Two methods for privacy preserving data mining with malicious participants
Work
Year: 2007
Type: article
Source: Information Sciences
Authors Divyesh Shah, Sheng Zhong
Cites: 31
Cited by: 25
Related to: 10
FWCI: 2.116
Citation percentile (by year/subfield): 90.89
Subfield: Artificial Intelligence
Field: Computer Science
Domain: Physical Sciences
Sustainable Development Goal Partnerships for the goals
Open Access status: closed