References
- D. Alahakoon and X. Yu, "Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey," IEEE Transactions on Industrial Informatics. Vol.12, No.1, pp.425-436, Feb. 2016. https://doi.org/10.1109/TII.2015.2414355
- G. Litjens, T. Kooi, B. E. Bejnordi, A. A. A. Setio, F. Ciompi, M. Ghafoorian, J. A. W. M. van der Laak, B. van Ginneken and C. I. Sanchez, "A survey on deep learning in medical image analysis," Medical image analysis. Elsevier, Vol.42, pp.60-88, 2017. https://doi.org/10.1016/j.media.2017.07.005
- 고종민, 임승우, 정헌, 이상웅, "MRI를 이용한 치매 진단을 위한 패턴인식 기법의 비교분석." 한국차세대컴퓨팅학회 논문지, 12(4), 47-57, 2016.
- A. Kamilaris and F. X. Prenafeta-Boldu, "Deep learning in agriculture: A survey," Computers and Electronics in Agriculture. Elsevier, Vol.147, pp.70-90, 2018. https://doi.org/10.1016/j.compag.2018.02.016
- 하지수, 노상욱, 박소령, "통합 전자전에서 기계학습을 이용한 위협체 역추정 모델링." 한국차세대컴퓨팅학회논문지, 11(5), 43-52, 2015.
- J. A. Hartigan, and M. A. Wong, "Algorithm AS 136: A k-means clustering algorithm," Journal of the Royal Statistical Society. Series C (Applied Statistics). JSTOR, Vol.28, No.1, pp.100-108, 1979.
- R. Agrawal and R. Srikant, "Privacy-preserving data mining," Vol.29, No.2, ACM, 2000.
- Y. Lindell and B. Pinkas, "Privacy preserving data mining," Annual International Cryptology Conference. Springer, pp.36-54, 2000.
- O. Goldreich, "The Foundations of Cryptography - Volume 2, Basic Applications," Cambridge University Press. 2004.
- Y. Yoon and M. K. Lee, "Secure Power Demand Prediction Using Multi-Site Pattern Sequence-based Forecasting," ICNGC 2017b. 2017.
- R. Bost, R. A. Popa, S. Tu, and S. Goldwasser, "Machine learning classification over encrypted data," NDSS. 2015.
- T. Graepel, K. Lauter, and M. Naehrig, "ML confidential: Machine learning on encrypted data," International Conference on Information Security and Cryptology. Springer, pp.1-21, 2012.
- H. Takabi, E. Hesamifard, and M. Ghasemi, "Privacy preserving multi-party machine learning with homomorphic encryption," 29th Annual Conference on Neural Information Processing Systems (NIPS). 2016.
- H. T. Poon, and A. Miri. "Scanning for viruses on encrypted cloud storage." 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE, 2016.
- R. L. Cannon, J. V. Dave, and J. C. Bezdek. "Efficient implementation of the fuzzy c-means clustering algorithms." IEEE transactions on pattern analysis and machine intelligence 2 (1986): 248-255.
- A. Alabdulatif, H. Kumarage, I. Khalil and X. Yi, "Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption." Journal of Computer and System Sciences 90 (2017): 28-45. https://doi.org/10.1016/j.jcss.2017.03.001
- S. R. M. Oliveira and O. R. Zaiane, "Privacy Preserving Clustering by Data Transformation," XVIII Simposio Brasileiro de Bancos de Dados, Anais/Proceedings. pp.304-318, 2003.
- J. Vaidya and C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data,"Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp.206-215, 2003.
- G. Jagannathan and R. N. Wright, "Privacy-preserving distributed k-means clustering over arbitrarily partitioned data," Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp.593-599, 2005.
- P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," Int. Conf. Theory and Appl. Cryptographic Techn. pp.223-238, 1999.
- I. Damgard, M. Geisler, and M. Kroigard, "Homomorphic encryption and secure comparison," Int. J. Appl. Cryptography. Vol.1, No.1, pp.22-31, 2008. https://doi.org/10.1504/IJACT.2008.017048
- M. Joye and B. Libert, "Efficient cryptosystems from 2 k-th power residue symbols," Annu. Int. Conf. Theory Appl. Cryptographic Techn. pp.76-92, 2013.
- H. Steinhaus, "Sur la division des corp materiels en parties," Bull. Acad. Polon. Sci. Vol.1, pp.801-804, 1956.
- S. Lloyd, "Least squares quantization in PCM," IEEE transactions on information theory. IEEE, Vol.28, No.2, pp.129-137, 1982. https://doi.org/10.1109/TIT.1982.1056489
- E. W. Forgy, "Cluster analysis of multivariate data: efficiency versus interpretability of classifications," Biometrics. Vol.21, pp.768-769, 1965.
- R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms," Found. Secure Comput. pp.169-179, 1978.
- S. Goldwasser and S. Micali, "Probabilistic encryption," J. Comput. Syst. Sci. Elsevier, Vol.28, No.2, pp.270-299, 1984. https://doi.org/10.1016/0022-0000(84)90070-9
- C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. 41st Annu. ACM Symp. Theory Comput. pp.169-178, 2009.
- J. MacQueen et al., "Some methods for classification and analysis of multivariate observations," Proceedings of the fifth Berkeley symposium on mathematical statistics and probability. Vol.1, No.14, pp.281-297, 1967.
- J. M. Pena, J. A. Lozano, and P. Larranaga, "An empirical comparison of four initialization methods for the k-means algorithm," Pattern recognition letters. Elsevier, Vol.20, No.10, pp.1027-1040, 1999. https://doi.org/10.1016/S0167-8655(99)00069-0
- F. M. Alvarez, A. Troncoso, J. C. Riquelme, and J. S. A. Ruiz, "Energy time series forecasting based on pattern sequence similarity," IEEE Transactions on Knowledge and Data Engineering. IEEE, Vol.23, No.8, pp.1230-1243, 2011. https://doi.org/10.1109/TKDE.2010.227