References
- Z. Lv et al., Intelligent security planning for regional distributed energy internet, IEEE Trans. Ind. Inf. 16 (5), 3540 (2020). DOI: 10.1109/TII.2019.2914339.
- Z. Wang, M. Wang, and Q. Yong, Materials informatics and its application in materials research, Mater. China 36 (2), 132 (2017).
- F. Piccialli and Z. Lv, The security of medical data on internet based on differential privacy technology, ACM Transactions on Internet Technology (2020).
- H. Zhao and H. Dong, Research on personal privacy protection of China in the era of big data, J. Soc. Sci. 05 (06), 139 (2017). DOI: 10.4236/jss.2017.56012.
- V. Ford, A. Siraj, and M. Ashiqur Rahman, Secure and efficient protection of consumer privacy in advanced metering infrastructure supporting fine-grained data analysis, J. Comput. Syst. Sci. 83 (1), 84 (2017). DOI: 10.1016/j.jcss.2016.06.005.
- Z. Lv et al., Next-generation big data analytics: state of the art, challenges, and future research topics, IEEE Trans. Ind. Inf. 13 (4), 1891 (2017). DOI: 10.1109/TII.2017.2650204.
- M. Liu, M. Qu, and B. Zhao, Research and citation analysis of data mining technology based on Bayes algorithm, Mob. Netw. Appl. 22 (3), 1 (2016).
- J. Wang, Analysis on the development of modern agriculture based on data mining, Boletin Tecnico/Technical Bulletin 55 (4), 347 (2017).
- S. Houbing, G. A. Fink, and J. Sabina, Security and privacy in cyber-physical systems: foundations, in Principles and Applications (Wiley-IEEE Press, Chichester, UK, 2017), pp. 1–472.
- L. Xin, Research of food safety risk assessment system based on data mining, Adv. J. Food Sci. Technol. 8 (10), 707 (2015). DOI: 10.19026/ajfst.8.1593.
- S.-B. Tsai et al., Discussing measurement criteria and competitive strategies of green suppliers from a Green law Perspective, Proc. Inst. Mech. Eng. B J. Eng. Manuf. 229 (1_suppl), 135 (2015). DOI: 10.1177/0954405414558740.
- W.-H. Chen et al., Analysis of meridians and acupoints rules in acupuncture treatment of dysmenorrhea based on data mining, Zhen Ci Yan Jiu 42 (5), 467 (2017).
- Q. Xu. Analysis of financial data anomaly based on data mining technology, Revista de la Facultad de Ingenieria 32 (5), 338 (2017).
- M. Gangappa, C. Kiran Mai, and P. Sammulal, Analysis of advanced data mining prototypes in spatial data analysis, J. Eng. Appl. Sci. 12 (12), 3213 (2017).
- C. Yi-Ran, L. Xin, and S. Dan, Data mining analysis of regularity of formulas containing Salviae Miltiorrhizae Radix et Rhizoma-Carthami Flos medicin pair in dictionary of Chinese medicine prescription, Chin. J. Chin. Mater. Med. 41 (3), 528 (2016).
- R. Kaur and S. Singh, A survey of data mining and social network analysis based anomaly detection techniques, Egypt. Inform. J. 17 (2), 199 (2016). DOI: 10.1016/j.eij.2015.11.004.
- I. Medeiros, N. Neves, and M. Correia, Detecting and removing web application vulnerabilities with static analysis and data mining, IEEE Trans. Rel. 65 (1), 54 (2016). DOI: 10.1109/TR.2015.2457411.
- Q. Xue, Y. Zhu, and J. Wang, Joint distribution estimation and nave bayes classification under local differential privacy, IEEE Transactions on Emerging Topics in Computing, 99 1, (2020).
- Z. Lv and L. Qiao, Analysis of healthcare big data, Future Gener. Comput. Syst. 109, 103 (2020). DOI: 10.1016/j.future.2020.03.039.
- R. Shubhangi and R. Suraj, Study and analysis of multi-label classification methods in data mining, Int. J. Comput. Appl. 159 (9), 9 (2017). DOI: 10.5120/ijca2017913035.
- H. H. Kim and H. Y. Rhee, Trend analysis of data mining research using topic network analysis, J. Korea Soc. Comput. Inf. 21 (11), 141 (2016). DOI: 10.9708/jksci.2016.21.11.141.
