{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T22:19:14Z","timestamp":1777587554885,"version":"3.51.4"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:00:00Z","timestamp":1668643200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:00:00Z","timestamp":1668643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11042-022-14132-z","type":"journal-article","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T07:03:06Z","timestamp":1668668586000},"page":"23277-23304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Wide-ranging approach-based feature selection for classification"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9712-7280","authenticated-orcid":false,"given":"Hemanta Kumar","family":"Bhuyan","sequence":"first","affiliation":[]},{"given":"M","family":"Saikiran","sequence":"additional","affiliation":[]},{"given":"Murchhana","family":"Tripathy","sequence":"additional","affiliation":[]},{"given":"Vinayakumar","family":"Ravi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"14132_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) RSM analysis based cloud access security broker: a systematic literature review. Cluster Comput 25:3733\u20133763","DOI":"10.1007\/s10586-022-03598-z"},{"issue":"4","key":"14132_CR2","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","volume":"34","author":"F Amiri","year":"2011","unstructured":"Amiri F, RezaeiYousefi M, Lucas C, Shakery A, Yazdani N (2011) Mutual information-based feature selection for intrusion detection systems. J Netw Comput Appl 34(4):1184\u20131199","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"14132_CR3","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/72.298224","volume":"5","author":"R Battiti","year":"1994","unstructured":"Battiti R (Jul. 1994) Using mutual information for selecting features in supervised neural net learning. IEEE Trans Neural Netw 5(4):537\u2013550","journal-title":"IEEE Trans Neural Netw"},{"key":"14132_CR4","doi-asserted-by":"publisher","unstructured":"Bhuyan HK, Chakraborty C (2022) Explainable machine learning for data extraction across computational social system. In: IEEE Transactions on Computational Social Systems, pp 1\u201315. https:\/\/doi.org\/10.1109\/TCSS.2022.3164993","DOI":"10.1109\/TCSS.2022.3164993"},{"key":"14132_CR5","doi-asserted-by":"publisher","unstructured":"Bhuyan HK, Huque MS (2018) Sub-feature selection based classification. In: IEEE Explore, International Conference on Trends in Electronics and Informatics (ICOEI), pp 210\u2013216. https:\/\/doi.org\/10.1109\/ICOEI.2018.8553763","DOI":"10.1109\/ICOEI.2018.8553763"},{"key":"14132_CR6","doi-asserted-by":"crossref","unstructured":"Bhuyan HK, Kamila NK (2014) Privacy preserving Sub-feature Selection based on fuzzy probabilities. Cluster Comput (Springer) 17(4):1383\u20131399","DOI":"10.1007\/s10586-014-0393-9"},{"key":"14132_CR7","doi-asserted-by":"crossref","unstructured":"Bhuyan HK, Kamila NK (2015) Privacy preserving sub-feature selection in distributed data mining. Appl Soft Compu, Elsevier 36:552\u2013569 ISSN: 1568-4946","DOI":"10.1016\/j.asoc.2015.06.060"},{"key":"14132_CR8","doi-asserted-by":"publisher","unstructured":"Bhuyan HK, Ravi VK (2021) Analysis of sub-feature for classification in data mining. In: IEEE Transaction on Engineering Management, pp 1\u201315. https:\/\/doi.org\/10.1109\/TEM.2021.3098463","DOI":"10.1109\/TEM.2021.3098463"},{"issue":"3","key":"14132_CR9","first-page":"434","volume":"9","author":"HK Bhuyan","year":"2012","unstructured":"Bhuyan HK, Mohanty M, Das SR (2012) Privacy preserving for feature selection in data mining using centralized network. Int J Compu Sci Issues (IJCSI) 9(3):434\u2013440","journal-title":"Int J Compu Sci Issues (IJCSI)"},{"key":"14132_CR10","doi-asserted-by":"publisher","unstructured":"Bhuyan HK, Raghu Kumar L, Reddy KR (2019) Optimization model for sub-feature selection in data mining. In: 2nd International Conference on Smart Systems and Inventive Technology (ICSSIT 2019). IEEE Explore, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSSIT46314.2019.8987780","DOI":"10.1109\/ICSSIT46314.2019.8987780"},{"key":"14132_CR11","doi-asserted-by":"crossref","unstructured":"Bhuyan