References(27)
[1]
G. Guo and C. Altrjman, E-commerce customer segmentation method under improved k-means algorithm, in Proc. 4th International Conference on Multi-Modal Information Analytics, Hohhot, China, 2022, pp. 1083–1089.
[2]
M. Jebakumari, T. Palaniraja, K. A. Patrick, and Ashwini , Blocking of spam mail using k-means clustering algorithm, International Journal of Information Technology and Computer Engineering (IJITC), vol. 2, no. 3, pp. 19–24, 2022.
[3]
M. Dhalaria and E. Gandotra, Android malware detection techniques: A literature review, Recent Patents on Engineering, vol. 15, no. 2, pp. 225–245, 2021.
[4]
Y. Qu, J. Zhang, R. Li, X. Zhang, X. Zhai, and S. Yu, Generative adversarial networks enhanced location privacy in 5G networks, Science China Information Sciences, vol. 63, no. 12, p. 220303, 2020.
[5]
Y. Qu, S. Yu, W. Zhou, S. Chen, and J. Wu, Customizable reliable privacy-preserving data sharing in cyber-physical social networks, IEEE Transactions on Network Science and Engineering, vol. 8, no. 1, pp. 269–281, 2020.
[6]
Y. Qu, L. Gao, Y. Xiang, S. Shen, and S. Yu, FedTwin: Blockchain-enabled adaptive asynchronous federated learning for digital twin networks, IEEE Network, vol. 36, no. 6, pp. 183–190, 2022.
[7]
U. Erlingsson, V. Pihur, and A. Korolova, RAPPOR: Randomized aggregatable privacy-preserving ordinal response, in Proc. 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 2014, pp. 1054–1067.
[9]
B. Ding, J. Kulkarni, and S. Yekhanin, Collecting telemetry data privately, in Proc. 31st International Conference on Neural Information Processing Systems (NeurIPS), Long Beach, CA, USA, 2017, pp. 3574–3583.
[10]
C. Dwork and A. Roth, The algorithmic foundations of differential privacy, Foundations and Trends in Theoretical Computer Science, vol. 9, nos. 3&4, pp. 211–407, 2014.
[11]
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith, What can we learn privately? SIAM Journal on Computing, vol. 40, no. 3, pp. 793–826, 2011.
[12]
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability: Differential privacy for location-based systems, in Proc. 2013 ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 2013, pp. 901–914.
[13]
N. Wang, X. Xiao, Y. Yang, J. Zhao, S. C. Hui, H. Shin, J. Shin, and G. Yu, Collecting and analyzing multidimensional data with local differential privacy, in Proc. 2019 IEEE 35th International Conference on Data Engineering (ICDE), Macao, China, 2019, pp. 638–649.
[14]
J. C. Duchi, M. I. Jordan, and M. J. Wainwright, Minimax optimal procedures for locally private estimation, Journal of the American Statistical Association, vol. 113, no. 521, pp. 182–201, 2018.
[15]
A. Blum, C. Dwork, F. McSherry, and K. Nissim, Practical privacy: The SuLQ framework, in Proc. Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Baltimore, MD, USA, 2005, pp. 128–138.
[16]
T. Ni, M. Qiao, Z. Chen, S. Zhang, and H. Zhong, Utility-efficient differentially private k-means clustering based on cluster merging, Neurocomputing, vol. 424, pp. 205–214, 2021.
[17]
A. Smith, Privacy-preserving statistical estimation with optimal convergence rates, in Proc. 43rd Annual ACM Symposium on Theory of Computing, San Jose, CA, USA, 2011, pp. 813–822.
[18]
J. Zhang, X. Xiao, Y. Yang, Z. Zhang, and M. Winslett, PrivGene: Differentially private model fitting using genetic algorithms, in Proc. 2013 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 2013, pp. 665–676.
[19]
Z. Lu and H. Shen, A convergent differentially private k-means clustering algorithm, in Proc. 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, Macao, China, 2019, pp. 612–624.
[20]
D. Su, J. Cao, N. Li, E. Bertino, M. Lyu, and H. Jin, Differentially private k-means clustering and a hybrid approach to private optimization, ACM Transactions on Privacy and Security, vol. 20, no. 4, pp. 1–33, 2017.
[21]
M. Yang, I. Tjuawinata, and K. Y. Lam, K-means clustering with local dx-privacy for privacy-preserving data analysis, IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2524–2537, 2022.
[22]
M. Yang, L. Lyu, J. Zhao, T. Zhu, and K. Y. Lam, Local differential privacy and its applications: A comprehensive survey, arXiv preprint arXiv: 2008.03686, 2020.
[23]
K. Nissim and U. Stemmer, Clustering algorithms for the centralized and local models, Proceedings of Algorithmic Learning Theory, vol. 83, pp. 619–653, 2018.
[24]
H. Kaplan and U. Stemmer, Differentially private k-means with constant multiplicative error, in Proc. 32nd International Conference on Neural Information Processing Systems (NeurIPS), Montréal, Canada, 2018, pp. 5436–5446.
[25]
U. Stemmer, Locally private k-means clustering, in Proc. Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms, Salt Lake City, UT, USA, 2020, pp. 548–559.
[26]
C. Xia, J. Hua, W. Tong, and S. Zhong, Distributed k-means clustering guaranteeing local differential privacy, Computers & Security, vol. 90, p. 101699, 2020.
[27]
A. Chang, B. Ghazi, R. Kumar, and P. Manurangsi, Locally private k-means in one round, arXiv preprint arXiv: 2104.09734, 2021.