{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:50:05Z","timestamp":1749271805556,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811597381"},{"type":"electronic","value":"9789811597398"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9739-8_40","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:05:09Z","timestamp":1604577909000},"page":"538-552","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm"],"prefix":"10.1007","author":[{"given":"Shaopeng","family":"Liang","sequence":"first","affiliation":[]},{"given":"Haomiao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qixian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Minglu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563\u2013574. ACM (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Angel, S., Chen, H., Laine, K., Setty, S.: PIR with compressed queries and amortized query processing. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 962\u2013979. IEEE (2018)","DOI":"10.1109\/SP.2018.00062"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Anikin, I.V., Gazimov, R.M.: Privacy preserving DBSCAN clustering algorithm for vertically partitioned data in distributed systems. In: 2017 International Siberian Conference on Control and Communications (SIBCON), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/SIBCON.2017.7998473"},{"key":"40_CR4","unstructured":"Bache, K., Lichman, M.: UCI machine learning repository (2013)"},{"key":"40_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-319-96878-0_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"F Bourse","year":"2018","unstructured":"Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural networks. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 483\u2013512. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-96878-0_17"},{"key":"40_CR6","unstructured":"Chandra, R., Dagum, L., Kohr, D., Menon, R., Maydan, D., McDonald, J.: Parallel Programming in OpenMP. Morgan kaufmann (2001)"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-70278-0_1","volume-title":"Financial Cryptography and Data Security","author":"H Chen","year":"2017","unstructured":"Chen, H., Laine, K., Player, R.: Simple encrypted arithmetic library - SEAL v2.1. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 3\u201318. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70278-0_1"},{"issue":"1","key":"40_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"40_CR9","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012, 144 (2012)"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Gentry, C., et al.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"40_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37682-5_1","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"T Graepel","year":"2013","unstructured":"Graepel, T., Lauter, K., Naehrig, M.: ML confidential: machine learning on encrypted data. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 1\u201321. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-37682-5_1"},{"key":"40_CR12","unstructured":"Halkidi, M., Vazirgiannis, M.: Clustering validity assessment: finding the optimal partitioning of a data set. In: Proceedings 2001 IEEE International Conference on Data Mining, pp. 187\u2013194. IEEE (2001)"},{"issue":"6245","key":"40_CR13","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan, M.I., Mitchell, T.M.: Machine learning: trends, perspectives, and prospects. Science 349(6245), 255\u2013260 (2015)","journal-title":"Science"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Khan, A.N., Fan, M.Y., Malik, A., Memon, R.A.: Learning from privacy preserved encrypted data on cloud through supervised and unsupervised machine learning. In: 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ICOMET.2019.8673524"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Kim, H.J., Chang, J.W.: A privacy-preserving k-means clustering algorithm using secure comparison protocol and density-based center point selection. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 928\u2013931. IEEE (2018)","DOI":"10.1109\/CLOUD.2018.00138"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Liang, J., Qin, Z., Ni, J., Lin, X., Shen, X.S.: Efficient and privacy-preserving outsourced SVM classification in public cloud. In: 2019 IEEE International Conference on Communications (ICC), ICC 2019, pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761610"},{"issue":"3","key":"40_CR17","doi-asserted-by":"publisher","first-page":"2893","DOI":"10.1109\/TVT.2019.2894720","volume":"68","author":"J Ni","year":"2019","unstructured":"Ni, J., Lin, X., Shen, X.: Toward privacy-preserving valet parking in autonomous driving era. IEEE Trans. Veh. Technol. 68(3), 2893\u20132905 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on Security and Privacy, pp. 463\u2013477. IEEE (2013)","DOI":"10.1109\/SP.2013.38"},{"key":"40_CR19","doi-asserted-by":"publisher","first-page":"31525","DOI":"10.1109\/ACCESS.2018.2847307","volume":"6","author":"H Quan","year":"2018","unstructured":"Quan, H., Wang, B., Zhang, Y., Wu, G.: Efficient and secure top-k queries with top order-preserving encryption. IEEE Access 6, 31525\u201331540 (2018)","journal-title":"IEEE Access"},{"issue":"6191","key":"40_CR20","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.1126\/science.1242072","volume":"344","author":"A Rodriguez","year":"2014","unstructured":"Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492\u20131496 (2014)","journal-title":"Science"},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Sun, X., Zhang, P., Liu, J.K., Yu, J., Xie, W.: Private machine learning classification based on fully homomorphic encryption. IEEE Trans. Emerg. Top. Comput. (2018)","DOI":"10.1109\/TETC.2018.2794611"},{"issue":"8","key":"40_CR22","doi-asserted-by":"publisher","first-page":"3766","DOI":"10.1109\/TII.2018.2816343","volume":"14","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Yang, L.T., Sun, J.: A secure high-order CFS algorithm on clouds for industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3766\u20133774 (2018)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"40_CR23","unstructured":"Zhu, L., Li, M., Zhang, Z., Qin, Z.: ASAP: an anonymous smart-parking and payment scheme in vehicular networks. IEEE Trans. Dependable Secure Comput. (2018)"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9739-8_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:20:37Z","timestamp":1604578837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9739-8_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811597381","9789811597398"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9739-8_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfcs.com.cn\/fcs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}