HK, Kamila NK, Pani SK (2022) Individual privacy in data mining using fuzzy optimization. Engineering Optimization, Taylor & Francis 54(8):1305\u20131323","DOI":"10.1080\/0305215X.2021.1922897"},{"issue":"5","key":"14132_CR12","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s12553-022-00687-2","volume":"12","author":"HK Bhuyan","year":"2022","unstructured":"Bhuyan HK, Ravi V, Brahma B, Kamila NK (2022) Disease analysis using machine learning approaches in healthcare system. Health Technol, Springer 12(5):987\u20131005","journal-title":"Health Technol, Springer"},{"key":"14132_CR13","doi-asserted-by":"publisher","unstructured":"Bhuyan HK, Ravi V, Yadav MS (2022) Multi-objective optimization-based privacy in data mining. Cluster Comput (Springer):1-13. https:\/\/doi.org\/10.1007\/s10586-022-03667-3","DOI":"10.1007\/s10586-022-03667-3"},{"key":"14132_CR14","doi-asserted-by":"publisher","unstructured":"Chen C, Wei J, Peng C, Zhang W, Qin H (2020) Qingdao University, Stony Brook University, improved saliency detection in RGB-D images using two-phase depth estimation and selective deep fusion. IEEE Trans Image Process. https:\/\/doi.org\/10.1109\/TIP.2020.2968250","DOI":"10.1109\/TIP.2020.2968250"},{"key":"14132_CR15","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.cose.2014.06.006","volume":"45","author":"R Chitrakar","year":"2014","unstructured":"Chitrakar R, Huang C (2014) Selection of candidate support vectors in incremental SVM for network intrusion detection. Comput Sec 45:231\u2013241","journal-title":"Comput Sec"},{"issue":"1","key":"14132_CR16","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/TNN.2004.841414","volume":"16","author":"TW Chow","year":"2005","unstructured":"Chow TW, Huang D (Jan. 2005) Estimating optimal feature subsets using efficient estimation of high-dimensional mutual information. IEEE Trans Neural Netw 16(1):213\u2013224","journal-title":"IEEE Trans Neural Netw"},{"key":"14132_CR17","volume-title":"Search engines: information retrieval in practice","author":"WB Croft","year":"2010","unstructured":"Croft WB, Metzler D, Strohman T (2010) Search engines: information retrieval in practice. Addison-Wesley, Reading, MA, USA"},{"key":"14132_CR18","doi-asserted-by":"crossref","unstructured":"Dahiru T (2008) P \u2013 value, a true test of statistical significance? a cautionary note. Annals Ibadan Postgrad Med 6(1)","DOI":"10.4314\/aipm.v6i1.64038"},{"key":"14132_CR19","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10009-020-00554-3","volume":"22","author":"B Dhaminda","year":"2020","unstructured":"Dhaminda B, Abeywickrama NB, Mamei M, Zambonelli F (2020) The SOTA approach to engineering collective adaptive systems. Int J Softw Tools Technol Transfer 22:399\u2013415. https:\/\/doi.org\/10.1007\/s10009-020-00554-3","journal-title":"Int J Softw Tools Technol Transfer"},{"issue":"21","key":"14132_CR20","first-page":"1","volume":"15","author":"C Gakii","year":"2022","unstructured":"Gakii C, Mireji PO, Rimiru R (2022) Graph based feature selection for reduction of dimensionality in next-generation RNA sequencing datasets, algorithms. MDPI 15(21):1\u201314","journal-title":"MDPI"},{"key":"14132_CR21","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10654-016-0149-3","volume":"31","author":"S Greenland","year":"2016","unstructured":"Greenland S, Senn SJ, Rothman KJ, Carlin JB, Poole C, Goodman SN, Altman DG (2016) Statistical tests, P values, confidence intervals, and power: a guide to misinterpretations. Eur J Epidemiol 31:337\u2013350","journal-title":"Eur J Epidemiol"},{"key":"14132_CR22","unstructured":"He X, Cai D, Niyogi P (2005) Laplacian score for feature selection. Proc Int Conf Neural Inf Process Syst:507\u2013514"},{"issue":"2","key":"14132_CR23","first-page":"207","volume":"32","author":"CN Hsu","year":"2004","unstructured":"Hsu CN, Huang HJ, Dietrich S (2004) The ANNIGMA\u2013wrapper approach to fast feature selection for neural nets. IEEE Trans Syst, Man, Cybern B, Cybern 32(2):207\u2013212","journal-title":"IEEE Trans Syst, Man, Cybern B, Cybern"},{"key":"14132_CR24","unstructured":"https:\/\/archive.ics.uci.edu\/ml\/datasets.php, 2020."