{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T20:18:34Z","timestamp":1770495514376,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T00:00:00Z","timestamp":1678924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T00:00:00Z","timestamp":1678924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Key Industry Innovation Chain Project of Shaanxi Provincial Science and the Technology Department","award":["2022ZDLGY03-08"],"award-info":[{"award-number":["2022ZDLGY03-08"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Using differential privacy to provide privacy protection for classification algorithms has become a research hotspot in data mining. In this paper, we analyze the defects in the differentially private decision tree named Maxtree, and propose an improved model DPtree. DPtree can use the Fayyad theorem to process continuous features quickly, and can adjust privacy budget adaptively according to sample category distributions in leaf nodes. Moreover, to overcome the inevitable decline of classification ability of differentially private decision trees, we propose an ensemble learning model for DPtree, namely En-DPtree. In the voting process of En-DPtree, we propose a multi-population quantum genetic algorithm, and introduce immigration operators and elite groups to search the optimal weights for base classifiers. Experiments show that the performance of DPtree is better than Maxtree, and En-DPtree is always superior to other competitive algorithms.<\/jats:p>","DOI":"10.1007\/s40747-023-01017-3","type":"journal-article","created":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T09:03:43Z","timestamp":1678957423000},"page":"5267-5280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An ensemble learning model based on differentially private decision tree"],"prefix":"10.1007","volume":"9","author":[{"given":"Xufeng","family":"Niu","sequence":"first","affiliation":[]},{"given":"Wenping","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,16]]},"reference":[{"key":"1017_CR1","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.asoc.2014.11.039","volume":"28","author":"YY Li","year":"2015","unstructured":"Li YY, He HY, Wang Y, Xu X, Jiao LC (2015) An improved multiobjective estimation of distribution algorithm for environmental economic dispatch of hydrothermal power systems. Appl Soft Comput 28:559\u2013568. https:\/\/doi.org\/10.1016\/j.asoc.2014.11.039","journal-title":"Appl Soft Comput"},{"key":"1017_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00735-4","author":"C Xie","year":"2022","unstructured":"Xie C, Hua Q, Zhao J, Guo R, Yao H, Guo L (2022) Research on energy saving technology at mobile edge networks of IoTs based on big data analysis. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-022-00735-4","journal-title":"Complex Intell Syst"},{"key":"1017_CR3","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s40747-021-00348-3","volume":"8","author":"J Hu","year":"2022","unstructured":"Hu J, Ou X, Liang P, Li B (2022) Applying particle swarm optimization-based decision tree classifier for wart treatment selection. Complex Intell Syst 8:163\u2013177. https:\/\/doi.org\/10.1007\/s40747-021-00348-3","journal-title":"Complex Intell Syst"},{"key":"1017_CR4","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.asoc.2015.03.005","volume":"31","author":"YC Tsai","year":"2015","unstructured":"Tsai YC, Wang SL, Kao HY, Hong TP (2015) Edge types vs privacy in K-anonymization of shortest paths. Appl Soft Comput 31:348\u2013359. https:\/\/doi.org\/10.1016\/j.asoc.2015.03.005","journal-title":"Appl Soft Comput"},{"key":"1017_CR5","doi-asserted-by":"publisher","first-page":"7","DOI":"10.5120\/8632-2341","volume":"54","author":"P Kumar","year":"2012","unstructured":"Kumar P, Karthikeyan M (2012) $$L$$ Diversity on $$K$$-anonymity with external database for improving privacy preserving data publishing. Int J Comput Appl 54:7\u201313. https:\/\/doi.org\/10.5120\/8632-2341","journal-title":"Int J Comput Appl"},{"key":"1017_CR6","doi-asserted-by":"publisher","unstructured":"Li N, Li T, Venkatasubramanian S (2007) $$t$$-closeness: privacy beyond $$k$$-anonymity and $$l$$-diversity. In: Proceedings of the 23rd international conference on data engineering, pp 106\u2013115. https:\/\/doi.org\/10.1109\/ICDE.