{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T13:19:26Z","timestamp":1775567966899,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T00:00:00Z","timestamp":1408579200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10586-014-0393-9","type":"journal-article","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T09:44:03Z","timestamp":1408527843000},"page":"1383-1399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Privacy preserving sub-feature selection based on fuzzy probabilities"],"prefix":"10.1007","volume":"17","author":[{"given":"Hemanta Kumar","family":"Bhuyan","sequence":"first","affiliation":[]},{"given":"Narendra Kumar","family":"Kamila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,21]]},"reference":[{"key":"393_CR1","doi-asserted-by":"crossref","unstructured":"Rogati, M., Yang, Y.: High -performing feature selection for text classification. In: CIKM\u201902, ACM, McLean, 4\u20139 Nov (2002)","DOI":"10.1145\/584902.584911"},{"key":"393_CR2","unstructured":"Azizi, A., Pourreza, H. R.: Efficient IRIS recognition through improvement of feature extraction and subset selection. Int. J. Comput. Sci. Infor. Sec. (IJCIS). 2, (1), (2009)"},{"issue":"2","key":"393_CR3","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.ins.2006.03.022","volume":"177","author":"O Uncu","year":"2007","unstructured":"Uncu, O., Turksen, I.B.: A novel feature selection approach: combining feature wrappers and filters. Infor. Sci. 177(2), 449\u2013466 (2007)","journal-title":"Infor. Sci."},{"issue":"2","key":"393_CR4","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s10700-006-7336-8","volume":"5","author":"H Xia","year":"2006","unstructured":"Xia, H., Hu, B.Q.: Feature selection using fuzzy support vector machines. Fuzzy Optim. Decis. Mak. 5(2), 187\u2013192 (2006)","journal-title":"Fuzzy Optim. Decis. Mak."},{"issue":"1","key":"393_CR5","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TFUZZ.2006.889761","volume":"15","author":"R Jensen","year":"2007","unstructured":"Jensen, R., Shen, Q.: Fuzzy-rough sets assisted attribute selection. IEEE Trans. Fuzzy Syst. 15(1), 73\u201389 (2007)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"393_CR6","doi-asserted-by":"crossref","unstructured":"Rezaee, M. R., Goedhart, B., Lelieveldt, B. P. F., Reiber $$,$$ , J. H. C.: Fuzzy feature selection. Pattern Recognit. 32, 2011\u20132019 (1999)","DOI":"10.1016\/S0031-3203(99)00005-9"},{"issue":"4","key":"393_CR7","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/72.298224","volume":"5","author":"R Battiti","year":"1994","unstructured":"Battiti, R.: Using mutual information for selecting features in supervised neural net learning. IEEE Trans. Neural Netw. 5(4), 537\u2013550 (1994)","journal-title":"IEEE Trans. Neural Netw."},{"key":"393_CR8","unstructured":"Bhuyan, H. K., Kamila, N. K., Mishra, M., Jena, S. S., Bhuyan, G.: Sub-feature selection with privacy in decentralized network based on fuzzy environment. In: Proceedings of CNC 2013, Chennai, India, pp. 19\u201326. LNICST, Chennai, 22\u201323 Feb (2013)"},{"issue":"6","key":"393_CR9","doi-asserted-by":"crossref","first-page":"2426","DOI":"10.1109\/TSMCB.2004.836888","volume":"34","author":"R Wolf","year":"2004","unstructured":"Wolf, R., Schuster, A.: Association rule mining in peer-to-peer systems. IEEE Trans. Syst. Man Cybern. Part B 34(6), 2426\u20132438 (2004)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"key":"393_CR10","doi-asserted-by":"crossref","unstructured":"Bhaduri, K., Wolff, R., Gianella C., Kargupta, H.: Distributed Decision tree induction in peer-to-peer systems. Stat. Anal. Data Min. J. 1(2), 85\u2013103, (2008)","DOI":"10.1002\/sam.10006"},{"issue":"4","key":"393_CR11","first-page":"475","volume":"20","author":"K Das","year":"2008","unstructured":"Das, K., Bhaduri, K., Liu, K., Kargupta, H.: Distributed identification of Top-l inner products elements and it\u2019s application in a peer-to-peer network. TKDE 20(4), 475\u2013488 (2008)","journal-title":"TKDE"},{"issue":"2","key":"393_CR12","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/s10115-003-0107-8","volume":"6","author":"R Chen","year":"2004","unstructured":"Chen, R., Sivkumar, K., Kargupta, H.: Collective mining of Baysian networks from distributed heterogeneous data. Knowl. Inf. Syst. 6(2), 164\u2013187 (2004)","journal-title":"Knowl. Inf. Syst."