{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T11:16:14Z","timestamp":1778498174153,"version":"3.51.4"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10586-022-03667-3","type":"journal-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T17:02:58Z","timestamp":1657645378000},"page":"4275-4287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Multi-objective optimization-based privacy in data mining"],"prefix":"10.1007","volume":"25","author":[{"given":"Hemanta Kumar","family":"Bhuyan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6873-6469","authenticated-orcid":false,"given":"Vinayakumar","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"M. Srikanth","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,12]]},"reference":[{"key":"3667_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03459-1","author":"OA Alzubi","year":"2021","unstructured":"Alzubi, O.A., Alzubi, J.A., Al-Zoubi, A.M., Hassonah, M.A., Kose, U.: An efficient malware detection approach with feature weighting based on Harris Hawks optimization. Clust. Comput. J. (2021). https:\/\/doi.org\/10.1007\/s10586-021-03459-1","journal-title":"Clust. Comput. J."},{"key":"3667_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02623-6","author":"AA Movassagh","year":"2021","unstructured":"Movassagh, A.A., Alzubi, J.A., Gheisari, M., Rahimi, M., Mohan, S., Abbasi, A.A., Nabipour, N.: Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model. J. Ambient Intell. Humniz. Comput. (2021). https:\/\/doi.org\/10.1007\/s12652-020-02623-6","journal-title":"J. Ambient Intell. Humniz. Comput."},{"key":"3667_CR3","doi-asserted-by":"publisher","first-page":"4965","DOI":"10.1007\/s11276-019-01982-z","volume":"26","author":"M Gheisari","year":"2020","unstructured":"Gheisari, M., Alzubi, J., Zhang, X., Kose, U., Saucedo, J.A.M.: A new algorithm for optimization of quality of service in peer to peer wireless mesh networks. Wirel. Netw. 26, 4965\u20134973 (2020). https:\/\/doi.org\/10.1007\/s11276-019-01982-z","journal-title":"Wirel. Netw."},{"issue":"1","key":"3667_CR4","first-page":"1","volume":"3","author":"JM Cadenas","year":"2006","unstructured":"Cadenas, J.M., Verdegy, J.L.: A primer on fuzzy optimization models and methods. Iran. J. Fuzzy Syst. 3(1), 1\u201321 (2006)","journal-title":"Iran. J. Fuzzy Syst."},{"key":"3667_CR5","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0377-2217(93)E0338-X","volume":"83","author":"F Herrera","year":"1995","unstructured":"Herrera, F., Verdegay, J.L.: Three models of fuzzy integer linear programmining. Eur. J. Oper. Res. 83, 581\u2013593 (1995)","journal-title":"Eur. J. Oper. Res."},{"key":"3667_CR6","unstructured":"Bayardo, R. J., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of ICDE'05, Washington, DC, USA, IEEE Computer Society, pp. 217\u2013228, 2005"},{"key":"3667_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.01.028","volume":"123","author":"M Gheisari","year":"2021","unstructured":"Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123, 1\u201313 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.01.028","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"3667_CR8","first-page":"1","volume":"32","author":"OA Alzubi","year":"2021","unstructured":"Alzubi, O.A., Alzubi, J.A., Shankar, K., Gupta, D.: Blockchain and artificial intelligence enabled privacy preserving medical data transmission in internet of things. Trans. Emerg. Telecommun. Technol. 32(2), 1\u201314 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"3667_CR9","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s10723-007-9069-5","volume":"5","author":"D Krivitski","year":"2007","unstructured":"Krivitski, D., Schuster, A., Wolff, R.: A local facility location algorithm for large-scale distributed systems. J. Grid Comput. 5(4), 361\u2013378 (2007)","journal-title":"J. Grid Comput."},{"issue":"3","key":"3667_CR10","first-page":"195","volume":"7","author":"Y Xiao","year":"2014","unstructured":"Xiao, Y., Xiong, L., Fan, L., Goryczka, S., Li, H.: DPCube: differentially private histogram release through multidimensional partitioning. Trans. Data Priv. 7(3), 195\u2013222 (2014)","journal-title":"Trans. Data Priv."},{"issue":"2","key":"3667_CR11","first-page":"161","volume":"6","author":"C Clifton","year":"2014","unstructured":"Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Trans. Data Priv. 6(2), 161\u2013183 (2014)","journal-title":"Trans. Data Priv."