{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T07:26:34Z","timestamp":1774509994564,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s00521-026-11918-2","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T05:14:12Z","timestamp":1774502052000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy protection and network security reinforcement strategies for digital information platforms driven by artificial intelligence"],"prefix":"10.1007","volume":"38","author":[{"given":"Lei","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Yanggao","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,26]]},"reference":[{"issue":"1","key":"11918_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12910-021-00687-3","volume":"22","author":"B Murdoch","year":"2021","unstructured":"Murdoch B (2021) Privacy and artificial intelligence: challenges for protecting health information in a new era. BMC Med Ethics 22(1):1\u20135","journal-title":"BMC Med Ethics"},{"issue":"01","key":"11918_CR2","first-page":"294","volume":"1","author":"AKY Yanamala","year":"2023","unstructured":"Yanamala AKY, Suryadevara S (2023) Advances in data protection and artificial intelligence: trends and challenges. Int J Adv Eng Technol Innov 1(01):294\u2013319","journal-title":"Int J Adv Eng Technol Innov"},{"issue":"4S","key":"11918_CR3","first-page":"270","volume":"11","author":"A Kumar","year":"2023","unstructured":"Kumar A, Gadgil AA, Srivastava N, Swain PO, Sahu SK (2023) An analysis of the laws concerning digital privacy. Russ Law J 11(4S):270\u2013277","journal-title":"Russ Law J"},{"issue":"8","key":"11918_CR4","doi-asserted-by":"publisher","first-page":"963","DOI":"10.22214\/ijraset.2021.37519","volume":"9","author":"T Untawale","year":"2021","unstructured":"Untawale T (2021) Importance of cyber security in digital era. Int J Res Appl Sci Eng Technol 9(8):963\u2013966","journal-title":"Int J Res Appl Sci Eng Technol"},{"issue":"9","key":"11918_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.31449\/inf.v48i9.5705","volume":"48","author":"J Chen","year":"2024","unstructured":"Chen J (2024) Construction and application of an economic intelligent decision-making platform based on artificial intelligence technology. Informatica 48(9):1\u201318","journal-title":"Informatica"},{"issue":"1","key":"11918_CR6","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.658","volume":"7","author":"AS Edu","year":"2021","unstructured":"Edu AS, Agoyi M, Agozie D (2021) Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. PeerJ Comput Sci 7(1):e658","journal-title":"PeerJ Comput Sci"},{"issue":"1","key":"11918_CR7","first-page":"1","volume":"15","author":"AKY Yanamala","year":"2024","unstructured":"Yanamala AKY, Suryadevara S, Kalli VDR (2024) Balancing innovation and privacy: the intersection of data protection and artificial intelligence. Int J Mach Learn Res Cybersecur Artif Intell 15(1):1\u201343","journal-title":"Int J Mach Learn Res Cybersecur Artif Intell"},{"issue":"6","key":"11918_CR8","doi-asserted-by":"publisher","first-page":"3157","DOI":"10.1287\/mnsc.2022.4513","volume":"69","author":"IP Fainmesser","year":"2023","unstructured":"Fainmesser IP, Galeotti A, Momot R (2023) Digital privacy. Manag Sci 69(6):3157\u20133173","journal-title":"Manag Sci"},{"issue":"3","key":"11918_CR9","doi-asserted-by":"publisher","first-page":"2687","DOI":"10.30574\/wjarr.2024.23.3.2869","volume":"23","author":"EO Abolaji","year":"2024","unstructured":"Abolaji EO, Akinwande OT (2024) AI powered privacy protection: a survey of current state and future directions. World J Adv Res Rev 23(3):2687\u20132696","journal-title":"World J Adv Res Rev"},{"issue":"1","key":"11918_CR10","first-page":"141","volume":"25","author":"LS Jones","year":"2023","unstructured":"Jones LS, Samples TR (2023) On the systemic importance of digital platforms. U Pa J Bus L 25(1):141","journal-title":"U Pa J Bus L"},{"issue":"1","key":"11918_CR11","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1080\/14479338.2021.1965888","volume":"24","author":"A Gawer","year":"2022","unstructured":"Gawer A (2022) Digital platforms and ecosystems: remarks on the dominant organizational forms of the digital age. Innovation 24(1):110\u2013124","journal-title":"Innovation"},{"issue":"12","key":"11918_CR12","volume":"5","author":"P Nama","year":"2023","unstructured":"Nama