How to deal with malicious users in privacy‐preserving distributed data mining

From MaRDI portal
Publication:3497744