},{"key":"14132_CR25","unstructured":"https:\/\/www.kaggle.com\/datasets, 2020."},{"issue":"4","key":"14132_CR26","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1007\/s10586-016-0643-0","volume":"19","author":"NK Kamila","year":"2016","unstructured":"Kamila NK, Jena LD, Bhuyan HK (2016) Pareto-based multi-objective optimization for classification in data mining. Cluster Compu (Springer) 19(4):1723\u20131745 ISSN: 1386\u20137857 (print version) ISSN: 1573\u20137543 (electronic version)","journal-title":"Cluster Compu (Springer)"},{"issue":"6","key":"14132_CR27","doi-asserted-by":"publisher","first-page":"066138","DOI":"10.1103\/PhysRevE.69.066138","volume":"69","author":"A Kraskov","year":"2004","unstructured":"Kraskov A, Stogbauer H, Grassberger P (2004) Estimating \u20ac mutual information. Phys Rev E 69(6):066138","journal-title":"Phys Rev E"},{"issue":"1","key":"14132_CR28","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/72.977291","volume":"13","author":"N Kwak","year":"2002","unstructured":"Kwak N, Choi C-H (Jan. 2002) Input feature selection for classification problems. IEEE Trans Neural Netw 13(1):143\u2013159","journal-title":"IEEE Trans Neural Netw"},{"issue":"12","key":"14132_CR29","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1093\/bioinformatics\/17.12.1131","volume":"17","author":"L Li","year":"2001","unstructured":"Li L, Weinberg CR, Darden TA, Pedersen LG (2001) Gene selection for sample classification based on gene expression data: study of sensitivity to choice of parameters of the GA\/KNN method. Bioinformatics 17(12):1131\u20131142","journal-title":"Bioinformatics"},{"key":"14132_CR30","doi-asserted-by":"crossref","unstructured":"Li Z, Yang Y, Liu J, Zhou X, Lu H (2012) Unsupervised feature selection using nonnegative spectral analysis. Proc 26th AAAI Conf Artif Intell:1026\u20131032","DOI":"10.1609\/aaai.v26i1.8289"},{"issue":"12","key":"14132_CR31","doi-asserted-by":"publisher","first-page":"3535","DOI":"10.1109\/TVCG.2020.3023636","volume":"26","author":"G Ma","year":"2020","unstructured":"Ma G, Li S, Chen C, Hao A, Qin H (2020) Stage-wise Salient Object Detection in 360\u00b0 Omnidirectional Image via Object-level Semantical Saliency Ranking. IEEE Trans Vis Comput Graph 26(12):3535\u20133545. https:\/\/doi.org\/10.1109\/TVCG.2020.3023636","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"1","key":"14132_CR32","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/TSMCB.2002.805808","volume":"34","author":"KZ Mao","year":"2004","unstructured":"Mao KZ (2004) Feature subset selection for support vector machines through discriminative function pruning analysis. IEEE Trans Syst, Man, Cybern B, Cybern 34(1):60\u201367","journal-title":"IEEE Trans Syst, Man, Cybern B, Cybern"},{"key":"14132_CR33","doi-asserted-by":"publisher","unstructured":"Myat Thet Nyo F Mebarek-Oudina, SSH, Khan NA (2022) Otsu\u2019s thresholding technique for MRI image brain tumor segmentation. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-13215-1","DOI":"10.1007\/s11042-022-13215-1"},{"issue":"8","key":"14132_CR34","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H Peng","year":"2005","unstructured":"Peng H, Long F, Ding C (2005) Feature selection based on mutual information criteria of max-dependency, max-relevance, and minredundancy. IEEE Trans Pattern Anal Mach Intell 27(8):1226\u20131238","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"14132_CR35","volume-title":"Numerical Recipes","author":"WH Press","year":"1986","unstructured":"W. H. Press, P. Flannery, S. A. Teukolsky, W. T. Vetterling, et al., Numerical Recipes, Cambridge UP Cambridge etc, 1986."