
Citation: Jimmy Ming-Tai Wu, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Youcef Djenouri, Chun-Hao Chen, Zhongcui Li. The density-based clustering method for privacy-preserving data mining[J]. Mathematical Biosciences and Engineering, 2019, 16(3): 1718-1728. doi: 10.3934/mbe.2019082
[1] | Meijiao Wang, Yu chen, Yunyun Wu, Libo He . Spatial co-location pattern mining based on the improved density peak clustering and the fuzzy neighbor relationship. Mathematical Biosciences and Engineering, 2021, 18(6): 8223-8244. doi: 10.3934/mbe.2021408 |
[2] | Hui Du, Depeng Lu, Zhihe Wang, Cuntao Ma, Xinxin Shi, Xiaoli Wang . Fast clustering algorithm based on MST of representative points. Mathematical Biosciences and Engineering, 2023, 20(9): 15830-15858. doi: 10.3934/mbe.2023705 |
[3] | Zhihe Wang, Huan Wang, Hui Du, Shiyin Chen, Xinxin Shi . A novel density peaks clustering algorithm for automatic selection of clustering centers based on K-nearest neighbors. Mathematical Biosciences and Engineering, 2023, 20(7): 11875-11894. doi: 10.3934/mbe.2023528 |
[4] | Lei Zhang, Lina Ge . A clustering-based differential privacy protection algorithm for weighted social networks. Mathematical Biosciences and Engineering, 2024, 21(3): 3755-3773. doi: 10.3934/mbe.2024166 |
[5] | He Ma . Achieving deep clustering through the use of variational autoencoders and similarity-based loss. Mathematical Biosciences and Engineering, 2022, 19(10): 10344-10360. doi: 10.3934/mbe.2022484 |
[6] | Chunkai Zhang, Ao Yin, Wei Zuo, Yingyang Chen . Privacy preserving anomaly detection based on local density estimation. Mathematical Biosciences and Engineering, 2020, 17(4): 3478-3497. doi: 10.3934/mbe.2020196 |
[7] | Hao Yuan, Qiang Chen, Hongbing Li, Die Zeng, Tianwen Wu, Yuning Wang, Wei Zhang . Improved beluga whale optimization algorithm based cluster routing in wireless sensor networks. Mathematical Biosciences and Engineering, 2024, 21(3): 4587-4625. doi: 10.3934/mbe.2024202 |
[8] | Yuan Tian, Biao Song, Mznah Al Rodhaan, Chen Rong Huang, Mohammed A. Al-Dhelaan, Abdullah Al-Dhelaan, Najla Al-Nabhan . A stochastic location privacy protection scheme for edge computing. Mathematical Biosciences and Engineering, 2020, 17(3): 2636-2649. doi: 10.3934/mbe.2020144 |
[9] | Muhammad Firdaus, Siwan Noh, Zhuohao Qian, Harashta Tatimma Larasati, Kyung-Hyune Rhee . Personalized federated learning for heterogeneous data: A distributed edge clustering approach. Mathematical Biosciences and Engineering, 2023, 20(6): 10725-10740. doi: 10.3934/mbe.2023475 |
[10] | Yunyun Sun, Peng Li, Zhaohui Jiang, Sujun Hu . Feature fusion and clustering for key frame extraction. Mathematical Biosciences and Engineering, 2021, 18(6): 9294-9311. doi: 10.3934/mbe.2021457 |
Data mining, also, refers as knowledge discovery in database (KDD) [2,8,16,17], is a commonly way to find the useful and meaningful knowledge from databases, which could be utilized in several real-life applications. Although data mining techniques can discover the useful information and knowledge, it reveals, however, the confidential or private message from the discovered information, which may cause the security threats [11,12,39]. Privacy-preserving data mining [3,5,35,37,31,32] has thus become an important issue in recent decades since it can not only hide the private information but also discover the required information by varied data mining techniques. Data sanitization is one of the major research of PPDM that perturbs the database to hide the sensitive information. During the sanitization progress, it usually causes three side effects, for instance, hiding failure, missing cost, and artificial cost. Existing methods are used to minimize those three side effects during the sanitization progress, which can be regarded as the NP-hard problem [3,37]. Several works related to PPDM were respectively discussed and most of them are based on the deletion procedure to hide the sensitive information [13,14,21,27,38].
