2013 5th International Conference on Computational Intelligence and Communication Networks 2013
DOI: 10.1109/cicn.2013.106
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Approach for Clustering Uncertain Data Mining Based on Hash Indexing and Voronoi Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(28 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…To protecting machine learning ecosystems requires a holistic approach that includes data security, model security, pipeline security, ongoing observation, and incident response. By using these all-encompassing tactics, businesses can create resilient ML systems that can endure the changing threat landscape, protect their data, and guarantee the validity of their AI-driven decision-making processes [6]. This article explores each of these aspects in depth, offering organisations looking to defend their machine learning ecosystems against new threats useful insights and suggestions.…”
Section: Figure 1: Systematic View Of Proposed Modelmentioning
confidence: 99%
“…To protecting machine learning ecosystems requires a holistic approach that includes data security, model security, pipeline security, ongoing observation, and incident response. By using these all-encompassing tactics, businesses can create resilient ML systems that can endure the changing threat landscape, protect their data, and guarantee the validity of their AI-driven decision-making processes [6]. This article explores each of these aspects in depth, offering organisations looking to defend their machine learning ecosystems against new threats useful insights and suggestions.…”
Section: Figure 1: Systematic View Of Proposed Modelmentioning
confidence: 99%
“…An access control mechanism with a final lock combined with cloud computing is presented by Roy et al [6]. For the secure exchange of medical data, Edemacu and colleagues discuss the resistance to collaboration in access control [7].…”
Section: Review Of Literaturementioning
confidence: 99%
“…A set of points called seeds or generators is specified beforehand. For each seed there will be a corresponding region consisting of all points closer to that generator than to any other [10]. Hence, a Voronoi Diagram for a given data set can be constructed by computing the perpendicular bisectors of the line segments between the pairs of data points.…”
Section: Voronoi Diagrammentioning
confidence: 99%