{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:40:28Z","timestamp":1761597628118,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,8,16]],"date-time":"2015-08-16T00:00:00Z","timestamp":1439683200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10916-015-0305-4","type":"journal-article","created":{"date-parts":[[2015,8,15]],"date-time":"2015-08-15T06:02:52Z","timestamp":1439618572000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Anti-classification Approach for Knowledge Protection"],"prefix":"10.1007","volume":"39","author":[{"given":"Chen-Yi","family":"Lin","sequence":"first","affiliation":[]},{"given":"Tung-Shou","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hui-Fang","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Wei-Bin","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Tien-Yu","family":"Hsu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7113-7528","authenticated-orcid":false,"given":"Yuan-Hung","family":"Kao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,16]]},"reference":[{"issue":"8","key":"305_CR1","first-page":"39","volume":"48","author":"A Aggarwal","year":"2012","unstructured":"Aggarwal, A., Rani, R., and Dhir, R., Recognition of devanagari handwritten numerals using gradient features and SVM. Int. J. Comput. Appl. 48(8):39\u201344, 2012. doi: 10.5120\/7371-0151 .","journal-title":"Int. J. Comput. Appl."},{"issue":"17","key":"305_CR2","doi-asserted-by":"crossref","first-page":"2964","DOI":"10.1016\/j.ins.2009.04.012","volume":"179","author":"MZ Jahromia","year":"2009","unstructured":"Jahromia, M. Z., Parvinniab, E., and Johna, R., A method of learning weighted similarity function to improve the performance of nearest neighbor. Inform. Sci. 179(17):2964\u20132973, 2009. doi: 10.1016\/j.ins.2009.04.012 .","journal-title":"Inform. Sci."},{"issue":"2","key":"305_CR3","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TKDE.2008.131","volume":"21","author":"D Martens","year":"2009","unstructured":"Martens, D., Baesens, B., and Gestel, T. V., Decompositional rule extraction from support vector machines by active learning. IEEE Trans. Knowl. Data Eng 21(2):178\u2013191, 2009. doi: 10.1109\/TKDE.2008.131 .","journal-title":"IEEE Trans. Knowl. Data Eng"},{"issue":"9","key":"305_CR4","doi-asserted-by":"crossref","first-page":"1598","DOI":"10.1109\/TKDE.2011.124","volume":"24","author":"Y Li","year":"2012","unstructured":"Li, Y., Chen, M., Li, Q., and Zhang, W., Enabling multilevel trust in privacy preserving data mining. IEEE Trans. Knowl. Data Eng. 24(9):1598\u20131612, 2012. doi: 10.1109\/TKDE.2011.124 .","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"9","key":"305_CR5","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/TKDE.2006.136","volume":"18","author":"XB Li","year":"2006","unstructured":"Li, X. B., and Sarkar, S., A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 18(9):1278\u20131283, 2006. doi: 10.1109\/TKDE.2006.136 .","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"305_CR6","volume-title":"Privacy and security for cloud computing","author":"S Pearson","year":"2003","unstructured":"Pearson, S., and Yee, G., Privacy and security for cloud computing. Springer, Heidelberg, 2003."},{"issue":"1","key":"305_CR7","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.ejor.2014.08.016","volume":"241","author":"R Geng","year":"2014","unstructured":"Geng, R., Bose, I., and Chen, X., Prediction of financial distress: An empirical study of listed chinese companies using data mining. Eur. J. Oper. Res. 241(1):236\u2013247, 2014. doi: 10.1016\/j.ejor.2014.08.016 .","journal-title":"Eur. J. Oper. Res."},{"issue":"4","key":"305_CR8","first-page":"145","volume":"6","author":"L Hou","year":"2013","unstructured":"Hou, L., Yang, S., and Chen, Z., The use of data mining techniques and support vector regression for financial forecasting. Int. J. Database Theory Appl. 6(4):145\u2013156, 2013.","journal-title":"Int. J. Database Theory Appl."},{"issue":"4","key":"305_CR9","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1016\/j.eswa.2013.09.004","volume":"41","author":"S Oreski","year":"2014","unstructured":"Oreski, S., and Oreski, G., Genetic algorithm-based heuristic for feature selection in credit risk assessment. Expert Syst. Appl. 41(4):2052\u20132064, 2014. doi: 10.1016\/j.eswa.2013.09.004 .","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"305_CR10","doi-asserted-by":"crossref","first-page":"756","DOI":"10.1016\/j.eswa.2009.05.097","volume":"37","author":"W Yang","year":"2010","unstructured":"Yang, W., and Qiao, S., A novel anonymization algorithm: Privacy protection and knowledge preservation. Expert Syst. Appl. 37(1):756\u2013766, 2010. doi: 10.1016\/j.eswa.2009.05.097 .","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"305_CR11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1002\/widm.1078","volume":"3","author":"J Bacardit","year":"2013","unstructured":"Bacardit, J., and Llor\u00e0, X., Large-scale data mining using genetics-based machine learning. