Ma, BoLai, EdmundYan, Wei QiWu, Jinsong2023-09-172023-09-172023-09-15Multimedia Tools and Applications, ISSN: 1380-7501 (Print); 1573-7721 (Online), Springer Science and Business Media LLC. doi: 10.1007/s11042-023-15623-31380-75011573-7721http://hdl.handle.net/10292/16693To effectively extract and classify the information from reports or documents and protect the privacy of the extracted results, we propose a privacy classification named Word Embedding Combination Privacy-preserving Support Vector Machine (WECPPSVM) model to classify the text. In addition, this paper also proposes the Privacy-preserving Distribution and Independent Frequent Subsequence Extraction Algorithm (PPDIFSEA), which calculates the degree of independence of the training data input to the classification model by training the Deep Belief Network(DBN) in PPDIFSEA, then obtains the Privacy Boundary(PB). PB is an indispensable condition for both data sampling and privacy noise generation. And this model can protect privacy by injecting the privacy noise into the classification result, this method can interfere with the background knowledge-based privacy attack. Our quantitative analysis shows that the WECPPSVM proposed in this paper can approach mainstream text classification algorithms in terms of text classification accuracy while preserving privacy without increasing computational complexity. In addition, the fusion study and privacy threat evaluation also verify that the proposed PPDIFSEA method combined with WECPPSVM achieves an acceptable level of classification accuracy and privacy protection.http://creativecommons.org/licenses/by/4.0/0801 Artificial Intelligence and Image Processing0803 Computer Software0805 Distributed Computing0806 Information SystemsArtificial Intelligence & Image ProcessingSoftware Engineering4009 Electronics, sensors and digital hardware4603 Computer vision and multimedia computation4605 Data management and data science4606 Distributed computing and systems softwareA Privacy-Preserving Word Embedding Text Classification Model Based on Privacy Boundary Constructed by Deep Belief NetworkJournal ArticleOpenAccess10.1007/s11042-023-15623-3