{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:01:20Z","timestamp":1756634480816,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608492"},{"type":"electronic","value":"9789819608508"}],"license":[{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0850-8_15","type":"book-chapter","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T04:39:25Z","timestamp":1734928765000},"page":"224-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Differential Privacy Decision Forest Algorithm for\u00a0Reducing the\u00a0Effect of\u00a0Noise"],"prefix":"10.1007","author":[{"given":"Runfei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Mingze","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xuefeng","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yuncheng","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Dasha","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,24]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JDM.309413","volume":"33","author":"Y Dong","year":"2022","unstructured":"Dong, Y., Zhang, S., Xu, J., Wang, H., Liu, J.: Random forest algorithm based on linear privacy budget allocation. J. Database Manage. 33(2), 1\u201319 (2022)","journal-title":"J. Database Manage."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"C.\u00a0Dwork, \u201cDifferential privacy,\u201d in Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II, ser. ICALP\u201906. Berlin, Heidelberg: Springer-Verlag, 2006, p. 1\u201312","DOI":"10.1007\/11787006_1"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"C.\u00a0Dwork, F.\u00a0McSherry, K.\u00a0Nissim, and A.\u00a0Smith, \u201cCalibrating noise to sensitivity in private data analysis,\u201d in Proceedings of the Third Conference on Theory of Cryptography, ser. TCC\u201906. Berlin, Heidelberg: Springer-Verlag, 2006, p. 265\u2013284","DOI":"10.1007\/11681878_14"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"C.\u00a0Dwork and A.\u00a0Roth, The Algorithmic Foundations of Differential Privacy, 2014","DOI":"10.1561\/9781601988195"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-26350-2_17","volume-title":"AI 2015: Advances in Artificial Intelligence","author":"S Fletcher","year":"2015","unstructured":"Fletcher, S., Islam, M.Z.: A differentially private random decision forest using reliable signal-to-noise ratios. In: Pfahringer, B., Renz, J. (eds.) AI 2015: Advances in Artificial Intelligence, pp. 192\u2013203. Springer International Publishing, Cham (2015)"},{"key":"15_CR6","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2011)","edition":"3"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.eswa.2017.01.034","volume":"78","author":"S Fletcher","year":"2017","unstructured":"Fletcher, S., Islam, M.Z.: Differentially private random decision forests using smooth sensitivity. Expert Syst. Appl. 78, 16\u201331 (2017)","journal-title":"Expert Syst. Appl."},{"key":"15_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101930","volume":"96","author":"Z Guan","year":"2020","unstructured":"Guan, Z., Sun, X., Shi, L., Wu, L., Du, X.: A differentially private greedy decision forest classification algorithm with high utility. Computers & Security 96, 101930 (2020)","journal-title":"Computers & Security"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"S.\u00a0Fletcher and M.\u00a0Z. Islam, \u201cDecision tree classification with differential privacy: A survey,\u201d ACM Comput. Surv., vol.\u00a052, no.\u00a04, aug 2019","DOI":"10.1145\/3337064"},{"issue":"1","key":"15_CR10","first-page":"273","volume":"5","author":"G Jagannathan","year":"2012","unstructured":"Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A practical differentially private random decision tree classifier. Trans. Data Privacy 5(1), 273\u2013295 (2012)","journal-title":"Trans. Data Privacy"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"X.\u00a0Li, B.\u00a0Qin, Y.\u00a0Luo, and D.\u00a0Zheng, \u201cA differential privacy budget allocation algorithm based on out-of-bag estimation in random forest,\u201d Mathematics, vol.\u00a010, no.\u00a022, 2022","DOI":"10.3390\/math10224338"},{"key":"15_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103468","volume":"74","author":"Y Li","year":"2023","unstructured":"Li, Y., Feng, Y., Qian, Q.: Fdpboost: Federated differential privacy gradient boosting decision trees. Journal of Information Security and Applications 74, 103468 (2023)","journal-title":"Journal of Information Security and Applications"},{"issue":"10","key":"15_CR13","doi-asserted-by":"publisher","first-page":"13037","DOI":"10.1007\/s10489-022-04119-6","volume":"53","author":"J Liu","year":"2022","unstructured":"Liu, J., Li, X., Wei, Q., Liu, S., Liu, Z., Wang, J.: A two-phase random forest with differential privacy. Appl. Intell. 53(10), 13037\u201313051 (2022)","journal-title":"Appl. Intell."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.asoc.2017.09.010","volume":"62","author":"X Liu","year":"2018","unstructured":"Liu, X., Li, Q., Li, T., Chen, D.: Differentially private classification with decision tree ensemble. Appl. Soft Comput. 62, 807\u2013816 (2018)","journal-title":"Appl. Soft Comput."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Liu, Z.\u00a0Fan, X.\u00a0Song, and R.\u00a0Shibasaki, \u201cFedvoting: A cross-silo boosting tree construction method for privacy-preserving long-term human mobility prediction,\u201d Sensors, vol.\u00a021, no.\u00a024, 2021","DOI":"10.3390\/s21248282"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"F.\u00a0McSherry, \u201cPrivacy integrated queries: an extensible platform for privacy-preserving data analysis,\u201d Commun. ACM, vol.\u00a053, no.\u00a09, p. 89\u201397, sep 2010","DOI":"10.1145\/1810891.1810916"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"F.\u00a0McSherry and K.\u00a0Talwar, \u201cMechanism design via differential privacy,\u201d in 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907), 2007, pp. 94\u2013103","DOI":"10.1109\/FOCS.2007.66"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"N.\u00a0Mohammed, R.\u00a0Chen, B.\u00a0C. Fung, and P.\u00a0S. Yu, \u201cDifferentially private data release for data mining,\u201d in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ser. KDD \u201911. New York, NY, USA: Association for Computing Machinery, 2011, p. 493\u2013501","DOI":"10.1145\/2020408.2020487"},{"key":"15_CR19","unstructured":"X.\u00a0Niu and W.\u00a0Ma, \u201cAn ensemble learning model based on differentially private decision tree,\u201d Complex & Intelligent Systems, pp. 1\u201314, 2023"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"C.\u00a0Wang, S.\u00a0Chen, and X.\u00a0cheng Li, \u201cAdaptive differential privacy budget allocation algorithm based on random forest,\u201d in International Conference on Bio-Inspired Computing: Theories and Applications, 2021","DOI":"10.1007\/978-981-19-1256-6_15"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.neucom.2021.01.145","volume":"485","author":"X Wu","year":"2022","unstructured":"Wu, X., Qi, L., Gao, J., Ji, G., Xu, X.: An ensemble of random decision trees with local differential privacy in edge computing. Neurocomputing 485, 181\u2013195 (2022)","journal-title":"Neurocomputing"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"B.\u00a0Xin, W.\u00a0Yang, S.\u00a0Wang, and L.\u00a0Huang, \u201cDifferentially private greedy decision forest,\u201d in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019, pp. 2672\u20132676","DOI":"10.1109\/ICASSP.2019.8682219"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0850-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T05:05:48Z","timestamp":1734930348000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0850-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,24]]},"ISBN":["9789819608492","9789819608508"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0850-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,24]]},"assertion":[{"value":"24 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}