F Liu, WK Ng, W Zhang - 2015 IEEE 8th International …, 2015 - ieeexplore.ieee.org
Individuals and companies, taking advantage of cloud computing which affords both resource and compute scalability, are willing to outsource their exploding data to save the …
Facial phenotyping for medical prediagnosis has recently been successfully exploited as a novel way for the preclinical assessment of a range of rare genetic diseases, where facial …
Advancements in deep learning enable neural network (NN) inference to be a service, but service providers and clients want to keep their inputs secret for privacy protection. Private …
Privacy-preserving data mining (PPDM) is an emergent research area that addresses the incorporation of privacy preserving concerns to data mining techniques. In this paper we …
T Li, X Li, X Zhong, N Jiang, C Gao - Information Sciences, 2019 - Elsevier
Abstract Machine learning (ML) classification has been one of the most important techniques of popular Internet services that aim to provide accurate predictions of data by means of a …
Q Mao, Y Chen, P Duan, B Zhang, Z Hong… - IEEE Systems …, 2022 - ieeexplore.ieee.org
As a classifier, support vector machine (SVM) explains a core problem of machine learning, namely sample classification in statistical terms. It has been widely used in machine …
KP Lin - Knowledge and Information Systems, 2016 - Springer
Clustering is a common task for organizing data into clusters. The kernel k-means identifies clusters of nonlinearly separable data by applying the kernel trick to the commonly used k …
Q Jia, L Guo, Z Jin, Y Fang - 2016 IEEE 36th International …, 2016 - ieeexplore.ieee.org
Data classification is a widely used data mining technique for big data analysis. By training massive data collected from the real world, data classification helps learners discover …
J Sakuma, S Kobayashi - Knowledge and Information Systems, 2010 - Springer
A k-means clustering with a new privacy-preserving concept, user-centric privacy preservation, is presented. In this framework, users can conduct data mining using their …