- L. U. Lili, Z. Yongpan, and T. Haiyu, Research on classification algorithm and concept drift based on big data, J. Front. Comput. Sci. Technol. 10 (12), 1683 (2016).
- R. Sethi, Analysis and application of data mining by the implementation of big data, Int. J. Comput. Appl. 128 (2), 45 (2015). DOI: 10.5120/ijca2015906456.
- L.-J. Wang, Z.-W. He, and P.-X. Feng, Study of outlier data mining algorithm based on ICA, Dianzi Keji Daxue Xuebao/J. Univer. Electron. Sci. Technol. China 44 (2), 211 (2015).
- S. P. Nagarkar and R. Kumbhar, Text mining: an analysis of research published under the subject category ‘Information Science Library Science’ in Web of Science Database during 1999-2013, Libr. Rev. 64 (3), 248 (2015). DOI: 10.1108/LR-08-2014-0091.
- K. Guo, Research on location selection model of distribution network with constrained line constraints based on genetic algorithm, Neural Comput. Appl. 1 (1), 2019 (2019).
- F. Zuha and G. Achuthan, Analysis of data mining techniques and its applications, Int. J. Comput. Appl. 140 (3), 6 (2016). DOI: 10.5120/ijca2016909249.
- G. A. O. Caiyun and C. U. I. Ximin, Analysis of grey neural network and its application in landslide deformation prediction, J. Geod. Geodyn. 14 (3), 743 (2015).
- M. E. Lokanan, Data mining for statistical analysis of money laundering transactions, J. Money Laund. Control 22 (4), 753 (2019). DOI: 10.1108/JMLC-03-2019-0024.
- B. Cao et al., Multiobjective evolution of fuzzy rough neural network via distributed parallelism for stock prediction, IEEE Trans. Fuzzy Syst. 28 (5), 939 (2020). DOI: 10.1109/TFUZZ.2020.2972207.
- Z. Yu, Q. Mingming, and H. Xiangdong, Automatic component selection and parameter configuration in development of big data system, J. Front. Comput. Sci. Technol. 10 (9), 1211 (2016).
- C. Zhao and J. Li, Equilibrium selection under the Bayes-based strategy updating rules, Symmetry 12 (5), 739 (2020). DOI: 10.3390/sym12050739.
- J. Yanfeng, L. Gang, and Z. Chang, Study of data mining in social network analysis, J. Inf. Comput. Sci. 12 (16), 5947 (2015).
- A. Junior, A. José, and H. Luis, Pattern recognition system based on data mining for analysis of chemical substances in Brain, Computacion Y Sistemas 19 (1), 89 (2015).
- R. Gupta, Analysis and design of data mining techniques for prevention and detection of financial frauds, Navigation 31 (9), 711 (2015).
- L. Zhihan, L. Qiao, and Amit Kumar Singh, Advanced machine learning on cognitive computing for human behavior analysis. IEEE Trans. Comput. Soc. Syst. (2020).
- S. N. Mohanty et al., Deep learning with LSTM based distributed data mining model for energy efficient wireless sensor networks, Phys. Commun. 40, 101097 (2020). DOI: 10.1016/j.phycom.2020.101097.
- T. Sang-Bing et al., Examining how manufacturing corporations win orders, S Afr. J. Ind. Eng. 24 (3), 112 (2013).
- C. H. Wu and S. B. Tsai, Using DEMATEL-based ANP model to measure the successful factors of E-commerce, J. Glob. Inf. Manag. 26 (1), 120 (2018).
- A. M. Eassa et al., NoSQL injection attack detection in web applications using RESTful service, Program. Comput. Soft. 44 (6), 435 (2018). DOI: 10.1134/S036176881901002X.
- Y. Zhang et al., Secure and efficient outsourcing of PCA-based face recognition, IEEE Transinformforensic. Secur. 15, 1683 (2020). DOI: 10.1109/TIFS.2019.2947872.
- K. Shankar and Mohamed Elhoseny , Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES, J. Univers. Comput. Sci. 25 (10), 1221 (2019).
- I. M. El-Hasnony et al., Improved feature selection model for big data analytics, IEEE Access 8 (1), 66989 (2020). DOI: 10.1109/ACCESS.2020.2986232.