scispace - formally typeset
J

Jun Ren

Researcher at Fujian Normal University

Publications -  5
Citations -  210

Jun Ren is an academic researcher from Fujian Normal University. The author has contributed to research in topics: Differential privacy & Data deduplication. The author has an hindex of 3, co-authored 5 publications receiving 140 citations.

Papers
More filters
Journal ArticleDOI

Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT

TL;DR: A privacy and availability data clustering (PADC) scheme based on a differential privacy algorithm and differential privacy, which enhances the selection of the initial center points and the distance calculation method from other points to center point, and attempts to reduce the outlier effect through detecting outliers during the clustering process.
Proceedings ArticleDOI

DPLK-Means: A Novel Differential Privacy K-Means Mechanism

TL;DR: A novel DPLK-means algorithm based on differential privacy is proposed, which improves the selection of the initial center points through performing the differential privacy K-mean algorithm to each subset divided by the original dataset.
Proceedings ArticleDOI

A Secure Data Deduplication Scheme Based on Differential Privacy

TL;DR: The highlights of the proposed scheme lie in constructing a hybrid cloud framework, using convergent encryption algorithm to encrypt original files, and introducing differential privacy mechanism to resist against the side channel attack.
Proceedings ArticleDOI

Research Survey on Support Vector Machine

TL;DR: A more systematic introduction of SVM, including the theory of S VM, the summarization and comparison of the quadratic programming optimizations and parameter optimizations for SVM and the introduction of some new SVMs, like FSVM, TSVM, MSVM, etc.
Proceedings ArticleDOI

A novel role symmetric encryption algorithm for authorized deduplication in cloud

TL;DR: The RSEDup scheme is the first solution to prevent privacy leakage and achieve the authorized deduplication effectively and performance evaluation shows the efficiency of the proposed scheme.