-
1
-
-
33846999288
-
The internet of things
-
J. P. Conti, "The internet of things, " IET Communications Engineer, vol. 4, no. 6, pp. 20-25, 2006.
-
(2006)
IET Communications Engineer
, vol.4
, Issue.6
, pp. 20-25
-
-
Conti, J.P.1
-
2
-
-
84885225988
-
Risk-based adaptive security for smart iot in ehealth
-
Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Oslo, Norway
-
H. Abie and I. Balasingham, "Risk-based adaptive security for smart iot in ehealth, " in Proceedings of the 7th International Conference on Body Area Networks, pp. 269-275, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Oslo, Norway, 2012.
-
(2012)
Proceedings of the 7th International Conference on Body Area Networks
, pp. 269-275
-
-
Abie, H.1
Balasingham, I.2
-
3
-
-
22144477475
-
What is eHealth (3): A systematic review of published definitions
-
H. Oh, C. Rizo, M. Enkin et al., "What is eHealth (3): a systematic review of published definitions, " Journal ofMedical Internet Research, vol. 7, no. 1, 2005.
-
(2005)
Journal OfMedical Internet Research
, vol.7
, Issue.1
-
-
Oh, H.1
Rizo, C.2
Enkin, M.3
-
4
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: a survey, " ComputerNetworks, vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
ComputerNetworks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
5
-
-
77954057403
-
Donor research and matching system based on data mining in organ transplantation
-
A. S. Koyuncugil andN. Ozgulbas, "Donor research and matching system based on data mining in organ transplantation, " Journal of Medical Systems, vol. 34, no. 3, pp. 251-259, 2010.
-
(2010)
Journal of Medical Systems
, vol.34
, Issue.3
, pp. 251-259
-
-
Koyuncugil, A.S.1
Ozgulbas, N.2
-
6
-
-
84864371553
-
Automated data mining of exposure information for dose management and patient safety initiatives in medical imaging
-
C. H. McCollough, "Automated data mining of exposure information for dose management and patient safety initiatives in medical imaging, " Radiology, vol. 264, no. 2, pp. 322-324, 2012.
-
(2012)
Radiology
, vol.264
, Issue.2
, pp. 322-324
-
-
McCollough, C.H.1
-
8
-
-
41549085568
-
Using formal concept analysis for mining and interpreting patient flows within a healthcare network
-
Springer, Berlin, Heidelberg
-
N. Jay, F. Kohler, and A. Napoli, "Using formal concept analysis for mining and interpreting patient flows within a healthcare network, " in Concept Lattices and Their Applications, pp. 263-268, Springer, Berlin, Heidelberg, 2008.
-
(2008)
Concept Lattices and Their Applications
, pp. 263-268
-
-
Jay, N.1
Kohler, F.2
Napoli, A.3
-
9
-
-
84876780100
-
Mining medical data to identify frequent diseases using Apriori algorithm
-
M. Ilayaraja and T. Meyyappan, "Mining medical data to identify frequent diseases using Apriori algorithm, " in Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference on. IEEE, pp. 194-199, 2013.
-
(2013)
Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference On. IEEE
, pp. 194-199
-
-
Ilayaraja, M.1
Meyyappan, T.2
-
10
-
-
67649666803
-
Analysis of effectiveness of apriori algorithm in medical billing data mining
-
U. Abdullah, J. Ahmad, and A. Ahmed, "Analysis of effectiveness of apriori algorithm in medical billing data mining, " in Emerging Technologies, 2008. ICET 2008. 4th International Conference, pp. 327-331, 2008.
-
(2008)
Emerging Technologies, 2008. ICET 2008. 4th International Conference
, pp. 327-331
-
-
Abdullah, U.1
Ahmad, J.2
Ahmed, A.3
-
11
-
-
84896963151
-
Prediction and decision making in Health Care using Data Mining
-
B. Milovic, "Prediction and decision making in Health Care using Data Mining, " International Journal of Public Health Science, vol. 1, no. 2, 2012.
-
(2012)
International Journal of Public Health Science
, vol.1
, Issue.2
-
-
Milovic, B.1
-
12
-
-
22644432757
-
Symptom association probability and symptom sensitivity index: Preferable but still suboptimal predictors of response to high dose omeprazole
-
S. A. Taghavi, M. Ghasedi, M. Saberi-Firoozi et al., "Symptom association probability and symptom sensitivity index: preferable but still suboptimal predictors of response to high dose omeprazole, " Gut, vol. 54, no. 8, pp. 1067-1071, 2005.