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1017_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) $$l$$-diversity: privacy beyond $$k$$-anonymity. ACM Trans Knowl Discovery Data 1:3. https:\/\/doi.org\/10.1145\/1217299.1217302","journal-title":"ACM Trans Knowl Discovery Data"},{"key":"1017_CR8","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.joems.2012.08.004","volume":"20","author":"KA Hashem","year":"2012","unstructured":"Hashem KA (2012) $$T$$-proximity compatible with $$T$$-neighbourhood structure. J Egypt Math Soc 20:108\u2013115. https:\/\/doi.org\/10.1016\/j.joems.2012.08.004","journal-title":"J Egypt Math Soc"},{"key":"1017_CR9","doi-asserted-by":"publisher","unstructured":"Ganta SR, Kasiviswanathan SP, Smith A (2008) Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, pp 265\u2013273. https:\/\/doi.org\/10.1145\/1401890.1401926","DOI":"10.1145\/1401890.1401926"},{"key":"1017_CR10","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1993077.1993080","volume":"5","author":"RCW Wong","year":"2011","unstructured":"Wong RCW, Fu AWC, Wang K, Yu PS, Pei J (2011) Can the utility of anonymized data be used for privacy breaches. ACM Trans Knowl Discovery Data 5:16. https:\/\/doi.org\/10.1145\/1993077.1993080","journal-title":"ACM Trans Knowl Discovery Data"},{"key":"1017_CR11","doi-asserted-by":"publisher","unstructured":"Dwork C (2006) Differential privacy. In: Proceedings of the 33th international colloquim on automata, languages and programming, pp 1-12. https:\/\/doi.org\/10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"key":"1017_CR12","doi-asserted-by":"publisher","unstructured":"Machanavajjhala A, Kifer D, Abowd J, Gehrke J, Vilhuber L (2008) Privacy: theory meets practice on the map. In: Proceedings of the 24th international conference on data engineering, pp 277\u2013286. https:\/\/doi.org\/10.1109\/ICDE.2008.4497436","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"1017_CR13","unstructured":"Greenberg A (2016) Apple\u2019s \u201cDifferential Privacy\u201d is about collecting your data-but not your data. https:\/\/www.wired.com\/2016\/06\/apples-differential-privacy-collecting-data\/. Accessed 13 June 2016"},{"key":"1017_CR14","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/3337064","volume":"52","author":"S Fletcher","year":"2020","unstructured":"Fletcher S, Islam MZ (2020) Decision tree classification with differential privacy: a survey. ACM Comput Surv 52:83. https:\/\/doi.org\/10.1145\/3337064","journal-title":"ACM Comput Surv"},{"key":"1017_CR15","doi-asserted-by":"publisher","unstructured":"Blum A, Dwork C, McSherry F, Nissim K (2005) Practical privacy: the sulq framework. In: Proceedings of the ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, pp 128\u2013138. https:\/\/doi.org\/10.1145\/1065167.1065184","DOI":"10.1145\/1065167.1065184"},{"key":"1017_CR16","doi-asserted-by":"publisher","unstructured":"McSherry FD (2009) Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the ACM SIGMOD international conference on management of data, pp 19-30. https:\/\/doi.org\/10.1145\/1559845.1559850","DOI":"10.1145\/1559845.1559850"},{"key":"1017_CR17","doi-asserted-by":"publisher","unstructured":"Friedman A, Schuster A (2010) Data mining with differential privacy. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery data mining, pp 493\u2013502. https:\/\/doi.org\/10.1145\/1835804.1835868","DOI":"10.1145\/1835804.1835868"},{"key":"1017_CR18","doi-asserted-by":"publisher","unstructured":"Mohammed N, Chen R, Fung BCM, Yu PS (2011) Differentially private data release for data mining. