Release Time:2025-10-31 Hits:
Indexed by: Journal Papers
Document Code: 585260
Date of Publication: 2025-10-18
Journal: COMPUTER NETWORKS
Volume: 271
ISSN: 1389-1286
Prev One:Multi-source data outlier detection based on secure multi-party computation
Next One:Points of the local optimal privacy utility tradeoff