Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure multi-party computation problems and their applications: a review and open problems
The growth of the Internet has triggered tremendous opportunities for cooperative
computation, where people are jointly conducting computation tasks based on the private …
computation, where people are jointly conducting computation tasks based on the private …
A survey of methods for distributed machine learning
Traditionally, a bottleneck preventing the development of more intelligent systems was the
limited amount of data available. Nowadays, the total amount of information is almost …
limited amount of data available. Nowadays, the total amount of information is almost …
Cluster ensembles---a knowledge reuse framework for combining multiple partitions
This paper introduces the problem of combining multiple partitionings of a set of objects into
a single consolidated clustering without accessing the features or algorithms that …
a single consolidated clustering without accessing the features or algorithms that …
Distributed constrained optimization by consensus-based primal-dual perturbation method
Various distributed optimization methods have been developed for solving problems which
have simple local constraint sets and whose objective function is the sum of local cost …
have simple local constraint sets and whose objective function is the sum of local cost …
Federated random forests can improve local performance of predictive models for various healthcare applications
Motivation Limited data access has hindered the field of precision medicine from exploring
its full potential, eg concerning machine learning and privacy and data protection rules. Our …
its full potential, eg concerning machine learning and privacy and data protection rules. Our …
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
K Liu, H Kargupta, J Ryan - IEEE Transactions on knowledge …, 2005 - ieeexplore.ieee.org
This paper explores the possibility of using multiplicative random projection matrices for
privacy preserving distributed data mining. It specifically considers the problem of computing …
privacy preserving distributed data mining. It specifically considers the problem of computing …
In-network outlier detection in wireless sensor networks
To address the problem of unsupervised outlier detection in wireless sensor networks, we
develop an approach that (1) is flexible with respect to the outlier definition,(2) computes the …
develop an approach that (1) is flexible with respect to the outlier definition,(2) computes the …
Web mining in soft computing framework: relevance, state of the art and future directions
The paper summarizes the different characteristics of Web data, the basic components of
Web mining and its different types, and the current state of the art. The reason for …
Web mining and its different types, and the current state of the art. The reason for …
Random-data perturbation techniques and privacy-preserving data mining
Privacy is becoming an increasingly important issue in many data-mining applications. This
has triggered the development of many privacy-preserving data-mining techniques. A large …
has triggered the development of many privacy-preserving data-mining techniques. A large …
Distributed data mining
Advances in computing and communication over wired and wireless networks have resulted
in many pervasive distributed computing environments. The Internet, intranets, local area …
in many pervasive distributed computing environments. The Internet, intranets, local area …