},{"key":"14132_CR36","first-page":"101","volume":"5","author":"R Rifkin","year":"2004","unstructured":"Rifkin R, Klautau A (2004) In defense of one-vs-all classification. The J Mach Learn Res 5:101\u2013141","journal-title":"The J Mach Learn Res"},{"issue":"2","key":"14132_CR37","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.chemolab.2005.06.010","volume":"80","author":"F Rossi","year":"2006","unstructured":"Rossi F, Lendasse A, Fran\u00e7ois D, Wertz V, Verleysen M (2006) Mutual information for the selection of relevant variables in spectrometric nonlinear modelling. Chemom Intell Lab Syst 80(2):215\u2013226","journal-title":"Chemom Intell Lab Syst"},{"key":"14132_CR38","doi-asserted-by":"crossref","unstructured":"Song J, Takakura H, Okabe Y, Eto M, Inoue D, Nakao K (2011) Statistical analysis of honeypot data and building of kyoto 2006+dataset for nids evaluation. Proc 1st Workshop Building Anal Datasets Gathering Exp Ret Sec:29\u201336","DOI":"10.1145\/1978672.1978676"},{"key":"14132_CR39","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.engappai.2014.03.007","volume":"32","author":"S Tabakhi","year":"2014","unstructured":"Tabakhi S, Moradi P, Akhlaghian F (2014) An unsupervised feature selection algorithm based on ant colony optimization. Eng Appl Artif Intell 32:112\u2013123","journal-title":"Eng Appl Artif Intell"},{"key":"14132_CR40","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani A-A (2009) A detailed analysis of the kdd cup 99 data set. Proc 2nd IEEE Symp Comput Intell Security Defence Appl:1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"10","key":"14132_CR41","doi-asserted-by":"publisher","first-page":"3338","DOI":"10.1109\/TKDE.2020.2969860","volume":"33","author":"Y Wan","year":"2021","unstructured":"Wan Y, Sun S, Cheng Z (2021) Adaptive similarity embedding for unsupervised multi-view feature selection. IEEE Trans Knowl Data Eng 33(10):3338\u20133350","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"14132_CR42","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/TKDE.2020.2983396","volume":"34","author":"R Wang","year":"2022","unstructured":"Wang R, Bian J, Nie F, Li X (2022) Unsupervised Discriminative Projection for Feature Selection. IEEE Trans Knowl Data Eng 34(2):942\u2013953","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"14132_CR43","unstructured":"Wang G, Chen C, Fan D-P, Hao A, Qin H (2022) Weakly Supervised Visual-Auditory Saliency Detection with Multigranularity Perception. IEEE Trans Pattern Anal Mach Intell:1\u201318 (published in Early access)"},{"issue":"1","key":"14132_CR44","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.32604\/cmc.2022.018295","volume":"70","author":"M Zaffar","year":"2022","unstructured":"Zaffar M, Hashmani MA, Habib R, Quraishi KS, Irfan M, Alqhtani S, Hamdi M (2022) A hybrid feature selection framework for predicting students performance, computers. Mater Continua 70(1):1893\u20131920","journal-title":"Mater Continua"},{"issue":"12","key":"14132_CR45","doi-asserted-by":"publisher","first-page":"2423","DOI":"10.1109\/TKDE.2018.2877746","volume":"31","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Zhang Z, Li S, Qin J, Liu G, Wang M, Yan S (Dec. 2019) Unsupervised nonnegative adaptive feature extraction for data representation. IEEE Trans Knowl Data Eng 31(12):2423\u20132440","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"14132_CR46","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1109\/TIP.2019.2938307","volume":"29","author":"L Zhang","year":"2020","unstructured":"Zhang L, Liu J, Zhang B, Zhang D, Zhu C (2020) Deep cascade model-based face recognition: when deep-layered learning meets small data. IEEE Trans Image Process 29:1016\u20131029","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"14132_CR47","first-page":"271","volume":"34","author":"J Zhu","year":"2022","unstructured":"Zhu J, Liu Y, Wen C, Wu X (2022) DGDFS: dependence guided discriminative feature selection for predicting adverse drug-drug interaction. IEEE Trans Knowl Data Eng 34(1):271\u2013285","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14132-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14132-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14132-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T09:23:46Z","timestamp":1685438626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14132-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,17]]},"references-count":47,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["14132"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14132-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,17]]},"assertion":[{"value":"5 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/competing interests"}}]}}