How to deal with malicious users in privacy‐preserving distributed data mining

From MaRDI portal
Publication:3497744












This page was built for publication: How to deal with malicious users in privacy‐preserving distributed data mining

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3497744)