{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:40Z","timestamp":1772119900673,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11235-023-01096-0","type":"journal-article","created":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T03:02:40Z","timestamp":1708311760000},"page":"623-647","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["BO-LCNN: butterfly optimization based lightweight convolutional neural network for remote data integrity auditing and data sanitizing model"],"prefix":"10.1007","volume":"85","author":[{"given":"B. Judy","family":"Flavia","sequence":"first","affiliation":[]},{"given":"Balika J.","family":"Chelliah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,19]]},"reference":[{"key":"1096_CR1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4923590","author":"W Liu","year":"2019","unstructured":"Liu, W., Gao, P., Liu, Z., Chen, H., & Zhang, M. (2019). A quantum-based database query scheme for privacy preservation in cloud environment. Security and Communication Networks. https:\/\/doi.org\/10.1155\/2019\/4923590","journal-title":"Security and Communication Networks"},{"key":"1096_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102245","volume":"105","author":"J Tian","year":"2021","unstructured":"Tian, J., Wang, H., & Wang, M. (2021). Data integrity auditing for secure cloud storage using user behavior prediction. Computers & Security, 105, 102245. https:\/\/doi.org\/10.1016\/j.cose.2021.102245","journal-title":"Computers & Security"},{"key":"1096_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102869","volume":"60","author":"VS Lakshmi","year":"2021","unstructured":"Lakshmi, V. S., Deepthi, S., & Deepthi, P. P. (2021). Collusion resistant secret sharing scheme for secure data storage and processing over cloud. Journal of Information Security and Applications, 60, 102869. https:\/\/doi.org\/10.1016\/j.jisa.2021.102869","journal-title":"Journal of Information Security and Applications"},{"key":"1096_CR4","doi-asserted-by":"publisher","first-page":"40612","DOI":"10.1109\/ACCESS.2020.2976687","volume":"8","author":"AK Pandey","year":"2020","unstructured":"Pandey, A. K., Khan, A. I., Abushark, Y. B., Alam, M. M., Agrawal, A., Kumar, R., & Khan, R. A. (2020). Key issues in healthcare data integrity: Analysis and recommendations. IEEE Access, 8, 40612\u201340628. https:\/\/doi.org\/10.1109\/ACCESS.2020.2976687","journal-title":"IEEE Access"},{"issue":"6","key":"1096_CR5","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/TSC.2021.3085913","volume":"15","author":"R Zhang","year":"2021","unstructured":"Zhang, R., Xue, R., & Liu, L. (2021). Security and privacy for healthcare blockchains. IEEE Transactions on Services Computing, 15(6), 3668\u20133686. https:\/\/doi.org\/10.1109\/TSC.2021.3085913","journal-title":"IEEE Transactions on Services Computing"},{"key":"1096_CR6","first-page":"327","volume-title":"European symposium on research in computer security","author":"S Xu","year":"2021","unstructured":"Xu, S., Ning, J., Ma, J., Xu, G., Yuan, J., & Deng, R. H. (2021). Revocable policy-based chameleon hash. European symposium on research in computer security (pp. 327\u2013347). Springer."},{"key":"1096_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8877405","author":"Z Xu","year":"2020","unstructured":"Xu, Z., Luo, M., Kumar, N., Vijayakumar, P., & Li, L. (2020). Privacy-protection scheme based on sanitizable signature for smart mobile medical scenarios. Wireless Communications and Mobile Computing. https:\/\/doi.org\/10.1155\/2020\/8877405","journal-title":"Wireless Communications and Mobile Computing"},{"key":"1096_CR8","doi-asserted-by":"publisher","unstructured":"Awotunde, J. B., Jimoh, R. G., Folorunso, S. O., Adeniyi, E. A., Abiodun, K. M., & Banjo, O. O. (2021). Privacy and security concerns in IoT-based healthcare systems. In The fusion of internet of things, artificial intelligence, and cloud computing in health care (pp. 105\u2013134). Springer. https:\/\/doi.org\/10.1007\/978-3-030-75220-0_6","DOI":"10.1007\/978-3-030-75220-0_6"},{"key":"1096_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.comcom.2019.12.030","volume":"150","author":"F Al-Turjman","year":"2020","unstructured":"Al-Turjman, F., Nawaz, M. H., & Ulusar, U. D. (2020). Intelligence in the Internet of Medical Things era: A systematic review of current and future trends. Computer Communications, 150, 644\u2013660. https:\/\/doi.org\/10.1016\/j.comcom.2019.12.030","journal-title":"Computer Communications"},{"issue":"7","key":"1096_CR10","doi-asserted-by":"publisher","first-page":"6348","DOI":"10.1109\/JIOT.2020.2966778","volume":"7","author":"B