An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining

[1]  S. Reiss,et al.  Data-swapping: A technique for disclosure control , 1982 .

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Steven P. Reiss Practical Data-Swapping: The First Steps , 1980, 1980 IEEE Symposium on Security and Privacy.

[4]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[5]  Chunxiao Jiang,et al.  Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.

[6]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[7]  Fei Peng,et al.  Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..

[8]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[9]  Tung-Shou Chen,et al.  Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving , 2013, The Journal of Supercomputing.

[10]  Keng-Pei Lin Privacy-preserving kernel k-means clustering outsourcing with random transformation , 2016, Knowledge and Information Systems.

[11]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[12]  Chen-Yi Lin,et al.  A reversible data transform algorithm using integer transform for privacy-preserving data mining , 2016, J. Syst. Softw..

[13]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[14]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[15]  Ming-Syan Chen,et al.  Secure support vector machines outsourcing with random linear transformation , 2014, Knowledge and Information Systems.