P, Pattanayak S, Meka HS (2023) AI-driven innovations in cloud computing: transforming scalability, resource management, and predictive analytics in distributed systems. Int Res J Mod Eng Technol Sci 5(12):4165","journal-title":"Int Res J Mod Eng Technol Sci"},{"issue":"6","key":"11918_CR13","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/s11747-022-00845-y","volume":"50","author":"S Quach","year":"2022","unstructured":"Quach S, Thaichon P, Martin KD et al (2022) Digital technologies: tensions in privacy and data. J Acad Mark Sci 50(6):1299\u20131323","journal-title":"J Acad Mark Sci"},{"issue":"1","key":"11918_CR14","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2037254","volume":"36","author":"B Guembe","year":"2022","unstructured":"Guembe B, Azeta A, Misra S, Osamor VC, Sanz LF, Pospelova V (2022) The emerging threat of AI-driven cyber attacks: a review. Appl Artif Intell 36(1):2037254","journal-title":"Appl Artif Intell"},{"issue":"1","key":"11918_CR15","doi-asserted-by":"publisher","first-page":"184","DOI":"10.5465\/amr.2020.0222","volume":"47","author":"DR Clough","year":"2022","unstructured":"Clough DR, Wu A (2022) Artificial intelligence, data-driven learning, and the decentralized structure of platform ecosystems. Acad Manag Rev 47(1):184\u2013189","journal-title":"Acad Manag Rev"},{"issue":"1","key":"11918_CR16","doi-asserted-by":"publisher","first-page":"332","DOI":"10.62441\/nano-ntp.v20iS10.1804","volume":"20","author":"NU Prince","year":"2024","unstructured":"Prince NU, Faheem MA, Khan OU, Hossain K, Alkhayyat A, Hamdache A et al (2024) AI-powered data-driven cybersecurity techniques: Boosting threat identification and reaction. Nanotechnol Percept 20(1):332\u2013353","journal-title":"Nanotechnol Percept"},{"issue":"2","key":"11918_CR17","first-page":"245","volume":"15","author":"M Binhammad","year":"2024","unstructured":"Binhammad M, Alqaydi S, Othman A, Abuljadayel LH (2024) The role of AI in cyber security: safeguarding digital identity. J Inf Secur 15(2):245\u2013278","journal-title":"J Inf Secur"},{"issue":"2","key":"11918_CR18","first-page":"190","volume":"2","author":"M Sinha","year":"2024","unstructured":"Sinha M (2024) Exploring the role of cybersecurity in integrated programs for protecting and improving digital platforms. Int IT J Res 2(2):190\u2013197","journal-title":"Int IT J Res"},{"issue":"12","key":"11918_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13122311","volume":"13","author":"Y Tan","year":"2024","unstructured":"Tan Y, Zhang Q, Li Y, Yu X (2024) AI-driven network security and privacy. Electronics 13(12):2311","journal-title":"Electronics"},{"issue":"1","key":"11918_CR20","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1201\/9781032630564-2","volume":"1","author":"RP Fran\u00e7a","year":"2024","unstructured":"Fran\u00e7a RP, Bonacin R, Monteiro ACB (2024) An overview of data privacy and security in cloud platforms: exploring the intersection of digital technologies currently. Digit Cult Herit 1(1):21\u201339","journal-title":"Digit Cult Herit"},{"issue":"01","key":"11918_CR21","first-page":"1","volume":"1","author":"AB Pratomo","year":"2023","unstructured":"Pratomo AB, Mokodenseho S, Aziz AM (2023) Data encryption and anonymization techniques for enhanced information system security and privacy. West Sci Inf Syst Technol 1(01):1\u20139","journal-title":"West Sci Inf Syst Technol"},{"issue":"3","key":"11918_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.37256\/rrcs.2320232635","volume":"2","author":"S Chaudhari","year":"2023","unstructured":"Chaudhari S, Thakur A, Rajan A (2023) Securing digital information using cryptography techniques to enhance IT security. Res Rep Comput Sci 2(3):13\u201322","journal-title":"Res Rep Comput Sci"},{"issue":"10","key":"11918_CR23","doi-asserted-by":"publisher","DOI":"10.3390\/fi16100374","volume":"16","author":"HU Manzoor","year":"2024","unstructured":"Manzoor HU, Shabbir A, Chen A, Flynn D, Zoha A (2024) A survey of security strategies in federated learning: defending models, data, and privacy. Future Internet 16(10):374","journal-title":"Future Internet"},{"issue":"12","key":"11918_CR24","doi-asserted-by":"publisher","first-page":"400","DOI":"10.3390\/fi15120400","volume":"15","author":"L Wu","year":"2023","unstructured":"Wu L, Ruan W, Hu J, He Y (2023) A survey