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, pp 493\u2013501. https:\/\/doi.org\/10.1145\/2020408.2020487","DOI":"10.1145\/2020408.2020487"},{"key":"1017_CR19","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.asoc.2017.09.010","volume":"62","author":"XQ Liu","year":"2018","unstructured":"Liu XQ, Li QM, Li T, Chen D (2018) Differentially private classification with decision tree ensemble. Appl Soft Comput 62:807\u2013816. https:\/\/doi.org\/10.1016\/j.asoc.2017.09.010","journal-title":"Appl Soft Comput"},{"key":"1017_CR20","doi-asserted-by":"publisher","unstructured":"Wu D, Wu T, Wu X (2020) A differentially private random decision tree classifier with high utility. In: Proceedings of the international conference on machine learning for cyber security, pp 378-385. https:\/\/doi.org\/10.1007\/978-3-030-62223-7_32","DOI":"10.1007\/978-3-030-62223-7_32"},{"key":"1017_CR21","doi-asserted-by":"publisher","unstructured":"Jagannathan G, Pillaipakkamnatt K, Wright RN (2009) A practical differentially private random decision tree classifier. In: Proceedings of the IEEE international conference on data mining workshops, pp 114\u2013121. https:\/\/doi.org\/10.1109\/ICDMW.2009.93","DOI":"10.1109\/ICDMW.2009.93"},{"key":"1017_CR22","doi-asserted-by":"publisher","unstructured":"Fletcher S, Islam MZ (2015) A differentially private decision forest. In: Proceedings of the 13th Australasian data mining conference, pp 99\u2013108. https:\/\/doi.org\/10.1007\/978-3-319-26350-2_17","DOI":"10.1007\/978-3-319-26350-2_17"},{"key":"1017_CR23","doi-asserted-by":"publisher","unstructured":"Fletcher S, Islam MZ (2015) A differentially private random decision forest using reliable signal-to-noise ratios. In: Proceeding of the 28th Australasian joint conference on artificial intelligence, pp 192\u2013203. https:\/\/doi.org\/10.1007\/978-3-319-26350-2_17","DOI":"10.1007\/978-3-319-26350-2_17"},{"key":"1017_CR24","doi-asserted-by":"publisher","unstructured":"Patil A, Singh S (2014) Differential private random forest. In: Proceeding of the international conference on advances in computing, pp 2623\u20132630. https:\/\/doi.org\/10.1109\/ICACCI.2014.6968348","DOI":"10.1109\/ICACCI.2014.6968348"},{"key":"1017_CR25","doi-asserted-by":"publisher","first-page":"62815","DOI":"10.1109\/ACCESS.2018.2877137","volume":"6","author":"Y Yin","year":"2018","unstructured":"Yin Y, Chen L, Wan J, Xu Y (2018) Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6:62815\u201362825. https:\/\/doi.org\/10.1109\/ACCESS.2018.2877137","journal-title":"IEEE Access"},{"key":"1017_CR26","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10618-006-0051-9","volume":"14","author":"S Gambs","year":"2007","unstructured":"Gambs S, Kegl B, Aimeur E (2007) Privacy-preserving boosting. Data Min Knowl Discov 14:131\u2013170. https:\/\/doi.org\/10.1007\/s10618-006-0051-9","journal-title":"Data Min Knowl Discov"},{"key":"1017_CR27","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.ins.2015.10.011","volume":"330","author":"L Yan","year":"2016","unstructured":"Yan L, Bai C, Reddy CK (2016) A distributed ensemble approach for mining healthcare data under privacy constraints. Inf Sci 330:245\u2013259. https:\/\/doi.org\/10.1016\/j.ins.2015.10.011","journal-title":"Inf Sci"},{"key":"1017_CR28","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3233\/WEB-180374","volume":"16","author":"T Xiang","year":"2018","unstructured":"Xiang T, Li Y, Li X, Zhong S, Yu S (2018) Collaborative ensemble learning under differential privacy. Web Intell 16:73\u201387. https:\/\/doi.org\/10.3233\/WEB-180374","journal-title":"Web Intell"},{"key":"1017_CR29","doi-asserted-by":"publisher","unstructured":"Li Q, Wu Z, Wen Z, He B (2020) Privacy-preserving gradient boosting decision trees. In: Proceeding of the thirty-fourth AAAI conference on artificial intelligence, pp 784\u2013791. https:\/\/doi.org\/10.48550\/arXiv.1911.04209","DOI":"10.48550\/arXiv.1911.04209"},{"key":"1017_CR30","unstructured":"Shen S (2017) Research on classification algorithm of differential privacy protection. M.S. thesis, Nanjing Aerosp. Univ., Nanjing, China"},{"key":"1017_CR31","doi-asserted-by":"publisher","first-page":"93499","DOI":"10.1109\/ACCESS.2020.2995058","volume":"8","author":"J Jia","year":"2020","unstructured":"Jia J, Qiu W (2020) Research on an ensemble classification algorithm based on differential privacy. IEEE Access 8:93499\u201393513. https:\/\/doi.org\/10.1109\/ACCESS.2020.2995058","journal-title":"IEEE Access"},{"key":"1017_CR32","doi-asserted-by":"publisher","unstructured":"Dwork C, McSherry F, Nissim K, Smith AD (2006) Calibrating noise to sensitivity in private data