{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T12:42:56Z","timestamp":1773751376857,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20474"],"award-info":[{"award-number":["U21A20474"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162005"],"award-info":[{"award-number":["62162005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s10489-022-04119-6","type":"journal-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T06:12:40Z","timestamp":1665036760000},"page":"13037-13051","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A two-phase random forest with differential privacy"],"prefix":"10.1007","volume":"53","author":[{"given":"Jing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xianxian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Quanmin","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Songfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhaohui","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2462-1499","authenticated-orcid":false,"given":"Jinyan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"issue":"1","key":"4119_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"4119_CR2","doi-asserted-by":"crossref","unstructured":"Thongkam J, Xu G, Zhang Y (2008) Adaboost algorithm with random forests for predicting breast cancer survivability. In: Proceedings of the international joint conference on neural networks, pp 3062\u20133069","DOI":"10.1109\/IJCNN.2008.4634231"},{"issue":"5","key":"4119_CR3","first-page":"1167","volume":"14","author":"H Aydadenta","year":"2018","unstructured":"Aydadenta H (2018) A clustering approach for feature selection in microarray data classification using random forest. J Inf Process Syst 14(5):1167\u20131175","journal-title":"J Inf Process Syst"},{"key":"4119_CR4","doi-asserted-by":"crossref","unstructured":"Schulter S, Leistner C, Wohlhart P, Roth PM, Bischof H (2014) Accurate object detection with joint classification-regression random forests. In: Proceedings of the conference on computer vision and pattern recognition, pp 923\u2013930","DOI":"10.1109\/CVPR.2014.123"},{"key":"4119_CR5","doi-asserted-by":"publisher","first-page":"102782","DOI":"10.1016\/j.cviu.2019.07.002","volume":"188","author":"AE Maas","year":"2019","unstructured":"Maas AE, Rottensteiner F, Heipke C (2019) A label noise tolerant random forest for the classification of remote sensing data based on outdated maps for training. Comput Vis Image Underst 188:102782","journal-title":"Comput Vis Image Underst"},{"issue":"3","key":"4119_CR6","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1016\/j.patcog.2012.09.005","volume":"46","author":"Y Ye","year":"2012","unstructured":"Ye Y, Wu Q, Huang JZ, Ng MK, Li X (2012) Stratified sampling for feature subspace selection in random forests for high dimensional data. Pattern Recognit 46(3):769\u2013787","journal-title":"Pattern Recognit"},{"issue":"6","key":"4119_CR7","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1111\/tgis.12268","volume":"21","author":"D Chutia","year":"2017","unstructured":"Chutia D, Bhattacharyya DK, Sarma J, Raju PNL (2017) An effective ensemble classification framework using random forests and a correlation based feature selection technique. Trans GIS 21(6):1165\u20131178","journal-title":"Trans GIS"},{"key":"4119_CR8","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.neucom.2017.02.053","volume":"241","author":"M Mursalin","year":"2017","unstructured":"Mursalin M, Zhang Y, Chen Y, Chawla NV (2017) Automated epileptic seizure detection using improved correlation-based feature selection with random forest classifier. Neurocomputing 241:204\u2013214","journal-title":"Neurocomputing"},{"key":"4119_CR9","doi-asserted-by":"crossref","unstructured":"Roy S, Mondal S, Ekbal A, Desarkar MS (2016) CRDT: Correla- tion ratio based decision tree model for healthcare data mining. In: Proceedings of 16th IEEE international conference on bioinformatics and bioengineering, IEEE Computer Society, pp 36\u201343","DOI":"10.1109\/BIBE.2016.21"},{"issue":"1","key":"4119_CR10","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TGRS.2016.2607755","volume":"55","author":"JS Xia","year":"2017","unstructured":"Xia