共 52 条
[1]
Emekci F(2007)Privacy preserving decision tree learning over multiple parties Data Knowl Eng 63 348-361
[2]
Sahin OD(2009)Building privacy-preserving C4.5 decision tree classifier on multi-parties Int. J. Comput. Sci. Eng. 1 199-205
[3]
Gangrade A(2014)Secure deduplication with efficient and reliable convergent key management IEEE Trans. Parallel Distrib. Syst. 25 1615-1625
[4]
Patel R(2015)Identity-based encryption with outsourced revocation in cloud computing IEEE Trans. Comput. 64 425-437
[5]
Li Jin(2015)Segmentation-based image copy-move forgery detection scheme IEEE Trans. Inf. Forensics Secur. 10 507-518
[6]
Chen Xiaofeng(2011)Outsourcing multi-party computation IACR Cryptol. Eprint Arch. 2011 435-451
[7]
Li Mingqiang(2015)Location-sharing systems with enhanced privacy in mobile online social networks IEEE Syst. J. 99 1-10
[8]
Li Jingwei(2013)Efficiently outsourcing multiparty computation under multiple keys IEEE Trans. Inf. Forensics Secur. 8 2046-2058
[9]
Lee Patrick(1986)Induction of decision trees Mach. Learn. 1 81-106
[10]
Lou Wenjing(2005)Secure set intersection cardinality with application to association rule mining J. Comput. Secur. 13 593-622