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 3(1):37\u201361, 2013. doi: 10.1002\/widm.1078 .","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"305_CR12","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-540-37275-2_35","volume":"4114","author":"TS Chen","year":"2006","unstructured":"Chen, T. S., Lin, C. C., Chiu, Y. H., Lin, H. L., and Chen, R. C., A new binary classifier: Clustering-launched classification. Lect. Notes in Comput. Sci. 4114:278\u2013283, 2006. doi: 10.1007\/11816171_35 .","journal-title":"Lect. Notes in Comput. Sci."},{"key":"305_CR13","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1007\/978-3-642-21765-4_63","volume":"98","author":"TS Chen","year":"2011","unstructured":"Chen, T. S., Chen, J., Lin, Y. C., Tsai, Y. C., Kao, Y. H., and Wu, K., A novel knowledge protection technique base on support vector machine model for anti-classification. Electr. Eng. Control 98:517\u2013524, 2011. doi: 10.1007\/978-3-642-21765-4_63 .","journal-title":"Electr. Eng. Control"},{"key":"305_CR14","unstructured":"Clifton, C., Kantarcioglu, M., and Vaidya, J., Defining privacy for data mining. Proceedings of the National Science Foundation Workshop on Next Generation Data Mining 126\u2013133, 2002."},{"issue":"5","key":"305_CR15","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1109\/TKDE.2008.199","volume":"21","author":"A Gkoulalas-Divanis","year":"2009","unstructured":"Gkoulalas-Divanis, A., and Verykios, V. S., Exact knowledge hiding through database extension. IEEE Trans. Knowl. Data Eng. 21(5):699\u2013713, 2009. doi: 10.1109\/TKDE.2008.199 .","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"305_CR16","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ghinita, G., Kantarcioglu, M., Nguyen, D., Park, J., Sandhu, R., Sultana, S., Thuraisingham, B, and Xu, S., A roadmap for privacy-enhanced secure data provenance. Journal of Intelligent Information Systems 43(3): 481\u2013501, 2014. doi: 10.1007\/s10844-014-0322-7","DOI":"10.1007\/s10844-014-0322-7"},{"key":"305_CR17","unstructured":"Goldberg, M., Cloud security alliance lists 10 big data security challenges. http:\/\/data-informed.com\/cloudsecurity-alliance-lists-10-big-data-security-challenges\/ . Accessed 3 September 2013."},{"key":"305_CR18","unstructured":"Hubbard, D., and Sutton, M., Top threats to cloud computing V1. 0. Cloud Security Alliance, 2010."},{"key":"305_CR19","doi-asserted-by":"crossref","unstructured":"Jansen, W. A., Cloud hooks: Security and privacy issues in cloud computing. Proceedings of the 44th Hawaii International Conference on System Sciences 1\u201310, 2011. doi: 10.1109\/HICSS.2011.103 .","DOI":"10.1109\/HICSS.2011.103"},{"issue":"4","key":"305_CR20","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.telpol.2012.04.011","volume":"37","author":"N Kshetri","year":"2013","unstructured":"Kshetri, N., Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommun. Pol. 37(4):372\u2013386, 2013. doi: 10.1016\/j.telpol.2012.04.011 .","journal-title":"Telecommun. Pol."},{"issue":"1","key":"305_CR21","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.compeleceng.2012.04.015","volume":"39","author":"C Rong","year":"2013","unstructured":"Rong, C., Nguyen, S. T., and Jaatun, M. G., Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1):47\u201354, 2013. doi: 10.1016\/j.compeleceng.2012.04.015 .","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"305_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., and Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1):1\u201311, 2011. doi: 10.1016\/j.jnca.2010.07.006 .","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"305_CR23","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TIFS.2008.2011087","volume":"4","author":"T Bianchi","year":"2009","unstructured":"Bianchi, T., Piva, A., and Barni, M., On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensic Secur 4(1):86\u201397, 2009. doi: 10.1109\/TIFS.2008.2011087 .","journal-title":"IEEE Trans. Inf. Forensic Secur"},{"issue":"9","key":"305_CR24","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","volume":"23","author":"Z Hao","year":"2011","unstructured":"Hao, Z., Zhong, S., and Yu, N., A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9):1432\u20131437, 2011. doi: 10.1109\/TKDE.2011.62 .","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"305_CR25","first-page":"302","volume":"2","author":"IS Sasikala","year":"2014","unstructured":"Sasikala, I. S., and Banu, N., Privacy preserving data mining using piecewise vector quantization (PVQ). Int. J. Adv. Res. Comput. Sci. Technol. 