Yin","year":"2020","unstructured":"Yin, B., Yin, H., Wu, Y., & Jiang, Z. (2020). FDC: A secure federated deep learning mechanism for data collaborations in the Internet of Things. IEEE Internet of Things Journal, 7(7), 6348\u20136359. https:\/\/doi.org\/10.1109\/JIOT.2020.2966778","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"1096_CR11","doi-asserted-by":"publisher","first-page":"0242612","DOI":"10.1371\/journal.pone.0242612","volume":"16","author":"AS Assiri","year":"2021","unstructured":"Assiri, A. S. (2021). On the performance improvement of butterfly optimization approaches for global optimization and feature selection. PLoS ONE, 16(1), 0242612. https:\/\/doi.org\/10.1371\/journal.pone.0242612","journal-title":"PLoS ONE"},{"key":"1096_CR12","doi-asserted-by":"publisher","first-page":"12035","DOI":"10.1007\/s11042-020-10053-x","volume":"80","author":"S Sharma","year":"2021","unstructured":"Sharma, S., Saha, A. K., Majumder, A., & Nama, S. (2021). MPBOA-A novel hybrid butterfly optimization algorithm with symbiosis organisms search for global optimization and image segmentation. Multimedia Tools and Applications, 80, 12035\u201312076. https:\/\/doi.org\/10.1007\/s11042-020-10053-x","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"1096_CR13","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1080\/10106049.2020.1753821","volume":"37","author":"M Fadaee","year":"2022","unstructured":"Fadaee, M., Mahdavi-Meymand, A., & Zounemat-Kermani, M. (2022). Suspended sediment prediction using integrative soft computing models: On the analogy between the butterfly optimization and genetic algorithms. Geocarto International, 37(4), 961\u2013977. https:\/\/doi.org\/10.1080\/10106049.2020.1753821","journal-title":"Geocarto International"},{"key":"1096_CR14","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s00500-018-3102-4","volume":"23","author":"S Arora","year":"2019","unstructured":"Arora, S., & Singh, S. (2019). Butterfly optimization algorithm: A novel approach for global optimization. Soft Computing, 23, 715\u2013734. https:\/\/doi.org\/10.1007\/s00500-018-3102-4","journal-title":"Soft Computing"},{"key":"1096_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03649-5","author":"S Sharma","year":"2022","unstructured":"Sharma, S., Saha, A. K., Roy, S., Mirjalili, S., & Nama, S. (2022). A mixed sine cosine butterfly optimization algorithm for global optimization and its application. Cluster Computing. https:\/\/doi.org\/10.1007\/s10586-022-03649-5","journal-title":"Cluster Computing"},{"key":"1096_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14569\/IJACSA.2023.0140145","volume":"14","author":"PD Kusuma","year":"2023","unstructured":"Kusuma, P. D., & Dinimaharawati, A. (2023). Three on three optimizer: A new metaheuristic with three guided searches and three random searches. International Journal of Advanced Computer Science and Applications, 14, 1.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"1096_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s00366-021-01294-x","author":"S Sharma","year":"2021","unstructured":"Sharma, S., Saha, A. K., & Lohar, G. (2021). Optimization of weight and cost of cantilever retaining wall by a hybrid metaheuristic algorithm. Engineering with Computers. https:\/\/doi.org\/10.1007\/s00366-021-01294-x","journal-title":"Engineering with Computers"},{"key":"1096_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107146","volume":"103","author":"W Long","year":"2021","unstructured":"Long, W., Jiao, J., Liang, X., Wu, T., Xu, M., & Cai, S. (2021). Pinhole-imaging-based learning butterfly optimization algorithm for global optimization and feature selection. Applied Soft Computing, 103, 107146. https:\/\/doi.org\/10.1016\/j.asoc.2021.107146","journal-title":"Applied Soft Computing"},{"key":"1096_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103265","volume":"69","author":"V Chouhan","year":"2022","unstructured":"Chouhan, V., Peddoju, S. K., & Buyya, R. (2022). dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key. Journal of Information Security and Applications, 69, 103265. https:\/\/doi.org\/10.1016\/j.jisa.2022.103265","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"1096_CR20","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s12065-018-0162-4","volume":"11","author":"MM Annie Alphonsa","year":"2018","unstructured":"Annie Alphonsa, M. M., & Amudhavalli, P. (2018). Genetically modified glowworm swarm optimization based privacy preservation in cloud computing for healthcare