How to deal with malicious users in privacy‐preserving distributed data mining

From MaRDI portal
Publication:3497744

DOI10.1002/SAM.10029zbMATH Open1178.68224OpenAlexW4243616933MaRDI QIDQ3497744FDOQ3497744


Authors: Yitao Duan, John Canny Edit this on Wikidata


Publication date: 27 July 2009

Published in: Statistical Analysis and Data Mining: The ASA Data Science Journal (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1002/sam.10029




Recommendations




Cites Work


Cited In (4)





This page was built for publication: How to deal with malicious users in privacy‐preserving distributed data mining

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3497744)