-
(2005)
Gut
, vol.54
, Issue.8
, pp. 1067-1071
-
-
Taghavi, S.A.1
Ghasedi, M.2
Saberi-Firoozi, M.3
-
13
-
-
33846254198
-
Probability of obsessive and compulsive symptoms in Huntington's disease
-
L. J. Beglinger, D. R. Langbehn, K. Duff et al., "Probability of obsessive and compulsive symptoms in Huntington's disease, " Biological Psychiatry, vol. 61, no. 3, pp. 415-418, 2007.
-
(2007)
Biological Psychiatry
, vol.61
, Issue.3
, pp. 415-418
-
-
Beglinger, L.J.1
Langbehn, D.R.2
Duff, K.3
-
14
-
-
84923257171
-
Symptom-association probability between meal ingestion and abdominal pain in patients with irritable bowel syndrome. Does somatization play a role
-
E. Arsiè, M. Coletta, B. M. Cesana et al., "Symptom-association probability between meal ingestion and abdominal pain in patients with irritable bowel syndrome. Does somatization play a role" Neurogastroenterology and Motility, vol. 27, no. 3, pp. 416-422, 2015.
-
(2015)
Neurogastroenterology and Motility
, vol.27
, Issue.3
, pp. 416-422
-
-
Arsiè, E.1
Coletta, M.2
Cesana, B.M.3
-
15
-
-
84907022968
-
Top-k frequent itemsets via differentially private FP-tree
-
New York, NY, USA, August
-
J. Lee and C. W. Clifton, "Top-k frequent itemsets via differentially private FP-tree, " in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14), pp. 931-940, New York, NY, USA, August 2014.
-
(2014)
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14)
, pp. 931-940
-
-
Lee, J.1
Clifton, C.W.2
-
16
-
-
84873197622
-
Mining frequent itemsets over uncertain databases
-
Y. Tong, L. Chen, Y. Cheng et al., "Mining frequent itemsets over uncertain databases, " Proceedings of the Vldb Endowment, vol. 5, no. 11, pp. 1650-1661, 2012.
-
(2012)
Proceedings of the Vldb Endowment
, vol.5
, Issue.11
, pp. 1650-1661
-
-
Tong, Y.1
Chen, L.2
Cheng, Y.3
-
17
-
-
67349150656
-
Remote patient monitoring service using heterogeneous wireless access networks: Architecture and optimization
-
D. Niyato, E. Hossain, and S. Camorlinga, "Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization, " IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 412-423, 2009.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 412-423
-
-
Niyato, D.1
Hossain, E.2
Camorlinga, S.3
-
18
-
-
84985919768
-
An incentive-compatible mechanism for transmission scheduling of delay-sensitive medical packets in e-health networks
-
C. Yi, A. S. Alfa, and J. Cai, "An incentive-compatible mechanism for transmission scheduling of delay-sensitive medical packets in e-health networks, " IEEE Transactions on Mobile Computing, vol. 15, no. 10, pp. 2424-2436, 2016.
-
(2016)
IEEE Transactions on Mobile Computing
, vol.15
, Issue.10
, pp. 2424-2436
-
-
Yi, C.1
Alfa, A.S.2
Cai, J.3
-
19
-
-
77950974607
-
Association rule analysis for the assessment of the risk of coronary heart events
-
Conference PubMed
-
M. Karaolis, J. A. Moutiris, L. Papaconstantinou, and C. S. Pattichis, "Association rule analysis for the assessment of the risk of coronary heart events., " in Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC'09), pp. 6238-6241, Conference PubMed, 2009.
-
(2009)
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC'09)
, pp. 6238-6241
-
-
Karaolis, M.1
Moutiris, J.A.2
Papaconstantinou, L.3
Pattichis, C.S.4
-
20
-
-
84872106776
-
Discovering medical knowledge using association rule mining in young adultswith acutemyocardial infarction
-
D. G. Lee, K. S. Ryu, M. Bashir, J. W. Bae, and K. H. Ryu, "Discovering medical knowledge using association rule mining in young adultswith acutemyocardial infarction, " Journal ofMedical Systems, vol. 37, no. 2, pp. 1-10, 2013.
