共 11 条
- [3] Utility and Risk of JPEG-based Continuous Microdata Protection Methods 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 929 - 934
- [4] Disclosure limitation methods based on bounds for large contingency tables with applications to disability STATISTICAL DATA MINING AND KNOWLEDGE DISCOVERY, 2004, : 93 - 116
- [5] A Survey of Software Protection Methods based on Self-modifying Code 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 589 - 593
- [8] Assessing the detectability of the Irish stoat Mustela erminea hibernica using two camera trap-based survey methods Mammal Research, 2022, 67 : 1 - 8