analysis. In: Proceeding of the 3rd theory of cryptography conference on theory of cryptography, pp 265\u2013284. https:\/\/doi.org\/10.1007\/11681878_14","DOI":"10.1007\/11681878_14"},{"key":"1017_CR33","doi-asserted-by":"publisher","unstructured":"McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Proceeding of the 48th annual IEEE symposium on foundations of computer science, pp 94\u2013103. https:\/\/doi.org\/10.1109\/FOCS.2007.66","DOI":"10.1109\/FOCS.2007.66"},{"key":"1017_CR34","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/j.asoc.2020.106500","volume":"94","author":"S Sundaramurthy","year":"2020","unstructured":"Sundaramurthy S, Jayavel P (2020) A hybrid grey wolf optimization and particle swarm optimization with C4.5 approach for prediction of rheumatoid arthritis. Appl Soft Comput 94:1065. https:\/\/doi.org\/10.1016\/j.asoc.2020.106500","journal-title":"Appl Soft Comput"},{"key":"1017_CR35","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/64.539013","volume":"11","author":"UM Feyyad","year":"1996","unstructured":"Feyyad UM (1996) Data mining and knowledge discovery: making sense out of data. IEEE Expert 11:20\u201325. https:\/\/doi.org\/10.1109\/64.539013","journal-title":"IEEE Expert"},{"key":"1017_CR36","doi-asserted-by":"publisher","unstructured":"McSherry FD (2009) Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceeding of the ACM SIGMOD international conference on management of data, pp 19\u201330. https:\/\/doi.org\/10.1145\/1559845.1559850","DOI":"10.1145\/1559845.1559850"},{"key":"1017_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00809-3","author":"S Shafieian","year":"2022","unstructured":"Shafieian S, Zulkernine M (2022) Multi-layer stacking ensemble learners for low footprint network intrusion detection. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-022-00809-3","journal-title":"Complex Intell Syst"},{"key":"1017_CR38","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s40747-020-00195-8","volume":"7","author":"L Lin","year":"2021","unstructured":"Lin L, Wu C, Ma L (2021) A genetic algorithm for the fuzzy shortest path problem in a fuzzy network. Complex Intell Syst 7:225\u2013234. https:\/\/doi.org\/10.1007\/s40747-020-00195-8","journal-title":"Complex Intell Syst"},{"key":"1017_CR39","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.asoc.2017.03.018","volume":"56","author":"YY Li","year":"2017","unstructured":"Li YY, Bai XY, Jiao LC, Xue Y (2017) Partitioned-cooperative quantum-behaved particle swarm optimization based on multilevel thresholding applied to medical image segmentation. Appl Soft Comput 56:345\u2013356. https:\/\/doi.org\/10.1016\/j.asoc.2017.03.018","journal-title":"Appl Soft Comput"},{"key":"1017_CR40","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.neucom.2019.07.026","volume":"362","author":"YY Li","year":"2019","unstructured":"Li YY, Xiao JJ, Chen YQ, Jiao LC (2019) Evolving deep convolutional neural networks by quantum behaved particle swarm optimization with binary encoding for image classification. Neurocomputing 362:156\u2013165. https:\/\/doi.org\/10.1016\/j.neucom.2019.07.026","journal-title":"Neurocomputing"},{"key":"1017_CR41","doi-asserted-by":"publisher","unstructured":"SinghKirar J, Agrawal RK (2020) A combination of spectral graph theory and quantum genetic algorithm to find relevant set of electrodes for motor imagery classification. Appl Soft Comput 97:105519. https:\/\/doi.org\/10.1016\/j.asoc.2019.105519","DOI":"10.1016\/j.asoc.2019.105519"},{"key":"1017_CR42","unstructured":"Lichman M (2013) UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01017-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01017-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01017-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T17:18:24Z","timestamp":1695403104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01017-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,16]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["1017"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01017-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,16]]},"assertion":[{"value":"4 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}