共 50 条
- [42] Research on Privacy Preserving Data Mining [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 172 - 175
- [43] Privacy Preserving Data Mining by Cyptography [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 576 - +
- [45] On data distortion for privacy preserving data mining [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 308 - 311
- [46] Privacy Preserving Techniques For Storage Privacy Attacks:A Survey [J]. 2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2012, : 283 - 287
- [47] An Overview of Privacy Preserving Data Mining [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1341 - 1347
- [48] Study of Privacy Preserving Data Mining [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
- [49] A Review on Privacy Preserving Data Mining [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
- [50] A Survey on Preserving Privacy for Sensitive Association Rules in Databases [J]. INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 538 - +