JS, Yokoya N, Iwasaki A (2017) Hyperspectral image classification with canonical correlation forests. IEEE Trans Geosci Remote Sens 55(1):421\u2013431","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"8","key":"4119_CR11","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1093\/bioinformatics\/btx784","volume":"34","author":"J Mayer","year":"2018","unstructured":"Mayer J, Rahman R, Ghosh S, Pal R (2018) Sequential feature selection and inference using multi-variate random forests. Bioinform 34(8):1336\u20131344","journal-title":"Bioinform"},{"key":"4119_CR12","first-page":"104:1","volume":"21","author":"TM Tomita","year":"2020","unstructured":"Tomita TM, Browne J, Shen C, Chung J, Patsolic J, Falk B, Priebe CE, Yim J, Burns RC, Maggioni M, Vogelstein JT (2020) Sparse projection oblique randomer forests. J Mach Learn Res 21:104:1\u2013104:39","journal-title":"J Mach Learn Res"},{"key":"4119_CR13","doi-asserted-by":"crossref","unstructured":"Kanakarajan NK, Muniasamy K (2015) Improving the accuracy of intrusion detection using gar-forest with feature selection. In: Proceedings of the 4th international conference on frontiers in intelligent computing: theory and applications, pp 539\u2013547","DOI":"10.1007\/978-81-322-2695-6_45"},{"key":"4119_CR14","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.asoc.2017.07.027","volume":"70","author":"YQ Li","year":"2018","unstructured":"Li YQ, Yan C, Liu W, Li MZ (2018) A principle component analysis-based random forest with the potential nearest neighbor method for automobile insurance fraud identification. Appl Soft Comput 70:1000\u20131009","journal-title":"Appl Soft Comput"},{"key":"4119_CR15","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2018.12.036","volume":"480","author":"P Deng","year":"2019","unstructured":"Deng P, Wang HJ, Li TR, Horng SJ, Zhu XW (2019) Linear discriminant analysis guided by unsupervised ensemble learning. Inf Sci 480:211\u2013221","journal-title":"Inf Sci"},{"issue":"3","key":"4119_CR16","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1109\/TFUZZ.2017.2729501","volume":"26","author":"P Rathore","year":"2018","unstructured":"Rathore P, Bezdek JC, Erfani SM, Rajasegarar S, Palaniswami M (2018) Ensemble fuzzy clustering using cumulative aggregation on random projections. IEEE Trans Fuzzy Syst 26(3):1510\u20131524","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"4119_CR17","unstructured":"Rainforth T, Wood FD (2015) Canonical correlation forests. CoRR arXiv:1507.05444"},{"key":"4119_CR18","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: Proceedings of the 5th international conference on theory and applications of models of computation, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"4119_CR19","doi-asserted-by":"publisher","first-page":"107149","DOI":"10.1016\/j.compbiolchem.2019.107149","volume":"83","author":"XH Lin","year":"2019","unstructured":"Lin XH, Li C, Ren WJ, Luo X, Qi YP (2019) A new feature selection method based on symmetrical uncertainty and interaction gain. Comput Biol Chem 83:107149","journal-title":"Comput Biol Chem"},{"issue":"1","key":"4119_CR20","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.patcog.2014.07.023","volume":"48","author":"M Galar","year":"2015","unstructured":"Galar M, Fern\u00e1ndez A, Barrenechea E, Herrera F (2015) DRCW-OVO: distance-based relative competence weighting combination for one-vs-one strategy in multi-class problems. Pattern Recognit 48(1):28\u201342","journal-title":"Pattern Recognit"},{"key":"4119_CR21","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1016\/j.neucom.2014.08.006","volume":"149","author":"S Kang","year":"2015","unstructured":"Kang S, Cho S, Kang P (2015) Constructing a multi-class classifier using one-against-one approach with different binary classifiers. Neurocomputing 149:677\u2013682","journal-title":"Neurocomputing"},{"key":"4119_CR22","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.inffus.2016.11.009","volume":"36","author":"L Zhou","year":"2017","unstructured":"Zhou L, Wang Q, Fujita H (2017) One versus one multi-class classification fusion using optimizing decision directed acyclic graph for predicting listing