-
(2013)
Journal OfMedical Systems
, vol.37
, Issue.2
, pp. 1-10
-
-
Lee, D.G.1
Ryu, K.S.2
Bashir, M.3
Bae, J.W.4
Ryu, K.H.5
-
21
-
-
84895828741
-
An association rule mining-based framework for understanding lifestyle risk behaviors
-
S. H. Park, S. Y. Jang, H. Kim, and S. W. Lee, "An association rule mining-based framework for understanding lifestyle risk behaviors, " PLoS ONE, vol. 9, no. 2, Article ID e88859, 2014.
-
(2014)
PLoS ONE
, vol.9
, Issue.2
-
-
Park, S.H.1
Jang, S.Y.2
Kim, H.3
Lee, S.W.4
-
22
-
-
84873197622
-
Mining frequent itemsets over uncertain databases
-
Y. Tong, L. Chen, Y. Cheng, and P. S. Yu, "Mining frequent itemsets over uncertain databases, " Proceedings of the VLDB Endowment, vol. 5, no. 11, pp. 1650-1661, 2012.
-
(2012)
Proceedings of the VLDB Endowment
, vol.5
, Issue.11
, pp. 1650-1661
-
-
Tong, Y.1
Chen, L.2
Cheng, Y.3
Yu, P.S.4
-
23
-
-
38049177468
-
Mining frequent itemsets from uncertain data
-
Springer, Berlin Heidelberg
-
C. K. Chui, B. Kao, and E. Hung, "Mining frequent itemsets from uncertain data, " in Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 47-58, Springer, Berlin Heidelberg, 2007.
-
(2007)
Pacific-Asia Conference on Knowledge Discovery and Data Mining
, pp. 47-58
-
-
Chui, C.K.1
Kao, B.2
Hung, E.3
-
24
-
-
84867943010
-
Efficient mining of frequent item sets on large uncertain databases
-
L. Wang, D. W. L. Cheung, R. Cheng, S. D. Lee, and X. S. Yang, "Efficient mining of frequent item sets on large uncertain databases, " IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 12, pp. 2170-2183, 2012.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
, vol.24
, Issue.12
, pp. 2170-2183
-
-
Wang, L.1
Cheung, D.W.L.2
Cheng, R.3
Lee, S.D.4
Yang, X.S.5
-
25
-
-
84863468033
-
Probabilistic frequent pattern growth for itemset mining in uncertain databases
-
T. Bernecker, H. P. Kriegel, M. Renz, F. Verhein, and A. Züfle, "Probabilistic frequent pattern growth for itemset mining in uncertain databases, " in International Conference on Scientific and Statistical Database Management, Springer, Berlin, Heidelberg, 2012.
-
(2012)
International Conference on Scientific and Statistical Database Management, Springer, Berlin, Heidelberg
-
-
Bernecker, T.1
Kriegel, H.P.2
Renz, M.3
Verhein, F.4
Züfle, A.5
-
26
-
-
84885114251
-
Smoke-Grenade: An efficient key generation protocol with artificial interference
-
D. Chen, Z. Qin, X. Mao, P. Yang, Z. Qin, and R. Wang, "Smoke-Grenade: an efficient key generation protocol with artificial interference, " IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1731-1745, 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.11
, pp. 1731-1745
-
-
Chen, D.1
Qin, Z.2
Mao, X.3
Yang, P.4
Qin, Z.5
Wang, R.6
-
27
-
-
84908454906
-
Sybil attacks and their defenses in the internet of things
-
K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the internet of things, " IEEE Internet ofThings Journal, vol. 1, no. 5, pp. 372-383, 2014.
-
(2014)
IEEE Internet OfThings Journal
, vol.1
, Issue.5
, pp. 372-383
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
28
-
-
84939498664
-
Partner selection and incentive mechanism for physical layer security
-
N. Zhang, N. Cheng, N. Lu, X. Zhang, J. W. Mark, and X. Shen, "Partner selection and incentive mechanism for physical layer security, " IEEE Transactions on Wireless Communications, vol. 14, no. 8, pp. 4265-4276, 2015.
