Fig. 3From: Research on wireless distributed financial risk data stream mining based on dual privacy protectionThe privacy protection node model for distributed data miningBack to article page