Sci. Appl.
, pp. 707-720
-
-
Shirkhorshidi, A.S.1
Aghabozorgi, S.R.2
Teh, Y.W.3
Herawan, T.4
-
50
-
-
43549085522
-
Distributed model based sampling technique for privacy preserving clustering
-
Aug.
-
W. Xiao-Dan, Y. Dian-Min, L. Feng-Li, and C. Chao-Hsien, "Distributed model based sampling technique for privacy preserving clustering," in Proc. Int. Conf. Manage. Sci. Eng., Aug. 2007, pp. 192-197.
-
(2007)
Proc. Int. Conf. Manage. Sci. Eng.
, pp. 192-197
-
-
Xiao-Dan, W.1
Dian-Min, Y.2
Feng-Li, L.3
Chao-Hsien, C.4
-
51
-
-
84873151200
-
CloudVista: Interactive and economical visual cluster analysis for big data in the cloud
-
H. Xu, Z. Li, S. Guo, and K. Chen, "CloudVista: Interactive and economical visual cluster analysis for big data in the cloud," in Proc. VLDB Endowment, 2012, pp. 1886-1889.
-
(2012)
Proc. VLDB Endowment
, pp. 1886-1889
-
-
Xu, H.1
Li, Z.2
Guo, S.3
Chen, K.4
-
52
-
-
78649884242
-
Privacy preserving distributed learning clustering of healthcare data using cryptography protocols
-
Jul.
-
A. M. Elmisery and H. Fu, "Privacy preserving distributed learning clustering of healthcare data using cryptography protocols," in Proc. IEEE 34th Annu. Comput. Softw. Appl. Conf. Workshops, Jul. 2010, pp. 140-145.
-
(2010)
Proc. IEEE 34th Annu. Comput. Softw. Appl. Conf. Workshops
, pp. 140-145
-
-
Elmisery, A.M.1
Fu, H.2
-
53
-
-
84876035763
-
Turning big data into tiny data: Constant-size coresets for k-means, PCA and projective clustering
-
D. Feldman, M. Schmidt, and C. Sohler, "Turning big data into tiny data: Constant-size coresets for k-means, PCA and projective clustering," in Proc. ACM-SIAM Symp. Discrete Algorithms, 2013, pp. 1434-1453.
-
(2013)
Proc. ACM-SIAM Symp. Discrete Algorithms
, pp. 1434-1453
-
-
Feldman, D.1
Schmidt, M.2
Sohler, C.3
-
55
-
-
28844447994
-
Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation
-
S. R. M. Oliveira and O. R. Zaane, "Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation," in Proc. ICDM Workshop Privacy Security Aspects Data Mining, 2004, pp. 40-46.
-
(2004)
Proc. ICDM Workshop Privacy Security Aspects Data Mining
, pp. 40-46
-
-
Oliveira, S.R.M.1
Zaane, O.R.2
-
56
-
-
84903288977
-
Distributed information theoretic clustering
-
Jul.
-
P. Shen and C. Li, "Distributed information theoretic clustering," IEEE Trans. Signal Process., vol. 62, no. 13, pp. 3442-3453, Jul. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.13
, pp. 3442-3453
-
-
Shen, P.1
Li, C.2
-
57
-
-
84897696286
-
Distributed online Big Data classi-cation using context information
-
Oct.
-
C. Tekin and M. Van Der Schaar, "Distributed online Big Data classi-cation using context information," in Proc. Int. Conf. Commun., Control, Comput., Oct. 2013, pp. 1435-1442.
-
(2013)
Proc. Int. Conf. Commun., Control, Comput.
, pp. 1435-1442
-
-
Tekin, C.1
Van Der Schaar, M.2
-
60
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evmievski, J. Gehrke, and R. Srikant, "Limiting privacy breaches in privacy preserving data mining," in Proc. ACM Symp. Principles Database Syst., 2003, pp. 211-222.
-
(2003)
Proc. ACM Symp. Principles Database Syst.
, pp. 211-222
-
-
Evmievski, A.1
Gehrke, J.2
Srikant, R.3
-
61
-
-
28444434728
-
A framework for high-Accuracy privacypreserving mining
-
Apr.