-
(2015)
IEEE Transactions on Wireless Communications
, vol.14
, Issue.8
, pp. 4265-4276
-
-
Zhang, N.1
Cheng, N.2
Lu, N.3
Zhang, X.4
Mark, J.W.5
Shen, X.6
-
29
-
-
85015170558
-
S2M: A lightweight acoustic fingerprints based wireless device authentication protocol
-
D. Chen, N. Zhang, Z. Qin et al., "S2M: a lightweight acoustic fingerprints based wireless device authentication protocol, " IEEE Internet ofThings Journal, vol. 4, no. 1, pp. 88-100, 2017.
-
(2017)
IEEE Internet OfThings Journal
, vol.4
, Issue.1
, pp. 88-100
-
-
Chen, D.1
Zhang, N.2
Qin, Z.3
-
30
-
-
85019641089
-
An efficient and fine-grained big data access control scheme with privacy-preserving policy
-
K. Yang, Q. Han, H. Li, K. Zheng, Z. Su, and X. Shen, "An efficient and fine-grained big data access control scheme with privacy-preserving policy, " IEEE Internet of Things Journal, 1 page, 2016.
-
(2016)
IEEE Internet of Things Journal
-
-
Yang, K.1
Han, Q.2
Li, H.3
Zheng, K.4
Su, Z.5
Shen, X.6
-
31
-
-
84886662535
-
Cooperative spectrum access towards secure information transfer for CRNs
-
N. Zhang, N. Lu, N. Cheng et al., "Cooperative spectrum access towards secure information transfer for CRNs, " IEEE Journal on Selected Areas in Communications, vol. 31, no. 11, pp. 2453-2464, 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.11
, pp. 2453-2464
-
-
Zhang, N.1
Lu, N.2
Cheng, N.3
-
32
-
-
84969753056
-
Message Authentication Code over a wiretap channel
-
D. Chen, S. Jiang, and Z. Qin, "Message Authentication Code over a wiretap channel, " in IEEE International Symposium on InformationTheory, pp. 2301-2305, 2015.
-
(2015)
IEEE International Symposium on InformationTheory
, pp. 2301-2305
-
-
Chen, D.1
Jiang, S.2
Qin, Z.3
-
33
-
-
85019001570
-
LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context
-
Q. Wang, D. Chen, N. Zhang et al., "LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context, " IEEE Access, 4027 pages, 2017.
-
(2017)
IEEE Access
-
-
Wang, Q.1
Chen, D.2
Zhang, N.3
-
34
-
-
70350645515
-
The differential privacy frontier
-
Springer, Berlin Heidelberg
-
C. Dwork, "The differential privacy frontier, " in Proceedings of Theory of Cryptography Conference, pp. 496-502, Springer, Berlin Heidelberg, 2009.
-
(2009)
Proceedings of Theory of Cryptography Conference
, pp. 496-502
-
-
Dwork, C.1
-
35
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer, Berlin Heidelberg
-
C. Dwork, F. McSherry, and K. Nissim, "Calibrating noise to sensitivity in private data analysis, " in Theory of Cryptography, pp. 265-284, Springer, Berlin Heidelberg, 2006.
-
(2006)
Theory of Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
-
36
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
R. Bhaskar, S. Laxman, A. Smith et al., "Discovering frequent patterns in sensitive data, " in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 503-512, 2010.
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
-
37
-
-
84872862536
-
Privbasis: Frequent itemset mining with differential privacy
-
N. Li, W. Qardaji, D. Su et al., "Privbasis: frequent itemset mining with differential privacy, " Proceedings of the Vldb Endowment, vol. 5, no. 11, pp. 1340-1351, 2012.
-
(2012)
Proceedings of the Vldb Endowment
, vol.5
, Issue.11
, pp. 1340-1351
-
-
Li, N.1
Qardaji, W.2
Su, D.3
-
38
-
-
84959279998
-
Differentially private frequent itemset mining via transaction splitting
-
S. Su, S. Xu, X. Cheng et al., "Differentially private frequent itemset mining via transaction splitting, " IEEE Transactions on Knowledge and Data Engineering, vol. 27, no. 7, pp. 1875-1891, 2015.
-
(2015)
IEEE Transactions on Knowledge and Data Engineering
, vol.27
, Issue.7
, pp. 1875-1891
-
-
Su, S.1
Xu, S.2
Cheng, X.3
|