共 28 条
[1]
Aggarwal CC, 2011, PROC INT CONF DATA, P399, DOI 10.1109/ICDE.2011.5767885
[2]
Aggarwal Charu C, 2012, Proceedings of the 2012 SIAM International Conference on Data Mining, P624
[4]
[Anonymous], 2019, IEEE T INF FOREN SEC, DOI [10.1109/TIFS.2019.2928622.1-1, DOI 10.1109/TIFS.2019.2928622.1-1]
[5]
[Anonymous], 2018, IEEE T DEPEND SECURE, DOI [10.1109/TDSC.2017.2719031.1-1, DOI 10.1109/TDSC.2017.2719031.1-1]
[6]
Blum A., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory, P92, DOI 10.1145/279943.279962
[7]
Bursztein E, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P125
[8]
Chapelle O., 2009, SEMISUPERVISED LEARN, V20, P542, DOI [10.1109/TNN.2009.2015974, DOI 10.1109/TNN.2009.2015974]