An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining
暂无分享,去创建一个
Chin-Chen Chang | Rong Wang | Tung-Shou Chen | Yan Zhu | Chinchen Chang | Yan Zhu | Tung-Shou Chen | Rong Wang
[1] S. Reiss,et al. Data-swapping: A technique for disclosure control , 1982 .
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] Steven P. Reiss. Practical Data-Swapping: The First Steps , 1980, 1980 IEEE Symposium on Security and Privacy.
[4] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[5] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[6] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[7] Fei Peng,et al. Adaptive reversible data hiding scheme based on integer transform , 2012, Signal Process..
[8] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[9] Tung-Shou Chen,et al. Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving , 2013, The Journal of Supercomputing.
[10] Keng-Pei Lin. Privacy-preserving kernel k-means clustering outsourcing with random transformation , 2016, Knowledge and Information Systems.
[11] Philip S. Yu,et al. Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.
[12] Chen-Yi Lin,et al. A reversible data transform algorithm using integer transform for privacy-preserving data mining , 2016, J. Syst. Softw..
[13] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[14] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[15] Ming-Syan Chen,et al. Secure support vector machines outsourcing with random linear transformation , 2014, Knowledge and Information Systems.