},{"key":"3667_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3153519","author":"J Song","year":"2022","unstructured":"Song, J., Wang, W., Gadekallu, T.R., Cao, J., Liu, Y.: EPPDA: an efficient privacy-preserving data aggregation federated learning scheme. IEEE Trans. Netw. Sci. Eng. (2022). https:\/\/doi.org\/10.1109\/TNSE.2022.3153519","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"3667_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2022.3155109","author":"D Wenjie","year":"2022","unstructured":"Wenjie, D., Yang, W., Zhou, J., Shi, L., Chen, G.: Privacy preserving via secure summation in distributed Kalman filtering. IEEE Trans. Control Netw. Syst. (2022). https:\/\/doi.org\/10.1109\/TCNS.2022.3155109","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"3667_CR14","doi-asserted-by":"publisher","DOI":"10.1080\/0305215X.2021.1922897","author":"HK Bhuyan","year":"2021","unstructured":"Bhuyan, H.K., Kamila, N.K., Pani, S.K.: Individual privacy in data mining using fuzzy optimization. Eng. Optim. (2021). https:\/\/doi.org\/10.1080\/0305215X.2021.1922897","journal-title":"Eng. Optim."},{"key":"3667_CR15","first-page":"55","volume-title":"Modelling Heterogeneity among Experts in Multi-criteria Group Decision Making Problems","author":"IJ Perez","year":"2011","unstructured":"Perez, I.J., Alonso, S., Cabrerizo, F.J., Lu, J., Herrera-Viedma, E.: Modelling Heterogeneity among Experts in Multi-criteria Group Decision Making Problems, pp. 55\u201366. Springer-Verlag, Berlin (2011)"},{"issue":"2","key":"3667_CR16","first-page":"132","volume":"2","author":"D Dutta","year":"2010","unstructured":"Dutta, D., Murthy, S.: Multi-choice goal programming approach for a fuzzy transportation problem. IJRRAS 2(2), 132 (2010)","journal-title":"IJRRAS"},{"key":"3667_CR17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.ijar.2006.02.001","volume":"43","author":"F Jimenez","year":"2006","unstructured":"Jimenez, F., Cadenas, J.M., Sanchez, G., Gomez-Skarmeta, A.F., Verdegay, J.L.: Multiobjective evolutionary computation and fuzzy optimization. Int. J. Approx. Reason. 43, 59\u201375 (2006)","journal-title":"Int. J. Approx. Reason."},{"key":"3667_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)"},{"key":"3667_CR19","volume-title":"Multiobjective Optimization Using Evolutionary Algorithms","author":"K Deb","year":"2001","unstructured":"Deb, K.: Multiobjective Optimization Using Evolutionary Algorithms. Wiley, Hoboken (2001)"},{"issue":"4","key":"3667_CR20","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/01969727308545912","volume":"3","author":"H Tanaka","year":"1974","unstructured":"Tanaka, H., Okuda, T., Asai, K.: On fuzzy mathematical programming. J. Cybern. 3(4), 37\u201346 (1974)","journal-title":"J. Cybern."},{"issue":"1","key":"3667_CR21","first-page":"27","volume":"2","author":"S Mukherjee","year":"2008","unstructured":"Mukherjee, S., Chen, Z., Gangopadhyay, A.: A fuzzy programming approach for data reduction and privacy in distance based mining. Int. J. Inf. Comput. Secur. 2(1), 27\u201347 (2008)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"3667_CR22","unstructured":"Asuncion, A., Newman, D.: UCI machine learning repository, 2007."},{"issue":"4","key":"3667_CR23","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s10586-014-0393-9","volume":"17","author":"HK Bhuyan","year":"2014","unstructured":"Bhuyan, H.K., Kamila, N.K.: Privacy preserving sub-feature selection based on fuzzy probabilities. Clust. Comput. 17(4), 1383\u20131399 (2014)","journal-title":"Clust. Comput."},{"issue":"3","key":"3667_CR24","first-page":"434","volume":"9","author":"HK Bhuyan","year":"2012","unstructured":"Bhuyan, H.K., Mohanty, M., Das, S.R.: Privacy preserving for feature selection in data mining using centralized network. Int. J. Comput. Sci. Issues (IJCSI) 9(3), 434\u2013440 (2012)","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"issue":"1","key":"3667_CR25","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TKDE.2018.2880743","volume":"32","author":"SG Teo","year":"2020","unstructured":"Teo, S.G., Cao, J., Lee, V.C.S.: DAG: a general model for privacy-preserving data mining. IEEE Trans. Knowl. Data Eng. 32(1), 40\u201353 