Conventional algorithms in PPDM mostly focus on hiding the sensitive information as much as possible; the PPDM is, however considered as the NP-hard problem since it has the trade-off relationships among the derived three side effects. Lin et al. proposed the GA-based algorithms to hide the sensitive itemsets and utilize transaction deletion procedure for sanitization [28,29]. The optimal transactions for deletion are then obtained and the results showed that less side effects can be achieved compared to the greedy-based method. Lin et al. [30] then designed the PSO-based model to handle the sanitization progress in PPDM. However, the above algorithms rely on the pre-defined weights to design the importances of three side effects, which requires the a-priori knowledge to set up the weight values. The pre-defined weights may seriously affect the results to select the transactions for deletion. To handle this problem, Cheng et al. [10] developed the EMO-based algorithm to consider "data distortion" and "knowledge distortion" in the sanitization progress through item deletion. This approach is efficient but it may lead the incomplete knowledge in the mining procedure. For example, the deleted information in the hospital diagnosis may mislead the wrong diagnosis and treatment.
Multi-objective particle swarm optimization (MOPSO) algorithm [7] is extended from conventional particle swarm optimization algorithm [24], that handles the multi-objective problems to find a set of Pareto solutions. Since the MOPSO-based framework uses the dominance relationship to find better solutions, the traditional method used in the PSO-based framework cannot be used to find better solutions. In this paper, we aim at designing a multiple optimization particle swarm optimization algorithm by adapting the density-based (CMPSO) method for finding better solutions rather than the single objective algorithms. Major contributions are listed below.
● We design a multiple optimization particle swarm optimization (named CMPSO) algorithm for hiding the sensitive information, which achieves better performance than the single objective algorithms in terms of three side effects.
● The density-based clustering method is adapted here to obtain better diversity of the derived Pareto solutions.
● Extensive experiments are conducted to show the performance of the designed algorithm in terms of three side effects, and results outperform the single-objective algorithms.
The rest of this paper is organized as follows. Literature review is shown in Section 2. Preliminary and problem statement are discussed in Section 3. The designed algorithm is stated in Section 4. Several experiments are carried and conducted in Section 5. Conclusion and future work are discussed in Section 6.
The related works of privacy-preserving data mining (PPDM) and the evolutionary computation are described as follows.
In recent two decades, data mining techniques [17,16,33] are efficient to mine and find the potential information from a very large database, especially the relationships between the products may not be easily discovered and visualized. Since the important data can be revealed from the databases, thus the confidential and secure information can also be discovered during the mining procedure, that causes the privacy and security threats to users. Privacy-preserving data mining (PPDM) has become a critical issue in recent years since it can, not only find the useful information but also hide the confidential data after the sanitization progress. Agrawal and Srikant [4] developed a novel reconstruction approach that can accurately estimate the distribution of original data. The classifiers can also be constructed to compare the accuracy between original data and the sanitized one. Verykios et al. [37] developed the hierarchical classification techniques used in PPDM. Dasseni et al. [13] then designed an approach based on the hamming-distance mechanism to decrease the support or confidence of the sensitive information (i.e., association rules) for sanitization. Oliveira and Zaiane [35] provides several sanitization methods, that can hide the frequent itemsets through the heuristic framework. Islam and Brankovic [22] presented a framework using the noise addition method to protect and hide the individual privacy and still maintained high data quality. Hong et al. provided the SIF-IDF method [21] to assign the weight to each transaction, and the sanitization progress is then performed from the transaction with highest score to the lowest one for hiding the sensitive information. Lin et al. [31] then presented a SPMF software to provide several algorithms for handling the sanitization problem in PPDM.
The PPDM is, however, considered as a NP-hard problem [3,37], it is thus better to provide the meta-heuristic approaches to find the optimal solutions. Han and Ng developed a secure protocol to find a better set of rules without disclosing their own private data based on GAs [18]. Lin et al. then presented several GA-based approaches, such as sGA2DT [29], pGA2DT [29] and cpGA2DT [28] to hide the sensitive information by removing the victim transactions. The encoded chromosome is considered as a set of solutions, and the transaction of the gene within chromosome is concerned as the victim for later deletion. A fitness function is also developed to consider three side effects for evaluation with the pre-defined weights to show the goodness of the chromosome. Several extensions of the evolutionary computation used in PPDM were also developed [20,30]. Although the above algorithms are efficient to find the optimal transactions for deletion, they still require, however, the pre-defined weights of the side effects; this mechanism can seriously affect the final results of the designed approaches. Cheng et al. [10] then developed a EMO-RH algorithm to hide the sensitive itemsets by removing the itemset. This approach is based on multi-objective method, but the incomplete transactions can thus be produced; the mislead decision could thus be made especially in treatment of the hospital diagnoses. Lin et al. also applies the multi-objective model [32] for the deletion problem based on the grid method. An NSGA-II model [34] is also utilized to efficiently sanitize the database for transaction deletion.
