{"id":"https://openalex.org/W1832890163","doi":"https://doi.org/10.1109/rivf.2009.5174654","title":"Privacy Preserving EM-Based Clustering","display_name":"Privacy Preserving EM-Based Clustering","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W1832890163","doi":"https://doi.org/10.1109/rivf.2009.5174654","mag":"1832890163"},"language":"en","primary_location":{"id":"doi:10.1109/rivf.2009.5174654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf.2009.5174654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039210881","display_name":"The Dung Luong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210147351","display_name":"Viet Nam Government","ror":"https://ror.org/04g9rr142","country_code":"VN","type":"government","lineage":["https://openalex.org/I4210147351"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"The Dung Luong","raw_affiliation_strings":["Information Technology Center, VietNam Government Information Security Commission, HaNoi, VietNam"],"affiliations":[{"raw_affiliation_string":"Information Technology Center, VietNam Government Information Security Commission, HaNoi, VietNam","institution_ids":["https://openalex.org/I4210147351"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101646487","display_name":"Tu Bao Ho","orcid":"https://orcid.org/0000-0001-5951-643X"},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"education","lineage":["https://openalex.org/I177738480"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tu Bao Ho","raw_affiliation_strings":["Institute of Information Technology, Hanoi, Vietnam","Japan Advanced Institute of Science and Technology, Nomishi, Ishikawa, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Information Technology, Hanoi, Vietnam","institution_ids":[]},{"raw_affiliation_string":"Japan Advanced Institute of Science and Technology, Nomishi, Ishikawa, Japan","institution_ids":["https://openalex.org/I177738480"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039210881"],"corresponding_institution_ids":["https://openalex.org/I4210147351"],"apc_list":null,"apc_paid":null,"fwci":0.4362,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70564471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11716","display_name":"Random Matrices and Applications","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11901","display_name":"Bayesian Methods and Mixture Models","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.8202025294303894},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7664381265640259},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.7523764371871948},{"id":"https://openalex.org/keywords/covariance-matrix","display_name":"Covariance matrix","score":0.6088622808456421},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5844017863273621},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.5794482827186584},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5105222463607788},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5004527568817139},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4864616096019745},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3247981667518616},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31220555305480957},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24427005648612976},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16772553324699402},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11211556196212769},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.05932071805000305}],"concepts":[{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.8202025294303894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7664381265640259},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.7523764371871948},{"id":"https://openalex.org/C185142706","wikidata":"https://www.wikidata.org/wiki/Q1134404","display_name":"Covariance matrix","level":2,"score":0.6088622808456421},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5844017863273621},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.5794482827186584},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5105222463607788},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5004527568817139},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4864616096019745},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3247981667518616},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31220555305480957},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24427005648612976},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16772553324699402},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11211556196212769},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.05932071805000305},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/rivf.2009.5174654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf.2009.5174654","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W199752024","https://openalex.org/W208128215","https://openalex.org/W1488526968","https://openalex.org/W1510952750","https://openalex.org/W1534285372","https://openalex.org/W1557073126","https://openalex.org/W1871114411","https://openalex.org/W1982146060","https://openalex.org/W1992402718","https://openalex.org/W1996428067","https://openalex.org/W2001336960","https://openalex.org/W2011332377","https://openalex.org/W2013141188","https://openalex.org/W2013623332","https://openalex.org/W2017464959","https://openalex.org/W2041719973","https://openalex.org/W2049633694","https://openalex.org/W2093367651","https://openalex.org/W2111272198","https://openalex.org/W2118024521","https://openalex.org/W2119047901","https://openalex.org/W2122911882","https://openalex.org/W2130099852","https://openalex.org/W2131043660","https://openalex.org/W2139336600","https://openalex.org/W2140190241","https://openalex.org/W2149998042","https://openalex.org/W2156313597","https://openalex.org/W2159024459","https://openalex.org/W2160553465","https://openalex.org/W2164384758","https://openalex.org/W2178073758","https://openalex.org/W2233233025","https://openalex.org/W2802533528","https://openalex.org/W6629139986","https://openalex.org/W6632236638","https://openalex.org/W6633193910","https://openalex.org/W6639200140","https://openalex.org/W6645909193","https://openalex.org/W6653838157","https://openalex.org/W6676454710","https://openalex.org/W6679158356"],"related_works":["https://openalex.org/W4298130764","https://openalex.org/W2804364458","https://openalex.org/W4231775656","https://openalex.org/W2132641928","https://openalex.org/W2046435967","https://openalex.org/W4310225030","https://openalex.org/W2090259340","https://openalex.org/W2886934452","https://openalex.org/W1489099099","https://openalex.org/W2024369332"],"abstract_inverted_index":{"The":[0,25,50],"problem":[1,39,116],"of":[2,27,66,80,90,117],"privacy-preserving":[3],"EM-based":[4],"clustering":[5],"was":[6],"solved":[7],"when":[8,40],"the":[9,36,41,60,67,72,88,98,102,107,115],"dataset":[10,42],"is":[11,30,43,53],"horizontally":[12,44],"partitioned":[13,45],"into":[14,46],"more":[15,20,37],"than":[16,21],"two":[17,22,48],"parts":[18],"(i.g.,":[19],"computation":[23,89],"parties).":[24],"aim":[26],"this":[28],"work":[29],"to":[31,55,71,114],"develop":[32],"a":[33,77,111],"method":[34,78,109],"for":[35,87,110],"difficult":[38],"only":[47,59],"parts.":[49],"key":[51],"question":[52],"how":[54],"compute":[56],"and":[57,93,101],"reveal":[58],"covariance":[61,91],"matrix":[62],"at":[63],"various":[64],"steps":[65],"EM":[68],"iterative":[69],"process":[70],"participating":[73],"parties.":[74],"We":[75,104],"propose":[76],"consisting":[79],"several":[81],"protocols":[82],"that":[83],"provide":[84],"privacy":[85,118],"preservation":[86],"matrices":[92],"final":[94],"results":[95],"without":[96],"revealing":[97],"private":[99],"information":[100],"means.":[103],"also":[105],"extend":[106],"proposed":[108],"better":[112],"solution":[113],"preserving":[119],"k-means":[120],"clustering.":[121]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
