Login / Signup

How to deal with malicious users in privacy-preserving distributed data mining.

Yitao DuanJohn F. Canny
Published in: Stat. Anal. Data Min. (2009)
Keyphrases
  • malicious users
  • sensitive data
  • data sets
  • management system
  • databases
  • data mining
  • access control
  • sensitive information