Evolutionary computation is inspired by biological evolution that attempts to find the global optimization as the solutions. An iteratively progress of the candidates is then executed to gradually find the optimized solutions. Holland [18] first applies Darwin theory of natural selection and survival of the fittest to designed the genetic algorithms (GAs), that is widely used in computational intelligence. The GAs is the fundamental method, which is the population-based method to solve the NP-hard problems. It consists of mutation, crossover, and selection operators to find the possible solutions in the evolution progress. Particle swarm optimization (PSO) is a swarm intelligence algorithm proposed by Kennedy and Eberhart that is inspired by bird flocking activities [24]. Each particle in the PSO is concerned as a potential solution. In PSO, each bird has its own velocity, which is used to represent the direction to the other solutions, and each particle is then updated with its own best value (represents as pbest) and the global best value (represented as gbest) according to the designed fitness function during each iteration. The updating equations are listed as follows [24]:
vi(t+1)=w×vi(t)+c1×r1×(pbesti−xi(t))+c2×r2×(gbest−xi(t)) | (2.1) |
xi(t+1)=xi(t)+vi(t+1) | (2.2) |
From the above equations, w is considered as a factor that is used to balance the influence of global search and local search;
In real-world situations, optimization should consider the multiple objectives [23,36] since we may focus on varied targets to find the solutions. Several algorithms were presented to solve the multi-objective problems for optimization, such as the Non-dominated Sorting Genetic Algorithm (NSGA) [36], the strength pareto evolutionary algorithm (SPEA) [40], and the pareto archived evolution strategy (PAES) [25]. Coello et al. [7] applies the adaptive grid method to maintain the external archive. Several variants of MOPSO were respectively presented to improve the performance, and the development is still in progress.
Let I = {
Definition 1. For each
Nsi=sup(si)−μ×|D|1−μ. | (3.1) |
Definition 2. The Maximum number of Deleted Transactions among all sensitive itemsets in SI is denoted as
MDT=max{Ns1,Ns2,…,Nsk}. | (3.2) |
Thus, the
Definition 3. Let
Definition 4. Let
Definition 5. Let
Problem Statement: The problem of PPDM with transaction deletion based on the multi-objective particle swarm optimization is to minimize three side effects by considering the sanitized results in three objective functions, which can be defined as:
f=min[f1,f2,f3], | (3.3) |
where
In this section, we develop a CMPSO algorithm to hide the sensitive information by adapting the density-based clustering method to obtain higher diversity of the derived Pareto solutions, and the effects can be shown in terms of three side effects. To obtain better transactions for deletion in PPDM, the database is first processed to project the transactions with any of the sensitive information within the set of SI, and the projected database is named as
vi(t+1)=(pbest−xi(t))∪(gbest−xi(t)). | (4.1) |
xi(t+1)=rand(xi(t),null)+vi(t+1). | (4.2) |
![]() |
Thus, the particles in the designed CMPSO is updated by the above equations for the velocity and its position. The designed CMPSO algorithm is then described in Algorithm 1 as follows.
From Algorithm 1, the designed CMPSO algorithm generates N particles with MDT size (Line 1). Each particle is then evaluated by the fitness functions with three side effects (Lines 2 to 3) to find the non-dominated solutions (Line 4). In the updating progress, the pbest and gbest are then respectively updated (Lines 6 to 7). The gbest is then updated by the sub-function to obtain a better particle for evolution. After the updating progress (Line 8), the updated particles are then evaluated again to update the non-dominated solutions. The algorithm is recursively performed until the termination criteria is achieved (Lines 5 to 10). After that, the final results will be returned with a set of non-dominated solutions (Pareto solutions).
To obtain better Pareto solutions with higher diversity, the density-based clustering method is adapted here to select the appropriate gbest in the evolutionary progress, which was described at Line 6 in Algorithm 1. Details are then stated in Algorithm 2.
![]() |
For each Pareto solution in Algorithm 2, it finds a cluster center (Line 4) with satisfied solutions (number of Pareto solutions is no less than minpts) within a radius r (Line 3). After that, each solution within a cluster is then assigned with a probability (Lines 6 to 7), and a global solution (gbest) is then derived randomly by the assigned probability (Line 8). This progress increases the diversity of the discovered Pareto solutions in the evolution progress. After that, the gbest is then derived and used in the Algorithm 1 for iteratively evolution.
