[1]
M. Blanton, "Achieving full security in privacy-preserving data mining", In: Proceeding of IEEE International Conference on Social Computing. Oct 2011, pp. 925-934
[2]
B. Peng, X. Geng, and J. Zhang, "Combined data distortion strategies for privacy-preserving data mining", In: Proceeding of IEEE International Conference on Advanced Computer Theory and Engineering. Aug 2010, Vol. 1, pp. 572-576.
[3]
X. Lei, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information security in big data: Privacy and data mining", IEEE Access, vol. 2, pp. 1149-1176, 2014.
[4]
V.S. Verykios, E. Bertino, I.N. Fovino, L.P. Provenza, Y. Saygin, and Y. Theodoridis, "State-of-the-art in privacy preserving data mining", In: Proceeding of SIGMOD Record. March 2004, Vol. 33,No. 1, pp. 50-57.
[5]
J. Vaidya, B. Shafiq, W. Fan, D. Mehmood, and D. Lorenzi, "A random decision tree framework for privacy-preserving data mining", IEEE Trans. Depend. Secure Comput., vol. 11, no. 5, pp. 399-411, 2014.
[6]
M.T.M. Saleem, and A.P. Kankale, "Privacy preserving and data mining in big data", Int. Res. J. Engin. Tech., vol. 3, no. 10, pp. 197-201, 2016.
[7]
R. Mendes, and J.P. Vilela, "Privacy-preserving data mining: methods, metrics, and applications", IEEE Access, vol. 5, pp. 10562-10582, 2017.
[8]
C.C. Aggarwal, Data Mining: The Textbook.New York, NY, USA, . Springer, 2015
[9]
G.A. Afzali, and S. Mohammadi, "Privacy preserving big data mining: association rule hiding using fuzzy logic approach", IET Inf. Secur., vol. 12, no. 1, pp. 15-24, 2017.
[10]
Z. Xuyun, L. Chang, and N.S. Surya, "A hybrid approach for scalable subtree anonymization over big data using MapReduce on cloud", JCSS, vol. 80, no. 5, pp. 1008-1020, 2014.
[11]
C.L.C. Philip, and C.Y. Zh, "Data-intensive applications, challenges, techniques and technologies: A survey on big data", Inf. Sci., vol. 275, pp. 314-347, 2014.
[12]
W. Wang, B. Deng, and Z. Li, "Application of oblivious transfer protocol in distributed data mining with privacy-preserving", The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007). Nov, 2007, pp. 283-285.
[13]
W. Xindong, Z. Xingquan, and W. Gong-Qing, "Data mining with big data", IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97-107, 2014.
[14]
Shengyi. Pan, "T.Morris, and U. Adhikari, “Developing a hybrid intrusion detection system using data mining for power systems", IEEE Transactions on Smart Grid, vol. 6, pp. 3104-3113, 2015.
[15]
C.Y. Lin, "A reversible data transform algorithm using integer transform for privacy-preserving data mining", J. Syst. Softw., vol. 117, pp. 104-112, 2016.
[16]
P.S. Wang, F. Lai, H-C. Hsiao, and J-L. Wu, "Insider collusion attack on privacy-preserving kernel-based data mining systems", IEEE Access, vol. 4, pp. 2244-2255, 2016.
[17]
L. Li, R. Lu, K.K.R. Choo, A. Datta, and J. Shao, "Privacy-preserving-outsourced association rule mining on vertically partitioned databases", IEEE T. Info. Foren. Sec., vol. 11, no. 8, pp. 1847-1861, 2016.
[18]
K. Liu, H. Kargupta, and J. Ryan, "Random projection-based multiplicative data perturbation for privacy preserving distributed data mining", IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, pp. 92-106, 2006.
[19]
L.A. Dunning, and R. Kresman, "Privacy preserving data sharing with anonymous ID assignment", IEEE T. Info. Foren. Sec. Vol. 8,No.2, pp .402-413, 2013.
[20]
K. Chen, and L. Liu, "Privacy-preserving multiparty collaborative mining with geometric data perturbation", IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 12, pp. 1764-1776, 2009.
[21]
N.S. Bushra, and A. Chandrasekar, "Privacy preservation on big data using Pk-Anonymization", IJIRCST, vol. 3, no. 11, pp. 11937-11942, 2015.
[22]
B.B. Mehta, and U.P. Rao, "Privacy preserving big data publishing: a scalable k-anonymization approach using MapReduce", IET Softw., vol. 11, no. 5, pp. 271-276, 2017.
[23]
H.R. Tizhoosh, "Opposition-based learning: A new scheme for machine intelligence", International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), vol. 1, pp. 695-701. 2008