[1] |
JIN H , LUO Y , LI P L ,et al. A review of secure and privacy-preserving medical data sharing[J]. IEEE Access, 2019,7: 61656-61669.
|
[2] |
SUN Y , YIN L H , SUN Z ,et al. An IoT data sharing privacy preserving scheme[C]// IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops. Piscataway:IEEE Press, 2020: 984-990.
|
[3] |
ZHAO C , ZHAO S N , ZHAO M H ,et al. Secure multi-party computation:theory,practice and applications[J]. Information Sciences, 2019,476: 357-372.
|
[4] |
VU D H , LUONG T D , HO T B . An efficient approach for secure multi-party computation without authenticated channel[J]. Information Sciences, 2020,527: 356-368.
|
[5] |
REDDY G T , REDDY M P K , LAKSHMANNA K ,et al. Analysis of dimensionality reduction techniques on big data[J]. IEEE Access, 2020,8: 54776-54788.
|
[6] |
WANG C , WANG A D , XU J ,et al. Outsourced privacy-preserving decision tree classification service over encrypted data[J]. Journal of Information Security and Applications, 2020,53: 102517.
|
[7] |
OLAKANMI O O , DADA A . An efficient privacy-preserving approach for secure verifiable outsourced computing on untrusted platforms[J]. International Journal of Cloud Applications and Computing, 2019,9(2): 79-98.
|
[8] |
MANIKANDAN V , PORKODI V , MOHAMMED A S ,et al. Privacy preserving data mining using threshold based fuzzy c-means clustering[J]. ICTACT Journal on Soft Computing, 2018,9(1): 1813-1816.
|
[9] |
TEO S G , CAO J , LEE V C S . DAG:a general model for privacy-preserving data mining[J]. IEEE Transactions on Knowledge and Data Engineering, 2018,32(1): 40-53.
|
[10] |
AGRAWAL R , SRIKANT R . Privacy-preserving data mining[C]// 2000 ACM SIGMOD International Conference on Management of Data.Texas. New York:ACM Press, 2000: 439-450.
|
[11] |
KARGUPTA H , DATTA S , WANG Q ,et al. On the privacy preserving properties of random data perturbation techniques[C]// Third IEEE International Conference on Data Mining. Piscataway:IEEE Press, 2003: 99-106.
|
[12] |
KARGUPTA H , DATTA S , WANG Q ,et al. Random-data perturbation techniques and privacy-preserving data mining[J]. Knowledge and Information Systems, 2005,7(4): 387-414.
|
[13] |
BU S , LAKSHMANAN L V S , NG R T ,et al. Preservation of patterns and input-output privacy[C]// 2007 IEEE 23rd International Conference on Data Engineering. Piscataway:IEEE Press, 2007: 696-705.
|
[14] |
HAMADA K , HASEGAWA S , MISAWA K ,et al. Privacy-preserving fisher’s exact test for genome-wide association study[C]// International Workshop on Genome Privacy and Security. Piscataway:IEEE Press, 2017: 99-102.
|
[15] |
BOST R , POPA R A , TU S ,et al. Machine learning classification over encrypted data[C]// Network and Distributed System Security Symposium. Piscataway:IEEE Press, 2015: 4324-4325.
|
[16] |
WU D J , FENG T , NAEHRIG M ,et al. Privately evaluating decision trees and random forests[J]. Proceedings on Privacy Enhancing Technologies, 2016,2016(4): 335-355.
|
[17] |
BACKES M , BERRANG P , BIEG M ,et al. Identifying personal DNA methylation profiles by genotype inference[C]// 2017 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2017: 957-976.
|
[18] |
ICHIKAWA A , OGATA W , HAMADA K ,et al. Efficient secure multi-party protocols for decision tree classification[C]// Australasian Conference on Information Security and Privacy. Piscataway:IEEE Press, 2019: 362-380.
|
[19] |
ZHENG Y F , DUAN H Y , WANG C . Towards secure and efficient outsourcing of machine learning classification[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2019: 22-40.
|
[20] |
LI P , LI J , HUANG Z G ,et al. Privacy-preserving outsourced classification in cloud computing[J]. Cluster Computing, 2018,21(1): 277-286.
|
[21] |
LIU L , SU J , CHEN R ,et al. Secure and fast decision tree evaluation on outsourced cloud data[C]// International Conference on Machine Learning for Cyber Security. Piscataway:IEEE Press, 2019: 361-377.
|
[22] |
LI Y , JIANG Z L , YAO L ,et al. Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties[J]. Cluster Computing, 2019,22(1): 1581-1593.
|
[23] |
PHU V N , TRAN V T N , CHAU V T N ,et al. A decision tree using ID3 algorithm for English semantic analysis[J]. International Journal of Speech Technology, 2017,20(3): 593-613.
|