Substantial experiments were carried to compare the effectiveness and efficiency of the proposed CMPSO algorithm to the state-of-the-art single-objective cpGA2DT [28] and PSO2DT [30] approaches. The algorithms in the experiments are implemented in Java language, performing on a PC with an Intel Core i7-6700 quad-core processor and 8 GB of RAM under the 64-bit Microsoft Windows 10 operating system. Two real-world datasets [15] called chess and foodmart are used in the experiments. Results in terms of three side effects are respectively discussed and analyzed as follows.
In this section, the state-of-the-art single-objective algorithms such as cpGA2DT [28] and PSO2DT [30] are then compared to the designed CMPSO algorithm. The number of population for all evolutionary algorithm is set as 50. Since the multi-objective algorithm would produce a set of Pareto-front solutions, we evaluate the side effects by average of the produced solutions. Thus, in the dense dataset such as chess, the CMPSO sometimes shows worse results in terms of side effects compared to the single objective algorithms, but in the sparse dataset such as foodmart, the CMPSO generally obtains good performance than the others. Results for the chess dataset are shown in Figure 1.
From Figure 1, it can be seen that the single-objective algorithms such as cpGA2DT and PSO2DT sometimes have better performance than the designed CMPSO approach. The reasons are that the designed CMPSO algorithm evaluates three side effects by the average value of the derived solutions. For the dense dataset such as chess, the diversity of the derived solutions is not high; the discovered Pareto solutions could be converged together due to the characteristics of the dataset. Moreover, The designed CMPSO algorithm produces a set of solutions, for example in the experiments, the number of Pareto solutions can be more than 20. Thus, the average values of three side effects sometimes could not achieve better results. Experiments under the sparse foodmart dataset are shown in Figure 2.
From Figure 2, we can observe that the designed CMPSO algorithm has good performance than the single-objective cpGA2DT and PSO2DT algorithms in most cases. For example, when the sensitive percentages are respectively set as 8%, 10%, 12%, and 14%, the designed CMPSO achieves best performance than the other single-objective algorithms. The reasons are that when the dataset is a sparse dataset, higher diversity of the designed CMPSO algorithm can be obtained. Thus, the selected transactions may contain the minimal side effects for deletion. Moreover, all three algorithms have no artificial cost under varied percentages of sensitivity.
In recent years, many algorithms were presented to hide the private/confidential information in privacy-preserving data mining (PPDM) and most of them were designed to sanitize the database for hiding the sensitive information. In this paper, we first introduce a CMPSO algorithm for hiding the sensitive information based on density clustering method for sanitizing the databases. The designed updating algorithm for gbest can achieve good performance compared to the single objective algorithms, especially for the sparse dataset, which can be seen in the experiments.
This research was partially supported by the Shenzhen Technical Project under KQJSCX20170726103424709 and JCYJ20170307151733005
[1] | R. Agrawal and R. Srikant, Quest synthetic data generator, IBM Almaden Research Center. Available from: http://www.Almaden.ibm.com/cs/quest/syndata.html, (1994). |
[2] | R. Agrawal and R. Srikant, Fast algorithms for mining association rules in large databases, The International Conference on Very Large Data Base, (1994), 487–499. |
[3] | M. Atallah, E. Bertino, A. Elmagarmid, et al., Disclosure limitation of sensitive rules,The Workshop on Knowledge and Data Engineering Exchange, (1999), 45–52. |
[4] | R. Agrawal and R. Srikant, Privacy-preserving data mining,ACM SIGMOD Record, 29 (2000), 439–450. |
[5] | C. C. Aggarwal, J. Pei and B. Zhang, On privacy preservation against adversarial data mining, ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2006), 510– 516. |
