共 50 条
- [1] Survey of Anonymity Techniques for Privacy Preserving [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 248 - 252
- [2] Techniques for Privacy Preserving Data Sharing: A Survey [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
- [3] Privacy Preserving Techniques for Big Data: A Survey [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 194 - 199
- [4] Survey on Privacy Preserving Techniques for Machine Learning [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (07): : 2127 - 2156
- [5] A Survey on Privacy Preserving Mining Implementing Techniques [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
- [6] Privacy Preserving Data Mining Techniques-Survey [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
- [8] A Survey on Privacy Preserving Data Mining Approaches and Techniques [J]. 2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 65 - 69
- [9] Salting as a Countermeasure against Attacks on Privacy Preserving Record Linkage Techniques [J]. HEALTHINF: PROCEEDINGS OF THE 15TH INTERNATIONAL JOINT CONFERENCE ON BIOMEDICAL ENGINEERING SYSTEMS AND TECHNOLOGIES - VOL 5: HEALTHINF, 2021, : 353 - 360
- [10] A survey on privacy-preserving federated learning against poisoning attacks [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 13565 - 13582