on blockchain-based federated learning. Future Internet 15(12):400","journal-title":"Future Internet"},{"issue":"3","key":"11918_CR25","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1080\/23335777.2021.2023651","volume":"9","author":"D Kshirsagar","year":"2023","unstructured":"Kshirsagar D, Kumar S (2023) Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques. Cyber-Phys Syst 9(3):244\u2013259","journal-title":"Cyber-Phys Syst"},{"issue":"1","key":"11918_CR26","first-page":"132","volume":"1","author":"H Rehan","year":"2024","unstructured":"Rehan H (2024) AI-driven cloud security: the future of safeguarding sensitive data in the digital age. J Artif Intell Gen Sci 1(1):132\u2013151","journal-title":"J Artif Intell Gen Sci"},{"issue":"1","key":"11918_CR27","first-page":"22","volume":"3","author":"A Tanikonda","year":"2022","unstructured":"Tanikonda A, Pandey BK, Peddinti SR, Katragadda SR (2022) Advanced AI-driven cybersecurity solutions for proactive threat detection and response in complex ecosystems. J Sci Technol 3(1):22","journal-title":"J Sci Technol"},{"issue":"1","key":"11918_CR28","volume":"5","author":"K Hasan","year":"2025","unstructured":"Hasan K, Hossain F, Amin A, Sutradhar Y, Jeny IJ, Mahmud S (2025) Enhancing proactive cyber defense: a theoretical framework for AI-driven predictive cyber threat intelligence. J Technol Inf Commun 5(1):33122","journal-title":"J Technol Inf Commun"},{"issue":"1","key":"11918_CR29","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2024.1497535","volume":"7","author":"K Achuthan","year":"2024","unstructured":"Achuthan K, Ramanathan S, Srinivas S, Raman R (2024) Advancing cybersecurity and privacy with artificial intelligence: current trends and future research directions. Front Big Data 7(1):1497535","journal-title":"Front Big Data"},{"issue":"1","key":"11918_CR30","first-page":"1","volume":"6","author":"O Kravchenko","year":"2024","unstructured":"Kravchenko O, Veklych V, Krykhivskyi M, Madryha T (2024) Cybersecurity in the face of information warfare and cyberattacks. Multidiscip Sci J 6(1):1\u201311","journal-title":"Multidiscip Sci J"},{"issue":"1","key":"11918_CR31","first-page":"392","volume":"5","author":"Y Weng","year":"2024","unstructured":"Weng Y, Wu J (2024) Leveraging artificial intelligence to enhance data security and combat cyber attacks. J Artif Intell Gen Sci 5(1):392\u2013399","journal-title":"J Artif Intell Gen Sci"},{"issue":"2","key":"11918_CR32","first-page":"31","volume":"4","author":"S Turgay","year":"2023","unstructured":"Turgay S, \u0130lter \u0130 (2023) Perturbation methods for protecting data privacy: a review of techniques and applications. Autom Mach Learn 4(2):31\u201341","journal-title":"Autom Mach Learn"},{"issue":"1","key":"11918_CR33","first-page":"70","volume":"3","author":"N Mazher","year":"2024","unstructured":"Mazher N, Basharat A, Nishat A (2024) AI-driven threat detection: revolutionizing cyber defense mechanisms. East Eur J Eng Technol 3(1):70\u201382","journal-title":"East Eur J Eng Technol"},{"issue":"7","key":"11918_CR34","first-page":"41","volume":"7","author":"Y Gao","year":"2024","unstructured":"Gao Y (2024) Cyber attacks and defense: AI-driven approaches and techniques. Acad J Comput Inf Sci 7(7):41\u201346","journal-title":"Acad J Comput Inf Sci"},{"key":"11918_CR35","doi-asserted-by":"publisher","DOI":"10.1080\/23335777.2025.2476983","author":"S Gour","year":"2025","unstructured":"Gour S, Kasera RK, Acharjee T, Niranjan Singh W (2025) Privacy and security of smart irrigation data using IOTA distributed ledger. Cyberphys Syst. https:\/\/doi.org\/10.1080\/23335777.2025.2476983","journal-title":"Cyberphys Syst"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11918-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-026-11918-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11918-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T05:14:15Z","timestamp":1774502055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-026-11918-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,26]]},"references-count":35,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["11918"],"URL":"https:\/\/doi.org\/10.1007\/s00521-026-11918-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,26]]},"assertion":[{"value":"20 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"234"}}