User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data
User behavior clustering analysis has a wide range of applications in business intelligence, information retrieval, and image pattern recognition and fault diagnosis. Most of existing methods of user behavior have some problems such as weak generality and the lack of tags of clustering. With the inc...
Main Authors: | Minghui Gao, Bo Li, Chen Wang, Li Ma, Jian Xu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8913457/ |
Similar Items
-
Resources and users in the tagging process: approaches and case studies
by: Felice Ferrara, et al.
Published: (2010-05-01) -
Homomorphic Encryption Based Privacy Preservation Scheme for DBSCAN Clustering
by: Mingyang Wang, et al.
Published: (2022-03-01) -
Quantifying Tourist Behavior Patterns by Travel Motifs and Geo-Tagged Photos from Flickr
by: Liu Yang, et al.
Published: (2017-11-01) -
Expert vs. Novices Dimensions of Tagging Behaviour in an Educational Setting
by: Sonja Spiranec, et al.
Published: (2012-04-01) -
Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting
by: D. N. Wu, et al.
Published: (2018-01-01)