Secure multi-party computation problems and their applications: a review and open problems

W Du, MJ Atallah - Proceedings of the 2001 workshop on New security …, 2001 - dl.acm.org
The growth of the Internet has triggered tremendous opportunities for cooperative
computation, where people are jointly conducting computation tasks based on the private …

A survey of methods for distributed machine learning

D Peteiro-Barral, B Guijarro-Berdiñas - Progress in Artificial Intelligence, 2013 - Springer
Traditionally, a bottleneck preventing the development of more intelligent systems was the
limited amount of data available. Nowadays, the total amount of information is almost …

Cluster ensembles---a knowledge reuse framework for combining multiple partitions

A Strehl, J Ghosh - Journal of machine learning research, 2002 - jmlr.org
This paper introduces the problem of combining multiple partitionings of a set of objects into
a single consolidated clustering without accessing the features or algorithms that …

Distributed constrained optimization by consensus-based primal-dual perturbation method

TH Chang, A Nedić, A Scaglione - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Various distributed optimization methods have been developed for solving problems which
have simple local constraint sets and whose objective function is the sum of local cost …

Federated random forests can improve local performance of predictive models for various healthcare applications

AC Hauschild, M Lemanczyk, J Matschinske… - …, 2022 - academic.oup.com
Motivation Limited data access has hindered the field of precision medicine from exploring
its full potential, eg concerning machine learning and privacy and data protection rules. Our …

Random projection-based multiplicative data perturbation for privacy preserving distributed data mining

K Liu, H Kargupta, J Ryan - IEEE Transactions on knowledge …, 2005 - ieeexplore.ieee.org
This paper explores the possibility of using multiplicative random projection matrices for
privacy preserving distributed data mining. It specifically considers the problem of computing …

In-network outlier detection in wireless sensor networks

JW Branch, C Giannella, B Szymanski, R Wolff… - … and information systems, 2013 - Springer
To address the problem of unsupervised outlier detection in wireless sensor networks, we
develop an approach that (1) is flexible with respect to the outlier definition,(2) computes the …

Web mining in soft computing framework: relevance, state of the art and future directions

SK Pal, V Talwar, P Mitra - IEEE transactions on neural …, 2002 - ieeexplore.ieee.org
The paper summarizes the different characteristics of Web data, the basic components of
Web mining and its different types, and the current state of the art. The reason for …

Random-data perturbation techniques and privacy-preserving data mining

H Kargupta, S Datta, Q Wang, K Sivakumar - Knowledge and Information …, 2005 - Springer
Privacy is becoming an increasingly important issue in many data-mining applications. This
has triggered the development of many privacy-preserving data-mining techniques. A large …

Distributed data mining

BH Park, H Kargupta - The handbook of data mining, 2003 - books.google.com
Advances in computing and communication over wired and wireless networks have resulted
in many pervasive distributed computing environments. The Internet, intranets, local area …