{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:45:28Z","timestamp":1763451928484,"version":"3.45.0"},"reference-count":29,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T00:00:00Z","timestamp":1763337600000},"content-version":"vor","delay-in-days":16,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>With the widespread adoption of digital platforms in education, large volumes of student data, ranging from personal details to behavioral logs, are continuously generated. While this data enhances learning personalization and administrative efficiency, it also raises significant concerns regarding privacy and data security. This research proposes a scalable walrus optimizer\u2010driven dynamic convolutional neural network (SWO\u2010DCNN) for analyzing and enhancing student data privacy protection. Data were collected that contain a synthetic student activity logs dataset comprising user interactions, access logs, and metadata. Two critical preprocessing steps were applied: Min\u2013Max normalization for uniform feature scaling and one\u2010hot encoding to transform categorical variables into numerical formats suitable for deep learning (DL) models. The SWO algorithm enhances the DCNN's convergence speed and accuracy by adaptively tuning hyperparameters during training. The model leverages the optimization strength of the walrus algorithm to improve DCNN performance in detecting privacy threats such as unauthorized access, abnormal usage patterns, and data tampering. This optimization allows the model to identify complex intrusion patterns with greater precision. Python was used for model implementation and experimentation. Experimental results show that the SWO\u2010DCNN model achieves an overall performance accuracy of above 98% in detecting potential privacy breaches, outperforming conventional models. In addition, the proposed system supports real\u2010time monitoring and alert mechanisms, making it practical for integration into educational data infrastructures. This research highlights the potential of combining DL with intelligent optimization techniques to strengthen student data privacy in scalable and adaptive ways.<\/jats:p>","DOI":"10.1002\/spy2.70135","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T03:41:06Z","timestamp":1763437266000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Student Data Privacy Protection Based on Convolutional Neural Networks"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1509-741X","authenticated-orcid":false,"given":"Jingxuan","family":"Cheng","sequence":"first","affiliation":[{"name":"School of Marxism Northeastern University  Shenyang Liaoning China"}]}],"member":"311","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_2_12_2_1","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-981-99-0444-0_7","volume-title":"Digital Pedagogy: The Use of Digital Technologies in Contemporary Education","author":"Be\u0107irovi\u0107 S.","year":"2023"},{"key":"e_1_2_12_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791\u2010025\u201009545\u2010x"},{"key":"e_1_2_12_4_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/979-8-3373-4252-8","volume-title":"Ensuring Secure and Ethical STM Research in the AI Era","author":"Zangana H. M.","year":"2025"},{"key":"e_1_2_12_5_1","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/978-3-030-97877-8_11","volume-title":"Integrated Business Models in the Digital Age: Principles and Practices of Technology Empowered Strategies","author":"Butt U. J.","year":"2022"},{"key":"e_1_2_12_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/educsci15060650"},{"key":"e_1_2_12_7_1","first-page":"167","volume-title":"Topics in Artificial Intelligence Applied to Industry 4.0","author":"Bisht S. S.","year":"2024"},{"key":"e_1_2_12_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/08959048231153609"},{"key":"e_1_2_12_9_1","doi-asserted-by":"publisher","DOI":"10.50908\/grb.3.0_146"},{"key":"e_1_2_12_10_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41599\u2010023\u201001633\u2010x"},{"key":"e_1_2_12_11_1","first-page":"333","volume-title":"Improving Student Assessment With Emerging AI Tools","author":"Giri A.","year":"2025"},{"key":"e_1_2_12_12_1","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v16i3.7261"},{"key":"e_1_2_12_13_1","doi-asserted-by":"crossref","unstructured":"M.HuandK.Xue \u201cResearch on English Classroom Data Security Protection Technology Based on Intelligent Algorithm \u201dhttps:\/\/doi.org\/10.2139\/ssrn.5031074.","DOI":"10.2139\/ssrn.5031074"},{"key":"e_1_2_12_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3502992"},{"key":"e_1_2_12_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3226416"},{"key":"e_1_2_12_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaaiss.v3i1.31217"},{"key":"e_1_2_12_17_1","doi-asserted-by":"publisher","DOI":"10.15354\/sief.23.re202"},{"key":"e_1_2_12_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3299331"},{"key":"e_1_2_12_19_1","first-page":"223","volume-title":"AI Applications and Strategies in Teacher Education","author":"Ismail I. A.","year":"2025"},{"key":"e_1_2_12_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870\u2010025\u201002458\u20104"},{"key":"e_1_2_12_21_1","first-page":"189","volume-title":"AI in Education, Governance, and Leadership: Adoption, Impact, and Ethics","author":"Adu I. E.","year":"2026"},{"key":"e_1_2_12_22_1","doi-asserted-by":"publisher","DOI":"10.33050\/itee.v3i1.665"},{"key":"e_1_2_12_23_1","doi-asserted-by":"publisher","DOI":"10.47363\/JAICC\/2023(2)E150"},{"key":"e_1_2_12_24_1","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-981-97-2468-0_25","volume-title":"Innovation and Technologies for the Digital Transformation of Education: European and Latin American Perspectives","author":"Amo\u2010Filva D.","year":"2024"},{"key":"e_1_2_12_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/joca.12506"},{"key":"e_1_2_12_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/07366981.2023.2242130"},{"key":"e_1_2_12_27_1","doi-asserted-by":"crossref","unstructured":"H.Yang Q.Lu Y.Wang S.Liu J.Zheng andA.Xiang \u201cUser Behavior Analysis in Privacy Protection With Large Language Models: A Study on Privacy Preferences With Limited Data \u201darXiv Preprint arXiv:2505.06305 2025 https:\/\/doi.org\/10.48550\/arXiv.2505.06305.","DOI":"10.1109\/ICAHN67688.2025.00020"},{"key":"e_1_2_12_28_1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.5121\/ijnsa.2024.16204","article-title":"Enhancing Data Privacy in Wireless Sensor Networks: Investigating Techniques and Protocols to Protect Privacy of Data Transmitted Over Wireless Sensor Networks in Critical Applications of Healthcare and National Security","volume":"16","author":"Akinsola A.","year":"2024","journal-title":"International Journal of Network Security & Its Applications"},{"key":"e_1_2_12_29_1","doi-asserted-by":"crossref","unstructured":"T.Kang H.Yang L.Dai X.Hu andJ.Du \u201cPrivacy\u2010Enhanced Federated Learning for Distributed Heterogeneous Data \u201d2025 https:\/\/doi.org\/10.20944\/preprints202507.1160.v1.","DOI":"10.20944\/preprints202507.1160.v1"},{"key":"e_1_2_12_30_1","doi-asserted-by":"crossref","unstructured":"N.Shawareb A.Ewais andF.Dalipi \u201cUtilizing Data Mining Techniques to Predict Students Performance Using Data Log From MOODLE \u201d2024 https:\/\/doi.org\/10.3837\/tiis.2024.09.006.","DOI":"10.3837\/tiis.2024.09.006"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:41:57Z","timestamp":1763451717000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70135"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70135","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"2025-07-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70135"}}