Goldreich, O., Micali, S., and Wigderson, A. (1987). How
to play any mental game or A completeness theorem
for protocols with honest majority. In STOC.
Hamidi, M., Sheikhalishahi, M., and Martinelli, F. (2019).
Privacy preserving Expectation Maximization (EM)
clustering construction. In DCAI.
Huang, Z. and Ng, M. K. (1999). A fuzzy K-modes algo-
rithm for clustering categorical data. IEEE Transac-
tions on Fuzzy Systems.
Hubert, L. and Arabie, P. (1985). Comparing partitions.
Journal of Classification.
Jagannathan, G., Pillaipakkamnatt, K., Wright, R. N., and
Umano, D. (2010). Communication-efficient privacy-
preserving clustering. Transactions on Data Privacy.
Jagannathan, G. and Wright, R. N. (2005). Privacy-
preserving distributed k-means clustering over arbi-
trarily partitioned data. In International Conference on
Knowledge Discovery in Data Mining (KDD).
Jain, A. K., Murty, M. N., and Flynn, P. J. (1999). Data
clustering: A review. In ACM Computing Surveys.
J
¨
aschke, A. and Armknecht, F. (2019). Unsupervised ma-
chine learning on encrypted data. SAC.
Jha, S., Kruger, L., and McDaniel, P. (2005). Privacy pre-
serving clustering. In ESORICS.
Jiang, D., Xue, A., Ju, S., Chen, W., and Ma, H. (2008).
Privacy-preserving DBSCAN on horizontally parti-
tioned data. In International Symposium on IT in
Medicine and Education.
John, T., Jin, J., Dauwels, J., Cash, S., and Westover, B.
(2016). Clustering of interictal spikes by dynamic time
warping and affinity propagation. In International Con-
ference on Acoustics, Speech and Signal Processing
(ICASSP).
Juvekar, C., Vaikuntanathan, V., and Chandrakasan, A.
(2018).
GAZELLE
: A low latency framework for se-
cure neural network inference. In USENIX Security’18.
Kamara, S. and Raykova, M. (2011). Secure outsourced
computation in a multi-tenant cloud. IBM Workshop
on Cryptography and Security in Clouds.
Keller, M. (2020). MP-SPDZ: A versatile framework for
multi-party computation. In CCS.
Leone, M., Sumedha, S., and Weigt, M. (2007). Clustering
by soft-constraint affinity propagation: Applications to
gene-expression data. Bioinformatics.
Lin, X., Clifton, C., and Zhu, M. (2005). Privacy-preserving
clustering with distributed EM mixture modeling. In
Knowledge and Information Systems.
Lindell, Y. and Nof, A. (2017). A framework for construct-
ing fast mpc over arithmetic circuits with malicious
adversaries and an honest-majority. In CCS.
Lindell, Y. and Pinkas, B. (2015). An efficient protocol
for secure two-party computation in the presence of
malicious adversaries. In Journal of Cryptography.
Liu, J., Xiong, L., Luo, J., and Huang, J. Z. (2013). Privacy
preserving distributed DBSCAN clustering. Transac-
tions on Data Privacy.
Makri, E., Rotaru, D., Vercauteren, F., and Wagh, S. (2021).
Rabbit: Efficient comparison for secure multi-party
computation. In FC.
Masulli, F. and Schenone, A. (1999). A fuzzy clustering
based segmentation system as support to diagnosis in
medical imaging. Artificial Intelligence in Medicine.
Mishra, P., Lehmkuhl, R., Srinivasan, A., Zheng, W., and
Popa, R. A. (2020). Delphi: A cryptographic inference
service for neural networks. In USENIX Security.
Mohassel, P., Rosulek, M., and Trieu, N. (2020). Practical
privacy-preserving k-means clustering. In PETS.
Patel, S., Garasia, S., and Jinwala, D. (2012). An efficient
approach for privacy preserving distributed k-means
clustering based on shamir’s secret sharing scheme. In
Trust Management VI.
Patra, A., Schneider, T., Suresh, A., and Yalame, H. (2021).
Aby2. 0: Improved mixed-protocol secure two-party
computation. In USENIX Security.
Pe
˜
na, J., Lozano, J., and Larra
˜
naga, P. (1999). An empirical
comparison of four initialization methods for the k-
means algorithm. Pattern Recognition.
Rahman, M. S., Basu, A., and Kiyomoto, S. (2017). Towards
outsourced privacy-preserving multiparty DBSCAN.
In Pacific Rim International Symposium on Depend-
able Computing.
Rathee, D., Rathee, M., Kumar, N., Chandran, N., Gupta,
D., Rastogi, A., and Sharma, R. (2020). CrypTFlow2:
Practical 2-party secure inference. In CCS.
Rotaru, D. and Wood, T. (2019). Marbled circuits: Mixing
arithmetic and boolean circuits with active security. In
INDOCRYPT.
Rousseeuw, P. (1987). Silhouettes: A graphical aid to the in-
terpretation and validation of cluster analysis. Journal
of Computational and Applied Mathematics.
Steinhaus, H. (1956). Sur la division des corp materiels en
parties. Bulletin L’Acad
´
emie Polonaise des Science.
Su, D., Cao, J., Li, N., Bertino, E., Lyu, M., and Jin, H.
(2017). Differentially private k-means clustering and a
hybrid approach to private optimization. ACM Trans-
actions on Privacy and Security.
Ultsch, A. (2005). Clustering with SOM. In Workshop on
Self-Organizing Maps.
Vaidya, J. and Clifton, C. (2003). Privacy-preserving k-
means clustering over vertically partitioned data. In
International Conference on Knowledge Discovery and
Data Mining (KDD).
Vinh, N., Epps, J., and Bailey, J. (2010). Information the-
oretic measures for clusterings comparison: Variants,
properties, normalization and correction for chance.
Journal of Machine Learning Research.
Wu, W., Liu, J., Wang, H., Hao, J., and Xian, M. (2020).
Secure and efficient outsourced k-means clustering
using fully homomorphic encryption with ciphertext
packing technique. IEEE Transactions on Knowledge
and Data Engineering.
Xu, D. and Tian, Y. (2015). A comprehensive survey of
clustering algorithms. Annals of Data Science.
Xu, R. and Wunsch, D. (2005). Survey of clustering algo-
rithms. IEEE Transactions on Neural Networks.
Xu, X., Ester, M., Kriegel, H.-P., and Sander, J. (1998). A
distribution-based clustering algorithm for mining in
large spatial databases. In International Conference on
Data Engineering.
Yao, A. C. (1986). How to generate and exchange secrets
(extended abstract). In FOCS.
Zhu, X., Liu, M., and Xie, M. (2012). Privacy-preserving
affinity propagation clustering over vertically parti-
tioned data. In International Conference on Intelligent
Networking and Collaborative Systems.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
184