Login / Signup
Platform Utilizing Others' Behavior Data to Detect Anomalous Operation Hiding Private Information.
Masaaki Yamauchi
Yuichi Ohsita
Masayuki Murata
Published in:
ICCE-TW (2020)
Keyphrases
</>
private information
data sets
data collection
data sources
image data
raw data
training data
sensitive information
original data
privacy preserving
input data
data analysis
access control
data quality
personal information
distributed data
privacy concerns
data privacy
individual privacy
confidential data