共 50 条
[32]
Privacy preserving data mining algorithms by data distortion
[J].
PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3,
2006,
:223-228
[33]
PRIVACY PRESERVING DATA MINING APPROACH FOR EXTRACTING FUZZY RULES
[J].
PROCEEDINGS OF 2015 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET),
2015,
[35]
Privacy Preserving Data Mining Classifier for Smart City Applications
[J].
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018),
2018,
:645-648
[36]
Distributed Privacy-preserving Data Mining Method Research
[J].
2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2,
2011,
:88-90
[37]
Privacy Preserving Data Mining Survey of Classifications
[J].
SOFT COMPUTING APPLICATIONS, (SOFA 2014), VOL 1,
2016, 356
:637-649
[38]
Privacy preserving sequential pattern mining based on data perturbation
[J].
PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7,
2007,
:3239-+
[39]
PrivPy: General and Scalable Privacy-Preserving Data Mining
[J].
KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING,
2019,
:1299-1307
[40]
The Study of Privacy Preserving Data Mining Technology for Information Security
[J].
MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY,
2014, 556-562
:3532-3535