Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference35 articles.
1. Handling missing values when applying classification models;Saar-Tsechansky;J. Mach. Learn. Res.,2007
2. Protection of big data privacy;Mehmood;IEEE Access,2016
3. Big data privacy in the internet of things era;Perera;IT Prof.,2015
4. Addressing cloud computing security issues;Zissis;Future Gener. Comput. Syst.,2012
5. Physiological information leakage: A new frontier in health information security;Nia;IEEE Trans. Emerging Top. Comput.,2016
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献