共 50 条
- [22] How to deal with malicious users in privacy-preserving distributed data mining Statistical Analysis and Data Mining, 2009, 2 (01): : 18 - 33
- [24] Application of oblivious transfer protocol in distributed data mining with privacy-preserving PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 283 - 285
- [25] Dataless Data Mining: Association Rules-based Distributed Privacy-preserving Data Mining 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 615 - 620
- [26] PRELIMINARY DATA ANALYSIS IN HEALTHCARE MULTICENTRIC DATA MINING: A PRIVACY-PRESERVING DISTRIBUTED APPROACH JOURNAL OF E-LEARNING AND KNOWLEDGE SOCIETY, 2018, 14 (01): : 71 - 81
- [27] NOTES ON PRIVACY-PRESERVING DISTRIBUTED MINING AND HAMILTONIAN CYCLES ICSOFT 2010: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 1, 2010, : 103 - 107
- [29] A Privacy-Preserving Distributed Method for Mining Association Rules 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, VOL IV, PROCEEDINGS, 2009, : 294 - 297
- [30] Privacy-Preserving Mining of Association Rules on Distributed Databases INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 259 - 266