Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/sadm/DuanC09
%A Duan, Yitao
%A Canny, John F.
%D 2009
%J Stat. Anal. Data Min.
%K dblp
%N 1
%P 18-33
%T How to deal with malicious users in privacy-preserving distributed data mining.
%U http://dblp.uni-trier.de/db/journals/sadm/sadm2.html#DuanC09
%V 2
@article{journals/sadm/DuanC09,
added-at = {2020-10-01T00:00:00.000+0200},
author = {Duan, Yitao and Canny, John F.},
biburl = {https://www.bibsonomy.org/bibtex/2a770ee8c05cbbfb08925c8c3c182f8ab/dblp},
ee = {https://doi.org/10.1002/sam.10029},
interhash = {fada7a5736b856737f102de5d42f7b90},
intrahash = {a770ee8c05cbbfb08925c8c3c182f8ab},
journal = {Stat. Anal. Data Min.},
keywords = {dblp},
number = 1,
pages = {18-33},
timestamp = {2020-10-02T11:45:12.000+0200},
title = {How to deal with malicious users in privacy-preserving distributed data mining.},
url = {http://dblp.uni-trier.de/db/journals/sadm/sadm2.html#DuanC09},
volume = 2,
year = 2009
}