共 15 条
[1]
Alzaid Hani., 2008, 6th Australasian conference on Information security (AISC), P93
[2]
Chan Haowen., 2006, Proc. of the 13th ACM Conference on Computer and Communications Security, P278
[3]
Chan HW, 2005, IEEE INFOCOM SER, P524
[4]
PDA: Privacy-preserving data aggregation in wireless sensor networks
[J].
INFOCOM 2007, VOLS 1-5,
2007,
:2045-+
[5]
TAG:: a Tiny AGgregation service for ad-hoc sensor networks
[J].
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION,
2002,
:131-146
[6]
Mlaih E., 2008, P IEEE INFOCOM WORKS, P1, DOI DOI 10.1109/INFOCOM.2008.4544601
[7]
Unbalanced data classification using extreme outlier elimination and sampling techniques for fraud detection
[J].
ADCOM 2007: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS,
2007,
:511-+
[9]
Przydatek B., 2003, Proceedings of the 1st international conference on Embedded networked sensor systems, P255, DOI [10.1145/958491.958521, DOI 10.1145/958491.958521]
[10]
Ross Stephen M., 2003, J ENG TECHNOLOGY SPR