2(3):302\u2013306, 2014.","journal-title":"Int. J. Adv. Res. Comput. Sci. Technol."},{"key":"305_CR26","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.ins.2011.07.003","volume":"231","author":"JY Chun","year":"2013","unstructured":"Chun, J. Y., Hong, D., Jeong, I. R., and Lee, D. H., Privacy-preserving disjunctive normal form operations on distributed sets. Inform. Sci. 231:113\u2013122, 2013. doi: 10.1016\/j.ins.2011.07.003 .","journal-title":"Inform. Sci."},{"issue":"4","key":"305_CR27","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1749603.1749605","volume":"42","author":"B Fung","year":"2010","unstructured":"Fung, B., Wang, K., Chen, R., and Yu, P. S., Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. (CSUR) 42(4):14, 2010. doi: 10.1145\/1749603.1749605 .","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"305_CR28","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","volume":"18","author":"K Liu","year":"2006","unstructured":"Liu, K., and Kargupta, H., Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18(1):92\u2013106, 2006. doi: 10.1109\/TKDE.2006.14 .","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"14","key":"305_CR29","doi-asserted-by":"crossref","first-page":"2696","DOI":"10.1016\/j.ins.2010.03.011","volume":"180","author":"N Matatov","year":"2010","unstructured":"Matatov, N., Rokach, L., and Maimon, O., Privacy-preserving data mining: A feature set partitioning approach. Inform. Sci. 180(14):2696\u20132720, 2010. doi: 10.1016\/j.ins.2010.03.011 .","journal-title":"Inform. Sci."},{"issue":"1","key":"305_CR30","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.dss.2009.07.003","volume":"48","author":"D Zhu","year":"2009","unstructured":"Zhu, D., Li, X. B., and Wu, S., Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining. Decis. Support. Syst. 48(1):133\u2013140, 2009. doi: 10.1016\/j.dss.2009.07.003 .","journal-title":"Decis. Support. Syst."},{"issue":"3","key":"305_CR31","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TKDE.2010.236","volume":"24","author":"T Li","year":"2012","unstructured":"Li, T., Li, N., Zhang, J., and Molloy, I., Slicing: A new approach for privacy preserving data publishing. IEEE Trans. Knowl. Data Eng. 24(3):561\u2013574, 2012. doi: 10.1109\/TKDE.2010.236 .","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"305_CR32","doi-asserted-by":"crossref","unstructured":"Chen, T. S., Chen, J., Lin, Y. C., and Tsai, Y. C., Research to protect database by shaking random sampling interference (SRSI). Proceedings of the 2009 Global Congress on Intelligent Systems 569\u2013572, 2009. doi: 10.1109\/GCIS.2009.384 .","DOI":"10.1109\/GCIS.2009.384"},{"key":"305_CR33","doi-asserted-by":"crossref","unstructured":"Chen, T. S., Chen, J., Kao, Y. H., and Hsieh, T. C., A novel anti-data mining technique based on hierarchical anti-clustering (HAC). Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications 426\u2013430, 2008. doi: 10.1109\/ISDA.2008.155","DOI":"10.1109\/ISDA.2008.155"},{"issue":"4","key":"305_CR34","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi, H., and Williams, L. J., Principal component analysis. Comput. Stat. 2(4):433\u2013459, 2010. doi: 10.1002\/wics.101 .","journal-title":"Comput. Stat."},{"key":"305_CR35","unstructured":"Lin, J. S., Tien, S. W., Chen, T. S., Kao, Y. H., Lin, C. C., and Chiu, Y. H., Referential hierarchical clustering algorithm based upon principal component analysis and genetic algorithm. Proceedings of the WSEAS International Conference on Applied Computer Science 139\u2013143, 2007."},{"key":"305_CR36","doi-asserted-by":"crossref","unstructured":"R\u00fcping, S., mySVM-manual. University of Dortmund, 2000.","DOI":"10.1515\/juru.2000.2000.8.311"},{"key":"305_CR37","unstructured":"Chang, C. C., and Lin, C. J., LIBSVM: a library for support vector machines. Software Available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm . Accessed 2 June 2008."},{"key":"305_CR38","unstructured":"Frank, A., and Asuncion, A., UCI Machine learning repository. http:\/\/archive.ics.uci.edu\/ml\/ . Accessed 6 September 2010."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0305-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0305-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0305-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T13:47:09Z","timestamp":1653054429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0305-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,16]]},"references-count":38,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["305"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0305-4","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2015,8,16]]},"article-number":"113"}}