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"3667_CR26","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1109\/TKDE.2018.2885749","volume":"32","author":"S Kim","year":"2020","unstructured":"Kim, S., Shin, H., Baek, C., Kim, S., Shin, J.: Learning New Words from Keystroke Data with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(3), 479\u2013491 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"3667_CR27","doi-asserted-by":"publisher","first-page":"2164","DOI":"10.1109\/TKDE.2018.2874004","volume":"31","author":"P Christen","year":"2019","unstructured":"Christen, P., Ranbaduge, T., Vatsalan, D., Schnell, R.: Precise and fast cryptanalysis for bloom filter based privacy-preserving record linkage. IEEE Trans. Knowl. Data Eng. 31(11), 2164\u20132177 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"3667_CR28","first-page":"297","volume":"4","author":"HK Bhuyan","year":"2012","unstructured":"Bhuyan, H.K., Dash, S.K., Roy, S., Swain, D.K.: Privacy preservation with penalty in decentralized network using multiparty computation. Int. J. Adv. Comput. Technol. (IJACT) 4(1), 297\u2013303 (2012)","journal-title":"Int. J. Adv. Comput. Technol. (IJACT)"},{"issue":"8","key":"3667_CR29","first-page":"424","volume":"3","author":"HK Bhuyan","year":"2011","unstructured":"Bhuyan, H.K., Kamila, N.K., Dash, S.K.: An approach for privacy preservation of distributed data in peer to-peer network using multiparty computation. Int. J. Comput. Sci. Issues (IJCSI) 3(8), 424\u2013429 (2011)","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"3667_CR30","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1007\/s10586-016-0643-0","volume":"19","author":"NK Kamila","year":"2016","unstructured":"Kamila, N.K., Jena, L.D., Bhuyan, H.K.: Pareto-based multiobjective optimization for classification in data mining. Clust. Comput. (Springer) 19, 1723\u20131745 (2016)","journal-title":"Clust. Comput. (Springer)"},{"key":"3667_CR31","doi-asserted-by":"crossref","unstructured":"Bhuyan, H. K., Madhusudan Reddy, C. V.: Sub-feature selection for novel classification. In: IEEE Explore. April, 2018.","DOI":"10.1109\/ICICCT.2018.8473206"},{"key":"3667_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2021.3098463","author":"HK Bhuyan","year":"2021","unstructured":"Bhuyan, H.K., Ravi, V.K.: Analysis of sub-feature for classification in data mining. IEEE Trans. Eng. Manage. (2021). https:\/\/doi.org\/10.1109\/TEM.2021.3098463","journal-title":"IEEE Trans. Eng. Manage."},{"key":"3667_CR33","doi-asserted-by":"crossref","unstructured":"Bhuyan, H. K., Raghu Kumar, L., Reddy, K. R.: Optimization model for Sub-feature selection in data mining. In: IEEE Explore. (2020)","DOI":"10.1109\/ICSSIT46314.2019.8987780"},{"key":"3667_CR34","first-page":"1","volume":"43","author":"M Alazab","year":"2021","unstructured":"Alazab, M., Lakshmanna, K., Reddy, T., Pham, Q.V., Maddikunta, P.K.: Multi objective cluster head selection using fitness averaged rider optimization algorithm for IoT networks in smart cities. Sustain. Energy Technol. Assess. 43, 1\u201319 (2021)","journal-title":"Sustain. Energy Technol. Assess."},{"key":"3667_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2021.107819","volume":"187","author":"R Kumar","year":"2021","unstructured":"Kumar, R., Kumar, P., Tripathi, R., Gupta, G.P., Gadekallu, T.R., Srivastava, G.: Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput. Netw. 187, 1\u201315 (2021)","journal-title":"Comput. Netw."},{"issue":"3","key":"3667_CR36","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Kumar, R., Srivastava, G., Gupta, G.P., Tripathi, R., Gadekallu, T.R., Xiong, N.N.: PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 8(3), 2326\u20132341 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03667-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03667-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03667-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T14:35:24Z","timestamp":1666881324000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03667-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,12]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["3667"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03667-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,12]]},"assertion":[{"value":"5 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"None.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}