status of companies. Inf Fusion 36:80\u201389","journal-title":"Inf Fusion"},{"issue":"1","key":"4119_CR23","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81\u2013106","journal-title":"Mach Learn"},{"key":"4119_CR24","volume-title":"C4.5: programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann, Burlington"},{"key":"4119_CR25","volume-title":"Classification and regression trees","author":"L Breiman","year":"1984","unstructured":"Breiman L, Friedman JH, Olshen RA, Stone CJ (1984) Classification and regression trees. Chapman & Hall (Wadsworth, Inc.), New York"},{"issue":"2","key":"4119_CR26","first-page":"205","volume":"1","author":"N Salehi-Moghaddami","year":"2011","unstructured":"Salehi-Moghaddami N, Yazdi HS, Poostchi H (2011) Correlation based splitting criterionin multi branch decision tree. Central Eur J Comput Sci 1(2):205\u2013220","journal-title":"Central Eur J Comput Sci"},{"key":"4119_CR27","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.ins.2017.12.059","volume":"435","author":"YS Mu","year":"2018","unstructured":"Mu YS, Liu XD, Wang LD (2018) A pearson\u2019s correlation coefficient based decision tree and its parallel implementation. Inf Sci 435:40\u201358","journal-title":"Inf Sci"},{"key":"4119_CR28","doi-asserted-by":"crossref","unstructured":"Huang HS, Zhang RT, Lu XY (2019) A recommendation model for medical data visualization based on information entropy and decision tree optimized by two correlation coefficients. In: Proceedings of the 9th international conference on information communication and management, pp 52\u201356","DOI":"10.1145\/3357419.3357436"},{"issue":"4","key":"4119_CR29","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"NR Adam","year":"1989","unstructured":"Adam NR, Wortmann JC (1989) Security-control methods for statistical databases: a comparative study. ACM Comput Surv 21(4):515\u2013556","journal-title":"ACM Comput Surv"},{"key":"4119_CR30","doi-asserted-by":"crossref","unstructured":"Fukuoka T, Yamaoka Y, Terada T (2020) Model extraction oriented data publishing with k-anonymity. In: Advances in information and computer security\u201415th international workshop on security, pp 218\u2013236","DOI":"10.1007\/978-3-030-58208-1_13"},{"key":"4119_CR31","doi-asserted-by":"crossref","unstructured":"Beaver D, Wool A (1998) Quorum-based secure multi-party computation. In: International conference on the theory and application of cryptographic techniques, pp 375\u2013390","DOI":"10.1007\/BFb0054140"},{"key":"4119_CR32","doi-asserted-by":"crossref","unstructured":"Jagannathan G, Pillaipakkamnatt K, Wright RN (2009) A practical differentially private random decision tree classifier. In: IEEE International conference on data mining workshops, IEEE Computer Society, pp 114\u2013121","DOI":"10.1109\/ICDMW.2009.93"},{"key":"4119_CR33","doi-asserted-by":"crossref","unstructured":"Patil A, Singh S (2014) Differential private random forest. In: International conference on advances in computing, communications and informatics, pp 2623\u20132630","DOI":"10.1109\/ICACCI.2014.6968348"},{"key":"4119_CR34","doi-asserted-by":"crossref","unstructured":"Friedman A, Schuster A (2010) Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 493\u2013502","DOI":"10.1145\/1835804.1835868"},{"issue":"9","key":"4119_CR35","first-page":"175","volume":"37","author":"HR Mu","year":"2016","unstructured":"Mu HR, Ding LP, Song YN, Lu GQ (2016) Diffprfs: random forest under differential privacy. J Commun 37(9):175\u2013182","journal-title":"J Commun"},{"key":"4119_CR36","doi-asserted-by":"crossref","unstructured":"Xin BZ, Yang W, Wang SW, Huang LS (2019) Differentially private greedy decision forest. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing, pp 2672\u20132676","DOI":"10.1109\/ICASSP.2019.8682219"},{"key":"4119_CR37","doi-asserted-by":"crossref","unstructured":"Wang C, Chen S, Li X (2021) Adaptive differential privacy budget allocation algorithm based on random forest. In: Proceedings of the 16th international conference on bio-inspired computing: theories and applications, pp 201\u2013216","DOI":"10.1007\/978-981-19-1256-6_15"},{"key":"4119_CR38","doi-asserted-by":"crossref","unstructured":"Wu D, Wu T, Wu X (2020) A differentially private random decision tree classifier with high utility. In: Proceedings of the 3rd international conference on machine learning for cyber security, pp 376\u2013385","DOI":"10.1007\/978-3-030-62223-7_32"},{"key":"4119_CR39","doi-asserted-by":"crossref","unstructured":"Zhang Y, Feng P, Ning Y (2021) Random forest algorithm based on differential privacy protection. In: Proceedings of the 20th IEEE international conference on trust, security and privacy in computing and communications, pp 1259\u20131264","DOI":"10.1109\/TrustCom53373.2021.00172"},{"key":"4119_CR40","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.neucom.2020.12.051","volume":"430","author":"XX Li","year":"2021","unstructured":"Li XX, Liu J, Liu SF, Wang JY (2021) Differentially private ensemble learning for classification. Neurocomputing 430:34\u201346","journal-title":"Neurocomputing"},{"key":"4119_CR41","doi-asserted-by":"crossref","unstructured":"Xie LY, Plis SM, Sarwate AD (2016) Data-weighted ensemble learning for privacy-preserving distributed learning. In: 2016 IEEE international conference on acoustics, speech and signal processing, pp 2309\u20132313","DOI":"10.1109\/ICASSP.2016.7472089"},{"issue":"1","key":"4119_CR42","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3233\/WEB-180374","volume":"16","author":"T Xiang","year":"2018","unstructured":"Xiang T, Li Y, Li XG, Zhong SG, Yu S (2018) Collaborative ensemble learning under differential privacy. Web Intell 16(1):73\u201387","journal-title":"Web Intell"},{"key":"4119_CR43","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Proceedings of the third theory of cryptography conference, pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"issue":"9","key":"4119_CR44","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1810891.1810916","volume":"53","author":"F McSherry","year":"2010","unstructured":"McSherry F (2010) Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun ACM 53(9):89\u201397","journal-title":"Commun ACM"},{"key":"4119_CR45","doi-asserted-by":"crossref","unstructured":"McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Proceedings of the 48th annual IEEE symposium on foundations of computer science, pp 94\u2013103","DOI":"10.1109\/FOCS.2007.66"},{"issue":"1","key":"4119_CR46","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/507338.507355","volume":"31","author":"J Geller","year":"2002","unstructured":"Geller J (2002) Data mining: practical machine learning tools and techniques\u2014book review. SIGMOD Rec 31(1):76\u201377","journal-title":"SIGMOD Rec"},{"key":"4119_CR47","unstructured":"Jakulin A (2003) Attribute interactions in machine learning, Lecture Notes in Computer Science"},{"key":"4119_CR48","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of information theory","author":"TM Cover","year":"2001","unstructured":"Cover TM, Thomas JA (2001) Elements of information theory. Wiley, Hoboken"},{"key":"4119_CR49","unstructured":"Fayyad UM, Irani KB (1993) Multi-interval discretization of continuous-valued attributes for classification learning. In: Proceedings of the 13th international joint conference on artificial intelligence, pp 1022\u20131029"},{"key":"4119_CR50","doi-asserted-by":"crossref","unstructured":"Fletcher S, Islam MZ (2015) A differentially private random decision forest using reliable signal-to-noise ratios. In: Proceedings of the 28th Australasian joint conference on artificial intelligence, pp 192\u2013203","DOI":"10.1007\/978-3-319-26350-2_17"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-04119-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-04119-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-04119-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T14:18:31Z","timestamp":1701181111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-04119-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":50,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["4119"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-04119-6","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,6]]},"assertion":[{"value":"25 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}