-
S. Agrawal and J. R. Haritsa, "A framework for high-Accuracy privacypreserving mining," in Proc. 21st Int. Conf. Data Eng., Apr. 2005, pp. 193-204.
-
(2005)
Proc. 21st Int. Conf. Data Eng.
, pp. 193-204
-
-
Agrawal, S.1
Haritsa, J.R.2
-
62
-
-
33645450094
-
Privacy preserving classification mining
-
G. Weiping, W. Wei, and Z. Haofeng, "Privacy preserving classification mining," J. Comput. Res. Develop., vol. 43, no. 1, pp. 39-45, 2006.
-
(2006)
J. Comput. Res. Develop.
, vol.43
, Issue.1
, pp. 39-45
-
-
Weiping, G.1
Wei, W.2
Haofeng, Z.3
-
63
-
-
78650467990
-
Research on privacy preserving classification data mining based on random perturbation
-
X. Zhang and H. Bi, "Research on privacy preserving classification data mining based on random perturbation," in Proc. Int. Conf. Inf. Netw. Autom., 2010, pp. 173-178.
-
(2010)
Proc. Int. Conf. Inf. Netw. Autom.
, pp. 173-178
-
-
Zhang, X.1
Bi, H.2
-
64
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
J. Han, J. Pei, and Y. Yin, "Mining frequent patterns without candidate generation," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2000, pp. 1-12.
-
(2000)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
65
-
-
84860502035
-
Apriori-based frequent itemset mining algorithms on MapReduce
-
M.-Y. Lin, P.-Y. Lee, and S.-C. Hsueh, "Apriori-based frequent itemset mining algorithms on MapReduce," in Proc. Int. Conf. Ubiquitous Inf. Manage. Commun., 2012, p. 76.
-
(2012)
Proc. Int. Conf. Ubiquitous Inf. Manage. Commun.
, pp. 76
-
-
Lin, M.-Y.1
Lee, P.-Y.2
Hsueh, S.-C.3
-
66
-
-
84871059721
-
PARMA: A parallel randomized algorithm for approximate association rules mining in MapReduce
-
M. Riondato, J. A. DeBrabant, R. Fonseca, and E. Upfal, "PARMA: A parallel randomized algorithm for approximate association rules mining in MapReduce," in Proc. ACM Int. Conf. Inf. Knowl. Manage., 2012, pp. 85-94.
-
(2012)
Proc. ACM Int. Conf. Inf. Knowl. Manage.
, pp. 85-94
-
-
Riondato, M.1
DeBrabant, J.A.2
Fonseca, R.3
Upfal, E.4
-
67
-
-
84923917782
-
Reducing the search space for big data mining for interesting patterns from uncertain data
-
Jun./Jul.
-
C. K.-S. Leung, R. K. MacKinnon, and F. Jiang, "Reducing the search space for big data mining for interesting patterns from uncertain data," in Proc. Int. Conf. Big Data, Jun./Jul. 2014, pp. 315-322.
-
(2014)
Proc. Int. Conf. Big Data
, pp. 315-322
-
-
Leung, C.K.-S.1
MacKinnon, R.K.2
Jiang, F.3
-
69
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evmievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy preserving mining of association rules," in Proc. 8th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2002, pp. 217-228.
-
(2002)
Proc. 8th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 217-228
-
-
Evmievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
72
-
-
84908019121
-
Big data opportunities and challenges: Discussions from data analytics perspectives [discussion forum]
-
Nov.
-
Z.-H. Zhou, N.-V. Chawla, Y. Jin, and G. J. Williams, "Big data opportunities and challenges: Discussions from data analytics perspectives [discussion forum]," IEEE Comput. Intell. Mag., vol. 9, no. 4, pp. 62-74, Nov. 2014.
-
(2014)
IEEE Comput. Intell. Mag.
, vol.9
, Issue.4
, pp. 62-74
-
-
Zhou, Z.-H.1
Chawla, N.-V.2
Jin, Y.3
Williams, G.J.4
|