},{"issue":"3\u2014-4","key":"393_CR13","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.diin.2011.12.001","volume":"8","author":"R Al-Zaidy","year":"2012","unstructured":"Al-Zaidy, R., Fung, B.C.M., Youssef, A.M., Fortin, F.: Mining criminal networks from unstructured text documents. Digit. Investig. 8(3\u2014-4), 147\u2013160 (2012)","journal-title":"Digit. Investig."},{"key":"393_CR14","doi-asserted-by":"crossref","unstructured":"Nix, R., Kantarcioglu, M.: Incentive compatible privacy-preserving distributed classification. IEEE Trans. Dependable Secure Comput. 9(4), 451\u2013462 (2012)","DOI":"10.1109\/TDSC.2011.52"},{"issue":"2","key":"393_CR15","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/772862.772867","volume":"4","author":"C Clifton","year":"2003","unstructured":"Clifton, C., Kantarcioglu, M., Lin, X., Vaidya, J., Zhu, M.: Tools for privacy preserving distributed data mining. SIGKDD Explor. 4(2), 28\u201334 (2003)","journal-title":"SIGKDD Explor."},{"key":"393_CR16","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Das, K., Liu, K.: Multiparty, privacy preserving distributed data mining using game theoretic framework. In: Proceedings of PKDD\u201907, pp. 523\u2013531. Warsaw (2007)","DOI":"10.1007\/978-3-540-74976-9_54"},{"key":"393_CR17","unstructured":"Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst. 28(1), 47\u201377 (2011)"},{"key":"393_CR18","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)","DOI":"10.1145\/1749603.1749605"},{"key":"393_CR19","doi-asserted-by":"crossref","unstructured":"Kaleli, C., Polat, H.: Privacy-preserving SOM-based recommendations on horizontally distributed data. Knowl.-Based Syst. 33, 124\u2013135 (2012)","DOI":"10.1016\/j.knosys.2012.02.013"},{"key":"393_CR20","unstructured":"Bhuyan, H. K., Kamila N. K., Dash, S. K.: An approach for privacy preservation of distributed data in peer-to-peer network using multiparty computation. Int. J. Comput. Sci. Issues (IJCSI). 8(4), 2 (2011)"},{"key":"393_CR21","doi-asserted-by":"crossref","unstructured":"Diamantini, C., Gemelli, A., Potena, D.: Feature ranking based on decision border. In: International conference on pattern recognition, IEEE Computer Society (2010)","DOI":"10.1109\/ICPR.2010.154"},{"issue":"3","key":"393_CR22","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/s10115-009-0274-3","volume":"24","author":"K Das","year":"2014","unstructured":"Das, K., Bhaduri, K., Kargupta, H.: A local asynchronous distributed privacy preserving feature selection algorithm for large peer to peer networks. Knowl. Inf. Syst. 24(3), 341\u2013367 (2014)","journal-title":"Knowl. Inf. Syst."},{"key":"393_CR23","doi-asserted-by":"crossref","unstructured":"Sun, H. J., Sun, M., Mei, Z.: Feature selection via fuzzy clustering. In: Proceedings of International Conference on Machine Learning and Cybernetics, pp. 1400\u20131405. (2006)","DOI":"10.1109\/ICMLC.2006.258712"},{"issue":"1","key":"393_CR24","first-page":"210","volume":"19","author":"Y Zhang","year":"2007","unstructured":"Zhang, Y., Wu, X.B., Xiang, Z.R., Hu, W.L.: Design of high dimensional fuzzy classification systems based on multi-objective evolutionary algorithm. J. Syst. Simul. 19(1), 210\u2013215 (2007)","journal-title":"J. Syst. Simul."},{"issue":"9","key":"393_CR25","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1007\/s00500-005-0009-7","volume":"10","author":"N Xiong","year":"2006","unstructured":"Xiong, N., Funk, P.: Construction of fuzzy knowledge bases incorporating feature selection. Soft Comput. 10(9), 796\u2013804 (2006)","journal-title":"Soft Comput."