Login / Signup
How to deal with malicious users in privacy-preserving distributed data mining.
Yitao Duan
John F. Canny
Published in:
Stat. Anal. Data Min. (2009)
Keyphrases
</>
malicious users
sensitive data
data sets
management system
databases
data mining
access control
sensitive information