1 |
L. M. Kumbayoni and S.-B. Jang, "A Determination of k-value Based on Artificial Neural Network in k-anonymization," Proceedings of International Conference on Convergence Research, Vol.4, No.3, pp.437-440, 2018.
|
2 |
L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge based Systems, pp.557-570, 2002.
|
3 |
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," ACM Computing Survey, Vol.42, No.4, pp.1-53, 2010.
|
4 |
I. Roy, S. T. Setty, A Kilzer, V Shmatikov, and E Witchel, "Airavat: Security and Privacy for Mapreduce," Proceedings of Seventh USENIX Conference on Networked Systems Design and Implementation, pp.297-312, 2010.
|
5 |
N. Elanshekhar and R. Shedge, "An effective anonymization technique of big data using suppression slicing method," 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp.2500- 2504, 2017,
|
6 |
M. Nassar, A. A. R. Orabi, M. Doha, and B. Al Bouna, "An SQL-like query tool for data anonymization and outsourcing," 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp.1-3, 2015.
|
7 |
R. Matsunaga, I. Ricarte, T. Basso, and R. Moraes, "Towards an Ontology-Based definition of Data Anonymization Policy for Cloud Computing and Big Data," 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.75-82, 2017.
|
8 |
X. Zhang, W. Dou, J. Pei, S. Nepal, C. Yang, C. Liu, and J. Chen, "Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud," IEEE Transactions on Computers, Vol.64, No.8, pp.2293-2307, 2015.
DOI
|
9 |
A. A. William, "On the Efficiency of Learning Machines," IEEE Transactions on Systems Science and Cybernetics, Vol.3, No.2, pp.111-116, 1967.
DOI
|
10 |
V. F. Nicholas, "Some New Approaches to Machine Learning," IEEE Transactions on Systems Science and Cybernetics, Vol.5, No.3, pp.173-182, 1969.
DOI
|
11 |
H. C. Anderson, "Neural network machines", IEEE Potentials, Vol.8, No.1, pp.13-16, 1989.
DOI
|
12 |
J. Nagumo and A. Noda, "A learning method for system identification," IEEE Transactions on Automatic Control, Vol.12, No.3, pp.282-287, 1967.
DOI
|
13 |
W. T. Illingworth, "Beginner's guide to neural networks," IEEE Aerospace and Electronic Systems Magazine, Vol.4, No.9, pp.234-241, 1989.
DOI
|
14 |
J.-X. Peng, L. Kang, and W. I. George, "A New Jacobian Matrix for Optimal Learning of Single-Layer Neural Networks," IEEE Transactions on Neural Networks, Vol.19, No.1, pp.119-129, 2008.
DOI
|
15 |
D. Burshtein, "Long-term attraction in higher order neural networks," IEEE Transactions on Neural Networks, Vol.9, No.1, pp.42-50, 1998.
DOI
|
16 |
P. D. Wasserman and T. Schwartz, "Neural networks. II. What are they and why is everybody so interested in them now?," IEEE Expert, Vol.3, No.1, pp.10-15, 1988.
DOI
|
17 |
P. Yugowati, M. Shaou-Gang, and W. Hui-Ming, "Supervised learning approaches and feature selection-a case study in diabetes," International Journal of Data Analysis Techniques and Strategies, Vol. 5, No.3, 2013, pp. 323-337.
DOI
|
18 |
C. Gustavo, B. C. Antoni, J. M. Pedro, and V. Nuno, "Supervised Learning of Semantic Classes for Image Annotation and Retrieval," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.29, No.3, pp.394-410, 2007.
DOI
|