sector. Evolutionary Intelligence, 11(1), 101\u2013116. https:\/\/doi.org\/10.1007\/s12065-018-0162-4","journal-title":"Evolutionary Intelligence"},{"key":"1096_CR21","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.future.2019.01.054","volume":"96","author":"Y Fan","year":"2019","unstructured":"Fan, Y., Lin, X., Tan, G., Zhang, Y., Dong, W., & Lei, J. (2019). One secure data integrity verification scheme for cloud storage. Future Generation Computer Systems, 96, 376\u2013385. https:\/\/doi.org\/10.1016\/j.future.2019.01.054","journal-title":"Future Generation Computer Systems"},{"key":"1096_CR22","unstructured":"Bebe, P.C., & Akila, D. (2021). Bloom hash probabilistic data structure and Benaloh cryptosystem for secured data storage and access control in the cloud. Materials Today: Proceedings."},{"key":"1096_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103009","volume":"63","author":"G Pareek","year":"2021","unstructured":"Pareek, G., & Purushothama, B. R. (2021). KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage. Journal of Information Security and Applications, 63, 103009. https:\/\/doi.org\/10.1016\/j.jisa.2021.103009","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"1096_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-020-00224-y","volume":"10","author":"L Megouache","year":"2020","unstructured":"Megouache, L., Zitouni, A., & Djoudi, M. (2020). Ensuring user authentication and data integrity in a multi-cloud environment. Human-Centric Computing and Information Sciences, 10(1), 1\u201320. https:\/\/doi.org\/10.1186\/s13673-020-00224-y","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"1096_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.csite.2021.101250","volume":"27","author":"M Ghalambaz","year":"2021","unstructured":"Ghalambaz, M., Yengejeh, R. J., & Davami, A. H. (2021). Building energy optimization using grey wolf optimizer (GWO). Case Studies in Thermal Engineering, 27, 101250. https:\/\/doi.org\/10.1016\/j.csite.2021.101250","journal-title":"Case Studies in Thermal Engineering"},{"issue":"5","key":"1096_CR26","doi-asserted-by":"publisher","first-page":"3975","DOI":"10.2298\/TSCI210402306G","volume":"26","author":"M Ghalambaz","year":"2022","unstructured":"Ghalambaz, M., Jalilzadeh, Y. R., & Davami, A. H. (2022). Building energy optimization using butterfly optimization algorithm. Thermal Science, 26(5), 3975\u20133986. https:\/\/doi.org\/10.2298\/TSCI210402306G","journal-title":"Thermal Science"},{"key":"1096_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-021-09556-0","volume":"19","author":"M Hosseinzadeh","year":"2021","unstructured":"Hosseinzadeh, M., Masdari, M., Rahmani, A. M., Mohammadi, M., Aldalwie, A. H. M., Majeed, M. K., & Karim, S. H. T. (2021). Improved butterfly optimization algorithm for data placement and scheduling in edge computing environments. Journal of Grid Computing, 19, 1\u201327. https:\/\/doi.org\/10.1007\/s10723-021-09556-0","journal-title":"Journal of Grid Computing"},{"key":"1096_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.104079","volume":"97","author":"Z Sadeghian","year":"2021","unstructured":"Sadeghian, Z., Akbari, E., & Nematzadeh, H. (2021). A hybrid feature selection method based on information theory and binary butterfly optimization algorithm. Engineering Applications of Artificial Intelligence, 97, 104079. https:\/\/doi.org\/10.1016\/j.engappai.2020.104079","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"04","key":"1096_CR29","doi-asserted-by":"publisher","first-page":"1850026","DOI":"10.1142\/S2047684118500264","volume":"7","author":"B Singh","year":"2018","unstructured":"Singh, B., & Anand, P. (2018). A novel adaptive butterfly optimization algorithm. International Journal of Computational Materials Science and Engineering, 7(04), 1850026.","journal-title":"International Journal of Computational Materials Science and Engineering"},{"key":"1096_CR30","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1016\/j.matpr.2020.04.679","volume":"34","author":"TK Sharma","year":"2021","unstructured":"Sharma, T. K., Sahoo, A. K., & Goyal, P. (2021). Bidirectional butterfly optimization algorithm and engineering applications. Materials Today: Proceedings, 34, 736\u2013741. https:\/\/doi.org\/10.1016\/j.matpr.2020.04.679","journal-title":"Materials Today: Proceedings"},{"key":"1096_CR31","doi-asserted-by":"publisher","first-page":"4809","DOI":"10.1007\/s00500-019-04234-6","volume":"24","author":"S Sharma","year":"2020","unstructured":"Sharma, S., & Saha, A. K. (2020). m-MBOA: A novel butterfly optimization algorithm