Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
Zhuoran MaJianfeng MaYinbin MiaoXimeng LiuKim-Kwang Raymond ChooYu GaoRobert H. DengPublished in: IEEE Trans. Ind. Informatics (2022)
Keyphrases
- data mining
- application of data mining
- association rules
- knowledge discovery
- industrial applications
- key technologies
- cluster analysis
- data mining techniques
- text mining
- data analysis
- association rule mining
- machine learning
- business intelligence
- data miner
- data mining algorithms
- wireless sensor networks
- data warehouse
- computer science
- intrusion detection
- web mining
- privacy preserving data mining
- data mining methods
- malicious behavior
- data mining tools
- neural network
- data mining problems
- mobile computing
- data mining applications
- pattern mining
- wireless networks
- mobile devices
- case study
- decision making