共 50 条
- [41] Efficient Privacy-Preserving Data Mining in Malicious Model ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382
- [43] Privacy-preserving data mining on data grids in the presence of malicious participants 13TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 225 - 234
- [45] A Kind of Privacy-Preserving Data Mining Algorithm Oriented to Data User ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 25 - +
- [47] Distributed anonymous data perturbation method for privacy-preserving data mining Journal of Zhejiang University-SCIENCE A, 2009, 10 : 952 - 963
- [48] Distributed anonymous data perturbation method for privacy-preserving data mining JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (07): : 952 - 963
- [49] Random-data perturbation techniques and privacy-preserving data mining Knowledge and Information Systems, 2005, 7 : 387 - 414
- [50] Analysis of Privacy-Preserving Mechanisms for Outsourcing Data Mining Tasks 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12542 - +