{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T11:53:04Z","timestamp":1767959584426,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:00:00Z","timestamp":1767916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:00:00Z","timestamp":1767916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04572-3","type":"journal-article","created":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T10:30:42Z","timestamp":1767954642000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ARFO-HBA: An Adaptive Red Fox Optimization Framework with Heap-Based Bucketization for Privacy-Preserving Data Publishing"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0830-9742","authenticated-orcid":false,"given":"S.","family":"Harihara Gopalan","sequence":"first","affiliation":[]},{"given":"V.","family":"Vignesh","sequence":"additional","affiliation":[]},{"given":"D.","family":"Sivaganesan","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Sivaraju","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,9]]},"reference":[{"key":"4572_CR1","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s11036-007-0017-1","volume":"12","author":"U Varshney","year":"2007","unstructured":"Varshney U. Pervasive healthcare and wireless health monitoring. Mob Netw Appl. 2007;12:113\u201327. https:\/\/doi.org\/10.1007\/s11036-007-0017-1.","journal-title":"Mob Netw Appl"},{"key":"4572_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/JBHI.2013.2262659","volume":"18","author":"A Benharref","year":"2014","unstructured":"Benharref A, Serhani MA. Novel cloud and SOA-based framework for e-health monitoring using wireless biosensors. IEEE J Biomed Health Inform. 2014;18:46\u201355. https:\/\/doi.org\/10.1109\/JBHI.2013.2262659.","journal-title":"IEEE J Biomed Health Inform"},{"key":"4572_CR3","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.ijmedinf.2007.09.001","volume":"77","author":"K H\u00e4yrinen","year":"2008","unstructured":"H\u00e4yrinen K, Saranto K, Nyk\u00e4nen P. Definition, structure, content, use and impacts of electronic health records: a review of the research literature. Int J Med Inform. 2008;77:291\u2013304. https:\/\/doi.org\/10.1016\/j.ijmedinf.2007.09.001.","journal-title":"Int J Med Inform"},{"key":"4572_CR4","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1056\/NEJMsa0900592","volume":"360","author":"AK Jha","year":"2009","unstructured":"Jha AK, DesRoches CM, Campbell EG, Donelan K, Rao SR, Ferris TG, et al. Use of electronic health records in U.S. hospitals. N Engl J Med. 2009;360:1628\u201338. https:\/\/doi.org\/10.1056\/NEJMsa0900592.","journal-title":"N Engl J Med"},{"key":"4572_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.csite.2024.104867","volume":"61","author":"M Arun","year":"2024","unstructured":"Arun M, Gopan G, Vembu S, Ozsahin DU, Ahmad H, Alotaibi MF. Internet of things and deep learning-enhanced monitoring for energy efficiency in older buildings. Case Stud Therm Eng. 2024;61:104867.","journal-title":"Case Stud Therm Eng"},{"key":"4572_CR6","doi-asserted-by":"crossref","unstructured":"Andrew J, Karthikeyan J, Jebastin J. Privacy preserving big data publication on cloud using mondrian anonymization techniques and deep neural networks. In: 2019 5th International Conference on Advanced Computing and Communication Systems. (2019). pp. 722\u20137.","DOI":"10.1109\/ICACCS.2019.8728384"},{"issue":"3","key":"4572_CR7","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/JBHI.2020.2995836","volume":"25","author":"ZSH Abad","year":"2021","unstructured":"Abad ZSH, Maslove DM, Lee J. Predicting discharge destination of critically ill patients using machine learning. IEEE J Biomed Health Inform. 2021;25(3):827\u201337.","journal-title":"IEEE J Biomed Health Inform"},{"issue":"2","key":"4572_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/s22020415","volume":"22","author":"N Subramani","year":"2022","unstructured":"Subramani N, Mohan P, Alotaibi Y, Alghamdi S, Khalaf OI. An efficient metaheuristic-based clustering with routing protocol for underwater wireless sensor networks. Sensors. 2022;22(2):415. https:\/\/doi.org\/10.3390\/s22020415.","journal-title":"Sensors"},{"issue":"1","key":"4572_CR9","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TCC.2018.2854790","volume":"9","author":"M Ali","year":"2021","unstructured":"Ali M, Abbas A, Khan MUS, Khan SU. SeSPHR: a methodology for secure sharing of personal health records in the cloud. IEEE Trans Cloud Comput. 