共 121 条
[1]
Abul O, 2008, PROC INT CONF DATA, P376, DOI 10.1109/ICDE.2008.4497446
[2]
Adl R. Karimi, 2012, NEGOTIATION GAME EST
[3]
Adl RK, 2012, LECT NOTES COMPUT SC, V7371, P74, DOI 10.1007/978-3-642-31540-4_6
[4]
Aggarwal Charu C, 2008, A general survey of privacy-preserving data mining models and algorithms
[5]
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[6]
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[7]
Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
[J].
2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW),
2013,
:121-126
[8]
[Anonymous], J INFORM COMPUTATION
[9]
[Anonymous], 2010, Computing, DOI DOI 10.1145/1749603.1749605
[10]
[Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]