Login / Signup
Applying dynamic verification tagging to the k-anonymity model.
Ahmad Bennakhi
Mohamed A. Jeragh
Published in:
ICITST (2017)
Keyphrases
</>
computational model
high level
probabilistic model
experimental data
similarity measure
probability distribution
maximum likelihood
data sets
image sequences
prior knowledge
special case
management system
mathematical model
neural network model