enhanced with mutualism scheme. Soft Computing, 24, 4809\u20134827.","journal-title":"Soft Computing"},{"issue":"2","key":"1096_CR32","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s42235-022-00288-9","volume":"20","author":"S Sharma","year":"2023","unstructured":"Sharma, S., Khodadadi, N., Saha, A. K., Gharehchopogh, F. S., & Mirjalili, S. (2023). Non-dominated sorting advanced butterfly optimization algorithm for multi-objective problems. Journal of Bionic Engineering, 20(2), 819\u2013843. https:\/\/doi.org\/10.1007\/s42235-022-00288-9","journal-title":"Journal of Bionic Engineering"},{"issue":"4","key":"1096_CR33","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s42235-022-00175-3","volume":"19","author":"S Sharma","year":"2022","unstructured":"Sharma, S., Chakraborty, S., Saha, A. K., Nama, S., & Sahoo, S. K. (2022). mLBOA: A modified butterfly optimization algorithm with lagrange interpolation for global optimization. Journal of Bionic Engineering, 19(4), 1161\u20131176. https:\/\/doi.org\/10.1007\/s42235-022-00175-3","journal-title":"Journal of Bionic Engineering"},{"issue":"2","key":"1096_CR34","doi-asserted-by":"publisher","first-page":"572","DOI":"10.3390\/s22020572","volume":"22","author":"A Ali","year":"2022","unstructured":"Ali, A., Almaiah, M. A., Hajjej, F., Pasha, M. F., Fang, O. H., Khan, R., Teo, J., & Zakarya, M. (2022). An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors, 22(2), 572. https:\/\/doi.org\/10.3390\/s22020572","journal-title":"Sensors"},{"issue":"16","key":"1096_CR35","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.3390\/electronics10162034","volume":"10","author":"A Ali","year":"2021","unstructured":"Ali, A., Rahim, H. A., Pasha, M. F., Dowsley, R., Masud, M., Ali, J., & Baz, M. (2021). Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics, 10(16), 2034.","journal-title":"Electronics"},{"issue":"6","key":"1096_CR36","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.3390\/s22062112","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah, M. A., Ali, A., Hajjej, F., Pasha, M. F., & Alohali, M. A. (2022). A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things. Sensors, 22(6), 2112. https:\/\/doi.org\/10.3390\/s22062112","journal-title":"Sensors"},{"issue":"4","key":"1096_CR37","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.3390\/s22041448","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah, M. A., Hajjej, F., Ali, A., Pasha, M. F., & Almomani, O. (2022). A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors, 22(4), 1448.","journal-title":"Sensors"},{"key":"1096_CR38","unstructured":"Devi, K. G., & Devi. R. R. (2021). S2OPE security: Shuffle standard onetime padding encryption for improving secured data storage in decentralized cloud environment. Materials Today: Proceedings."},{"issue":"2","key":"1096_CR39","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1007\/s11277-017-4270-8","volume":"96","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Xu, C., Zhang, Y., & Jin, C. (2017). Efficient integrity verification scheme for medical data records in cloud-assisted wireless medical sensor networks. Wireless Personal Communications, 96(2), 1819\u20131833. https:\/\/doi.org\/10.1007\/s11277-017-4270-8","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"1096_CR40","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"W Shen","year":"2018","unstructured":"Shen, W., Qin, J., Yu, J., Hao, R., & Hu, J. (2018). Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Transactions on Information Forensics and Security, 14(2), 331\u2013346. https:\/\/doi.org\/10.1109\/TIFS.2018.2850312","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1096_CR41","unstructured":"Titus, O. J. (2022). Zero-knowledge proof and its application in enforcing scalability and data integrity on Blockchain. Medium. Retrieved September 27, 2022, from https:\/\/medium.com\/carthago\/zero-knowledge-proof-and-its-application-in-enforcing-scalability-and-data-integrity-on-blockchain-783253d27ecb"},{"key":"1096_CR42","doi-asserted-by":"publisher","unstructured":"Zhang, F., Fan, X., Lei, X., Wu, J., Song, J., Huang, J., Guo, J., & Tong, C. (2020). Zero knowledge proofs for cloud storage integrity checking. In 2020 39th Chinese control conference (CCC) (pp. 7661\u20137668). IEEE. https:\/\/doi.org\/10.23919\/CCC50068.2020.9189231","DOI":"10.23919\/CCC50068.2020.9189231"},{"key":"1096_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2021.100202","volume":"7","author":"J Xie","year":"2022","unstructured":"Xie, J., Zhu, M., Hu, K., Zhang, J., Hines, H., & Guo, Y. (2022). Frog