},{"key":"393_CR26","doi-asserted-by":"crossref","unstructured":"Couso, I., L. S\u00e1nchez, L.: Higher order models for fuzzy random variables. Fuzzy Sets Syst. 159, 237\u2013258 (2008)","DOI":"10.1016\/j.fss.2007.09.004"},{"key":"393_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.fss.2010.10.005","volume":"165","author":"I Couso","year":"2011","unstructured":"Couso, I., S\u00e1nchez, L.: Upper and lower probabilities induced by a fuzzy random variable. Fuzzy Sets Syst. 165, 1\u201323 (2011)","journal-title":"Fuzzy Sets Syst."},{"issue":"3","key":"393_CR28","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1109\/TFUZZ.2004.825972","volume":"12","author":"MJD Jesus","year":"2004","unstructured":"Jesus, M.J.D., Hoffmann, F., Junco, L., S\u2019anchez, L.: Induction of fuzzy rule based classifiers with evolutionary boosting algorithms. IEEE Trans. Fuzzy Sets Syst. 12(3), 296\u2013308 (2004)","journal-title":"IEEE Trans. Fuzzy Sets Syst."},{"key":"393_CR29","doi-asserted-by":"crossref","unstructured":"S\u2019anchez, L., Couso, I., Casillas, J.: Modelling vague data with genetic fuzzy systems under a combination of crisp and imprecise criteria. In: Proceedings of IEEE MCDM, Honolulu (2007)","DOI":"10.1109\/MCDM.2007.369413"},{"key":"393_CR30","doi-asserted-by":"crossref","unstructured":"S\u2019anchez, L., Otero, J., Villar. J. R.: Learning fuzzy linguistic models from low quality data by genetic algorithms. In: FUZZ-IEEE, London. (2007)","DOI":"10.1109\/FUZZY.2007.4295659"},{"key":"393_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0020-0255(78)90019-1","volume":"15","author":"H Kwakernaak","year":"1978","unstructured":"Kwakernaak, H.: Fuzzy random variable-I. Definition and Theorem. Inf. Sci. 15, 1\u201329 (1978)","journal-title":"Inf. Sci."},{"key":"393_CR32","volume-title":"Introduction to Data Mining","author":"P Tan","year":"2006","unstructured":"Tan, P., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addision-Wesley, Redwood (2006)"},{"key":"393_CR33","volume-title":"Data Mining Concepts and Techniques","author":"J Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data Mining Concepts and Techniques, 2nd edn. Elsevier, Morgan Kaufmann Publishers, San Francisco (2006)","edition":"2"},{"key":"393_CR34","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy preserving data mining. In Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 439\u2013450. Dallas (2000)","DOI":"10.1145\/335191.335438"},{"key":"393_CR35","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 37\u201348. Baltimroe (2005)","DOI":"10.1145\/1066157.1066163"},{"key":"393_CR36","doi-asserted-by":"crossref","unstructured":"Li, Y., Chen, M., Li, Q., Zhang, W.: Enabling multilevel trust in privacy preserving data mining. IEEE Trans. Knowl. Data Eng. 24(9), 1598\u20131612 (2012)","DOI":"10.1109\/TKDE.2011.124"},{"key":"393_CR37","unstructured":"Sanchez, L., Suarez, M.R., Couso, I.: A fuzzy definition of mutual information with application to the design of genetic fuzzy classifiers. In: International Conference on Machine Intelligence, pp. 5\u20137. Tozeur (2005)"},{"key":"393_CR38","unstructured":"Bacardit, J.: Pittsburgh generic based machine learning in the data mining era: representations, generalization, and run time. Ph.D. Thesis. La Salle-Univ. Ramon Llull (2005)"},{"key":"393_CR39","doi-asserted-by":"crossref","unstructured":"Sanchez, L., Suarez, M.R., Villar, J.R., Couso, I.: Some results about Mutual information based feature selection and fuzzy Discretization of vague data. In: IEEE, Fuzzy Systems Conference, FUZZ-IEEE 2007, pp 1\u20136. London, 23\u201326 July (2007)","DOI":"10.1109\/FUZZY.2007.4295665"},{"key":"393_CR40","unstructured":"Asuncion, A., Newman, D.: UCI machine learning repository, (2007)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-014-0393-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-014-0393-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-014-0393-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:24:56Z","timestamp":1565742296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-014-0393-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,21]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["393"],"URL":"https:\/\/doi.org\/10.1007\/s10586-014-0393-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,21]]}}}