Login / Signup
Calculating bounds on information leakage using two-bit patterns.
Ziyuan Meng
Geoffrey Smith
Published in:
PLAS (2011)
Keyphrases
</>
information leakage
data mining techniques
personal information
social networks
gray level