Sign in

Adversarial learning techniques for security and privacy preservation: A comprehensive review.

Jigna J. HathaliyaSudeep TanwarPriyanka Sharma
Published in: Secur. Priv. (2022)
Keyphrases
  • privacy preservation
  • data privacy
  • intrusion detection
  • privacy preserving
  • information security
  • databases
  • data mining
  • social networks
  • sensitive information
  • sensitive data
  • privacy preserving data mining