[6] | D. W. Cheung, J. Han, V. T. Ng, et al., Maintenance of discovered association rules in large databases: An incremental updating technique,The International Conference on Data Engineering, (1996), 106–114. |
[7] | C. A. Coello and M. S. Lechuga, MOPSO: a proposal for multiple objective particle swarm optimization, IEEE Congress on Evolutionary Computation, (2002), 1051–1056. |
[8] | M. S. Chen, J. Han and P. S. Yu, Data mining: An overview from a database perspective,IEEE T. Knowl. Data En., 8 (1996), 866–883. |
[9] | C. Clifton, M. Kantarcioglu, J. Vaidya, et al., Tools for privacy preserving distributed data mining, ACM SIGKDD Explorations, 4 (2003), 1–7. |
[10] | P. Cheng, I. Lee, C. W. Lin, et al., Association rule hiding based on evolutionary multi-objective optimization,Intell. Data Anal., 20 (2016), 495–514. |
[11] | C. M. Chen, B. Xiang, Y. Liu, et al., A secure authentication protocol for internet of vehicles, IEEE Access (2019), DOI:10.1109/ACCESS.2019.2891105. |
[12] | C. M. Chen, B. Xiang, K. H. Wang, et al., A robust mutual authentication with a key agreement scheme for session initiation protocol,Appl. Sci., 8 (2018). |
[13] | E. Dasseni, V. S. Verykios, A. K. Elmagarmid, et al., Hiding association rules by using confidence and support,International Workshop on Information Hiding, (2001), 369–383. |
[14] | A. Evfimievski, R. Srikant, R. Agrawal, et al., Privacy preserving mining of association rules,ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (2002), 217–228. |
[15] | P. Fournier-Viger, J. C.W. Lin, A. Gomariz, et al., The SPMF open-source data mining library version 2,Joint European Conference on Machine Learning and Knowledge Discovery in Databases, (2016), 36–40. |
[16] | W. Gan, J. C. W. Lin, H. C. Chao, et al., Data mining in distributed environment: a surveyWiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7 (2017), 1–19. |
[17] | W. Gan, J. C. W. Lin, P. P. Fournier-Viger, et al., A survey of incremental highutility itemset mining,Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 8 (2018), 1–23. |
[18] | J. H. Holland, Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control and artificial intelligence, MIT Press, (1992). |
[19] | J. Han, J. Pei, Y. Yin, et al., Mining frequent patterns without candidate generation: A frequentpattern tree approach,Data Mining and Knowledge Discovery, 8 (2004), 53–87. |
[20] | S. Han and W. K. Ng, Privacy-preserving genetic algorithms for rule discovery,International Conference on Data Warehousing and Knowledge Discovery, (2007), 407–417. |
[21] | T. P. Hong, C. W. Lin, K. T. Yang, et al., Using TF-IDF to hide sensitive itemsets,Appl. Intell., 38 (2012), 502–510. |
[22] | M. Z. Islam and L. Brankovic, Privacy preserving data mining: A noise addition framework using a novel clustering technique,Knowl. Based Syst., 24 (2011), 1214–1223. |
[23] | S. Jeyadevi, S. Baskar, C. K. Babulal, et al. Solving multiobjective optimal reactive power dispatch using modified NSGA-II,Int. J. Elec. Power., 33 (2011), 219–228. |
[24] | J. Kennedy and R. Eberhart, Particle swarm optimization,IEEE International Conference on Neural Networks, (1995), 1942–1948. |
[25] | J. Knowles and D. Corne, The pareto archived evolution strategy: a new baseline algorithm for Pareto multiobjective optimisation, (1999), 98–105. |
[26] | Y. Lindell and B. Pinkas, Privacy preserving data mining,The Annual International Cryptology Conference on Advances in Cryptology, (2000), 36–54. |
[27] | C. W. Lin, T. P. Hong, C. C. Chang, et al., A greedy-based approach for hiding sensitive itemsets by transaction insertion, J. Inform. Hiding Multimed.Signal Proc., 4 (2013), 201–227. |
[28] | C. W. Lin, B. Zhang, K. T. Yang, et al., Efficiently hiding sensitive itemsets with transaction deletion based on genetic algorithms,The Scientific World J., (2014). |
[29] | C.W. Lin, T. P. Hong, K. T. Yang, et al., The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion,Appl. Intell., 42 (2015), 210–230. |
[30] | J. C. W. Lin, Q. Liu and P. Fournier-Viger, A sanitization approach for hiding sensitive itemsets based on particle swarm optimization,Eng. Appl. Artif. Intel., 53 (2016), 1–18. |
