Author:
Sheikhalishahi Mina,Martinelli Fabio
Publisher
Springer International Publishing
Reference13 articles.
1. 1. Artoisenet, C., Roland, M., Closon, M.: Health networks: actors, professional relationships, and controversies. In: Collaborative Patient Centred eHealth. vol. 141. IOSPress (2013)
2. 2. Banerjee, M., Chakravarty, S.: Privacy preserving feature selection for distributed data using virtual dimension. In: Proceedings of the 20th ACM Conference on Information and Knowledge Management, CIKM. pp. 2281–2284 (2011)
3. 3. Bertino, E., Lin, D., Jiang, W.: A survey of quantification of privacy preserving data mining algorithms. In: Privacy-Preserving Data Mining, vol. 34, pp. 183–205. Springer US (2008)
4. 4. Bogan, C.E., English, M.J.: Benchmarking for best practices: winning through innovative adaptation. New York: McGraw-Hill (1994)
5. 5. Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16–28 (Jan 2014)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Pixels Who Violate Our Privacy! Deep Learning for Identifying Images’ Key Pixels;Lecture Notes in Computer Science;2024
2. Feature Selection on Anonymized Datasets;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
3. Add noise to remove noise: Local differential privacy for feature selection;Computers & Security;2022-12
4. Privacy preserving data sharing and analysis for edge-based architectures;International Journal of Information Security;2021-03-06
5. Less is More: Feature Choosing under Privacy-Preservation for Efficient Web Spam Detection;Lecture Notes in Computer Science;2021