calling activity detection using lightweight CNN with multi-view spectrogram: A case study on kroombit tinker frog. Machine Learning with Applications, 7, 100202. https:\/\/doi.org\/10.1016\/j.mlwa.2021.100202","journal-title":"Machine Learning with Applications"},{"key":"1096_CR44","doi-asserted-by":"publisher","first-page":"194303","DOI":"10.1109\/ACCESS.2020.3033757","volume":"8","author":"M Tubishat","year":"2020","unstructured":"Tubishat, M., Alswaitti, M., Mirjalili, S., Al-Garadi, M. A., & Rana, T. A. (2020). Dynamic butterfly optimization algorithm for feature selection. IEEE Access, 8, 194303\u2013194314. https:\/\/doi.org\/10.1109\/ACCESS.2020.3033757","journal-title":"IEEE Access"},{"issue":"3","key":"1096_CR45","doi-asserted-by":"publisher","first-page":"3998","DOI":"10.1007\/s11227-021-04015-9","volume":"78","author":"MJ Goldanloo","year":"2022","unstructured":"Goldanloo, M. J., & Gharehchopogh, F. S. (2022). A hybrid OBL-based firefly algorithm with symbiotic organisms search algorithm for solving continuous optimization problems. The Journal of Supercomputing, 78(3), 3998\u20134031.","journal-title":"The Journal of Supercomputing"},{"issue":"19","key":"1096_CR46","doi-asserted-by":"publisher","first-page":"16239","DOI":"10.1007\/s00521-022-06981-4","volume":"34","author":"T Ye","year":"2022","unstructured":"Ye, T., Wang, H., Wang, W., Zeng, T., Zhang, L., & Huang, Z. (2022). Artificial bee colony algorithm with an adaptive search manner and dimension perturbation. Neural Computing and Applications, 34(19), 16239\u201316253. https:\/\/doi.org\/10.1007\/s00521-022-06981-4","journal-title":"Neural Computing and Applications"},{"key":"1096_CR47","doi-asserted-by":"publisher","first-page":"52473","DOI":"10.1109\/ACCESS.2019.2911530","volume":"7","author":"Y Xue","year":"2019","unstructured":"Xue, Y., Tang, T., & Liu, A. X. (2019). Large-scale feedforward neural network optimization by a self-adaptive strategy and parameter based particle swarm optimization. IEEE Access, 7, 52473\u201352483. https:\/\/doi.org\/10.1109\/ACCESS.2019.2911530","journal-title":"IEEE Access"},{"key":"1096_CR48","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.comcom.2020.07.032","volume":"161","author":"C Iwendi","year":"2020","unstructured":"Iwendi, C., Moqurrab, S. A., Anjum, A., Khan, S., Mohan, S., & Srivastava, G. (2020). N-sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Computer Communications, 161, 160\u2013171. https:\/\/doi.org\/10.1016\/j.comcom.2020.07.032","journal-title":"Computer Communications"},{"issue":"7","key":"1096_CR49","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1007\/s12652-019-01335-w","volume":"11","author":"PL Lekshmy","year":"2020","unstructured":"Lekshmy, P. L., & Rahiman, M. A. (2020). A sanitization approach for privacy preserving data mining on social distributed environment. Journal of Ambient Intelligence and Humanized Computing, 11(7), 2761\u20132777. https:\/\/doi.org\/10.1007\/s12652-019-01335-w","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"1096_CR50","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.1016\/j.jksuci.2020.10.015","volume":"34","author":"D Ahamad","year":"2022","unstructured":"Ahamad, D., Hameed, S. A., & Akhtar, M. (2022). A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. Journal of King Saud University-Computer and Information Sciences, 34, 2343\u20132358.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"1096_CR51","unstructured":"Fatima, R. (2019). User privacy concerns extracted from research literature. Mendeley Data. Retrieved September 27, 2022, from https:\/\/data.mendeley.com\/datasets\/fxxjvj4z3g"},{"key":"1096_CR52","unstructured":"(2021). Jeju Special Self-Governing Province_Bus user information by daily route. https:\/\/www.data.go.kr\/en\/data\/15074260\/openapi.do"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01096-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-023-01096-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01096-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T04:32:48Z","timestamp":1710909168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-023-01096-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,19]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["1096"],"URL":"https:\/\/doi.org\/10.1007\/s11235-023-01096-0","relation":{"is-referenced-by":[{"id-type":"doi","id":"10.1038\/s41598-025-30638-6","asserted-by":"object"}]},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,19]]},"assertion":[{"value":"23 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}