[31] | J. C. W. Lin, P. Fournier-Viger, L. Wu, et al., PPSF: An open-source privacy-preserving and security mining framework,IEEE International Conference on Data Mining Workshop, (2018), 1459– 1463. |
[32] | J. C. W. Lin, Y. Zhang, C. H. Chen, et al., A multiple objective PSO-based approach for data sanitization,The 2018 Conference on Technologies and Applications of Artificial Intelligence, (2018), 148–151. |
[33] | J. C. W. Lin, L. Yang, P. Fournier-Viger, et al., Mining of skyline patterns by considering both frequent and utility constraints,Eng. Appl. Artif. Intel., 77 (2019), 229–238. |
[34] | J. C. W. Lin, Y. Zhang, B. Zhang, et al., Hiding sensitive itemsets with multiple objective optimization, Soft Comput., (2019), 1–19. |
[35] | S. R. M. Oliveira and O. R. Zaane, Privacy preserving frequent itemset mining,IEEE International Conference on Privacy, Security and Data Mining, (2002), 43–54. |
[36] | N. Srinivas and K. Deb, Multiobjective optimization using nondominated sorting in genetic algorithms, Evol. Comput., 2 (1994), 221–248. |
[37] | V. S. Verykios, E. Bertino, I. N. Fovino, et al., State-of-the-art in privacy preserving data mining, ACM SIGMOD Record, 33 (2004), 50–57. |
[38] | Y. H. Wu, C. M. Chiang and A. L. P. Chen, Hiding sensitive association rules with limited side effects,IEEE Transactions on Knowledge and Data Engineering, 19 (2007), 29–42. |
[39] | T. Y. Wu, C. M. Chen, K. H. Wang, et al., A provably secure certificateless public key encryption with keyword search,J. Chin. Inst. Eng., (2019), DOI:10.1080/02533839.2018.1537807. |
[40] | E. Zitzler and L. Thiele, Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach,IEEE T. Evolut. Comput., 3 (1994), 257–271. |
1. | Shalini Jangra, Durga Toshniwal, VIDPSO: Victim item deletion based PSO inspired sensitive pattern hiding algorithm for dense datasets, 2020, 57, 03064573, 102255, 10.1016/j.ipm.2020.102255 | |
2. | Malik Jahan Khan, Cynthia Khan, Performance evaluation of fuzzy clustered case-based reasoning, 2021, 33, 0952-813X, 313, 10.1080/0952813X.2020.1744194 | |
3. | Madhulika Yarlagadda, K. Gangadhara Rao, A. Srikrishna, Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering, 2019, 13191578, 10.1016/j.jksuci.2019.09.002 | |
4. | Jimmy Ming-Tai Wu, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger, Jerry Chun-Wei Lin, Hiding sensitive information in eHealth datasets, 2021, 117, 0167739X, 169, 10.1016/j.future.2020.11.026 | |
5. | Jerry Chun-Wei Lin, Gautam Srivastava, Yuyu Zhang, Youcef Djenouri, Moayad Aloqaily, Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments, 2021, 8, 2327-4662, 5340, 10.1109/JIOT.2020.3032896 | |
6. | Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments, 2019, 7, 2169-3536, 49232, 10.1109/ACCESS.2019.2909040 | |
7. | Hao Wang, Guangmin Sun, Kun Zheng, Hui Li, Jie Liu, Yu Bai, Privacy protection generalization with adversarial fusion, 2022, 19, 1551-0018, 7314, 10.3934/mbe.2022345 | |
8. | Chance Desmet, Diane J. Cook, Recent Developments in Privacy-preserving Mining of Clinical Data, 2021, 2, 2691-1922, 1, 10.1145/3447774 | |
9. | Ali Muhammad, Noor Ul Amin, Insaf Ullah, Ahmed Alsanad, Saddam Hussain, Suheer Al-Hadhrami, M. Irfan Uddin, Hizbullah Khattak, Muhammad Asghar Khan, Dilbag Singh, An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature, 2021, 2021, 1563-5147, 1, 10.1155/2021/9960264 | |
10. | Ruijia Li, Zhiling Cai, A clustering algorithm based on density decreased chain for data with arbitrary shapes and densities, 2023, 53, 0924-669X, 2098, 10.1007/s10489-022-03583-4 | |
11. | Mira Lefkir, Farid Nouioua, Philippe Fournier-Viger, Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization, 2023, 53, 0924-669X, 10027, 10.1007/s10489-022-03808-6 | |
12. | Ryosuke Sonoda, Fair oversampling technique using heterogeneous clusters, 2023, 640, 00200255, 119059, 10.1016/j.ins.2023.119059 | |
13. | Bo Xiong, Hongmei Chen, Tianrui Li, Xiaoling Yang, Robust multi-view clustering in latent low-rank space with discrepancy induction, 2023, 53, 0924-669X, 23655, 10.1007/s10489-023-04699-x |