共 50 条
- [31] An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining [J]. COMPUTER JOURNAL, 2018, 61 (08): : 1123 - 1132
- [32] Privacy preserving sequential pattern mining based on data perturbation [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3239 - +
- [36] Research on Privacy-Preserving Technology of Data Mining [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614
- [37] An improved algorithm for privacy-preserving data mining based on NMF [J]. Journal of Information and Computational Science, 2015, 12 (09): : 3423 - 3430
- [39] Privacy-Preserving Data Mining for Smart Manufacturing [J]. SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
- [40] Privacy-preserving data mining in electronic surveys [J]. SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1179 - 1185