共 50 条
- [41] Privacy Preserving Techniques For Storage Privacy Attacks:A Survey 2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2012, : 283 - 287
- [42] An Overview of Privacy Preserving Data Mining 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
- [43] A Review on Privacy Preserving Data Mining 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
- [44] Study of Privacy Preserving Data Mining 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
- [46] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
- [47] A Survey on Privacy Preserving Association Rule Mining 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 93 - 97
- [48] A Survey on Auditing Techniques Used for Preserving Privacy of Data Stored on Cloud 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1320 - 1323
- [49] Privacy Preserving Data Mining Techniques for Hiding Sensitive Data: A Step Towards Open Data DATA SCIENCE LANDSCAPE: TOWARDS RESEARCH STANDARDS AND PROTOCOLS, 2018, 38 : 205 - 212