How to deal with malicious users in privacy‐preserving distributed data mining (Q3497744): Difference between revisions
From MaRDI portal
Removed claim: author (P16): Item:Q1260753 |
Changed an Item |
||
Property / author | |||
Property / author: John F. Canny / rank | |||
Normal rank |
Revision as of 13:32, 22 February 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | How to deal with malicious users in privacy‐preserving distributed data mining |
scientific article |
Statements
How to deal with malicious users in privacy‐preserving distributed data mining (English)
0 references
27 July 2009
0 references
zero-knowledge protocol
0 references
L2-norm
0 references
privacy
0 references
malicious users
0 references
vector addition
0 references