2021;9(1):347\u201359.","journal-title":"IEEE Trans Cloud Comput"},{"key":"4572_CR10","doi-asserted-by":"publisher","first-page":"51071","DOI":"10.1109\/ACCESS.2020.2980235","volume":"8","author":"A Zigomitros","year":"2020","unstructured":"Zigomitros A, Casino F, Solanas A, Patsakis C. A survey on privacy properties for data publishing of relational data. IEEE Access. 2020;8:51071\u201399.","journal-title":"IEEE Access"},{"key":"4572_CR11","doi-asserted-by":"publisher","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","volume":"9","author":"A Majeed","year":"2021","unstructured":"Majeed A, Lee S. Anonymization techniques for privacy preserving data publishing: a comprehensive survey. IEEE Access. 2021;9:8512\u201345. https:\/\/doi.org\/10.1109\/ACCESS.2020.3045700.","journal-title":"IEEE Access"},{"key":"4572_CR12","unstructured":"Stadler A. \u2018\u2018The health insurance portability and accountability act and its impact on privacy and confidentiality in healthcare, impact of HIPAA on confidentiality,\u2019\u2019 M.S. thesis, School Health Sci., Liberty Univ., Lynchburg, VA, USA, 2021."},{"issue":"5","key":"4572_CR13","first-page":"1","volume":"57","author":"W Ali","year":"2025","unstructured":"Ali W, Zhou X, Shao J. Privacy-preserved and responsible recommenders: from conventional defense to federated learning and blockchain. ACM-CSUR. 2025;57(5):1\u201335.","journal-title":"ACM-CSUR"},{"key":"4572_CR14","doi-asserted-by":"crossref","unstructured":"Lee YJ, Lee KH. Re-identification of medical records by optimum quasi-identifiers, in 2017 19th international conference on advanced communication technology (ICACT), pp. 428\u2013435, PyeongChang, Korea, 2017.","DOI":"10.23919\/ICACT.2017.7890125"},{"key":"4572_CR15","doi-asserted-by":"crossref","unstructured":"Bampoulidis A, Markopoulos I, Lupu M. PrioPrivacy: a local recoding -anonymity tool for prioritised qasi-identifiers, in IEEE\/WIC\/ACM International Conference on Web Intelligence - Companion Volume, pp. 314\u2013317, ACM: New York, 2019.","DOI":"10.1145\/3358695.3360918"},{"key":"4572_CR16","volume-title":"Impact of Quasi-identifiers on anonymization","author":"G Kaur","year":"2019","unstructured":"Kaur G, Agrawal S. Differential privacy framework. in Impact of Quasi-identifiers on anonymization. Volume 46. Singapore: Springer; 2019."},{"issue":"22","key":"4572_CR17","doi-asserted-by":"publisher","first-page":"10740","DOI":"10.3390\/app112210740","volume":"11","author":"JW Kim","year":"2021","unstructured":"Kim JW. Efficiently supporting online privacy-preserving data publishing in a distributed computing environment. Appl Sci. 2021;11(22):10740. https:\/\/doi.org\/10.3390\/app112210740.","journal-title":"Appl Sci"},{"issue":"3","key":"4572_CR18","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TST.2015.7128936","volume":"20","author":"Q Liu","year":"2015","unstructured":"Liu Q, Shen H, Sang Y. Privacy-preserving data publishing for multiple numerical sensitive attributes. Tsinghua Sci Technol. 2015;20(3):246\u201354. https:\/\/doi.org\/10.1109\/TST.2015.7128936.","journal-title":"Tsinghua Sci Technol"},{"key":"4572_CR19","doi-asserted-by":"publisher","unstructured":"Widodo W, Wibowo WC. \u2018\u2018A distributional model of sensitive values on p-sensitive in multiple sensitive attributes,\u2019\u2019 in Proc. 2nd Int. Conf. Informat. Comput. Sci. (ICICoS), Semarang, Indonesia, Oct. 2018, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICICOS.2018.8621698","DOI":"10.1109\/ICICOS.2018.8621698"},{"key":"4572_CR20","doi-asserted-by":"publisher","unstructured":"Lin JCW, Fournier-Viger P, Liu Q, Djenouri Y, Zhang J. \u2018Anonymization of multiple and personalized sensitive attributes. in Proc. 20th Int. Conf. Big Data Analytics Knowl. Discovery, Regensburg, Germany, Sep. 2018, pp. 204\u2013215. https:\/\/doi.org\/10.1007\/978-3-319-98539-8_16","DOI":"10.1007\/978-3-319-98539-8_16"},{"issue":"10","key":"4572_CR21","doi-asserted-by":"publisher","first-page":"5127","DOI":"10.1007\/s11227-018-2390-x","volume":"74","author":"A Anjum","year":"2018","unstructured":"Anjum A, Ahmad N, Malik SUR, Zubair S, Shahzad B. An efficient approach for publishing microdata for multiple sensitive attributes. J Supercomput. 2018;74(10):5127\u201355.","journal-title":"J Supercomput"},{"key":"4572_CR22","first-page":"6175","volume":"8342","author":"KS Varsha","year":"2025","unstructured":"Varsha KS. Enhancing data security and privacy through advanced encryption tech-niques secure storage and privacy-preserving analytics. J ID. 2025;8342:6175.","journal-title":"J ID"},{"key":"4572_CR23","doi-asserted-by":"publisher","first-page":"1236947","DOI":"10.3389\/frai.2024.1236947","volume":"7","author":"S Saifullah","year":"2024","unstructured":"Saifullah S, Mercier D, Lucieri A, Dengel A, Ahmed S. The privacy-explainability trade-off: unraveling the impacts of differential privacy and federated learning on attribution methods. Front Artif Intell. 2024;7:1236947.","journal-title":"Front Artif Intell"},{"issue":"3","key":"4572_CR24","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1007\/s10207-024-00838-8","volume":"23","author":"S Karagiannis","year":"2024","unstructured":"Karagiannis S, Ntantogian C, Magkos E, Tsohou A, Ribeiro LL. Mastering data privacy: leveraging K-anonymity for robust health data sharing. Int J Inf Secur. 2024;23(3):2189\u2013201.","journal-title":"Int J Inf Secur"},{"key":"4572_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127584","volume":"279","author":"D Dhinakaran","year":"2025","unstructured":"Dhinakaran D, Kumar NJ, Ponnuviji NP. Safeguarding confidentiality and privacy in cloud-enabled healthcare systems with spectrasafe encryption and dynamic k-anonymity algorithm. Expert Syst Appl. 2025;279:127584.","journal-title":"Expert Syst Appl"},{"key":"4572_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.applthermaleng.2018.04.008","volume":"137","author":"Hossein Khodaei","year":"2018","unstructured":"Khodaei Hossein, et al. Fuzzy-based heat and power hub models for cost-emission operation of an industrial consumer using compromise programming. Appl Therm Eng. 2018;137:395e405.","journal-title":"Appl Therm Eng"},{"issue":"8","key":"4572_CR27","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.1109\/tcyb.2020.3008280","volume":"51","author":"J-Y Li","year":"2021","unstructured":"Li J-Y, Zhan Z-H, Wang H, Zhang J. Data-driven evolutionary algorithm with perturbation-based ensemble surrogates. IEEE Trans Cybern. 2021;51(8):3925\u201337. https:\/\/doi.org\/10.1109\/tcyb.2020.3008280.","journal-title":"IEEE Trans Cybern"},{"issue":"3","key":"4572_CR28","first-page":"1945","volume":"9","author":"V Arul","year":"2019","unstructured":"Arul V, Vairavel C, Prakash M, Kousik NV. Privacy preservation of micro data publishing using fragmentation. J Soft Comput. 2019;9(3):1945\u20139.","journal-title":"J Soft Comput"},{"issue":"4","key":"4572_CR29","doi-asserted-by":"publisher","DOI":"10.3390\/s22041618","volume":"22","author":"P Mohan","year":"2022","unstructured":"Mohan P, Subramani N, Alotaibi Y, Alghamdi S, Khalaf OI, Ulaganathan S. Improved metaheuristics-based clustering with multihop routing protocol for underwater wireless sensor networks. Sensors. 2022;22(4):1618.","journal-title":"Sensors"},{"issue":"2","key":"4572_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10462-024-11036-2","volume":"58","author":"G Nguyen","year":"2024","unstructured":"Nguyen G, S\u00e1inz-Pardo D\u00edaz J, Calatrava A, Berberi L, Lytvyn O, Kozlov V, L\u00f3pez Garc\u00eda \u00c1. Landscape of machine learning evolution: privacy-preserving federated learning frameworks and tools. Artif Intell Rev. 2024;58(2):51.","journal-title":"Artif Intell Rev"},{"key":"4572_CR31","first-page":"218e25","volume":"4","author":"A Gholamreza","year":"2018","unstructured":"Gholamreza A, Noradin G. Multi-objective energy management in a micro-grid. Energy Rep. 2018;4:218e25.","journal-title":"Energy Rep"},{"key":"4572_CR32","first-page":"18e30","volume":"139","author":"W Liu Yang","year":"2017","unstructured":"Liu Yang W, Wei G, Noradin. Electricity load forecasting by an improved forecast engine for Building level consumers. Energy. 2017;139:18e30.","journal-title":"Energy"},{"issue":"5","key":"4572_CR33","first-page":"447e50","volume":"37","author":"Ghadimi Noradin","year":"2014","unstructured":"Ghadimi Noradin. MDE with considered different load scenarios for solving optimal location and sizing of shunt capacitors. Natl Acad Sci Lett. 2014;37(5):447e50.","journal-title":"Natl Acad Sci Lett"},{"issue":"1","key":"4572_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. L-diversity: privacy beyond K-anonymity. ACM Trans Knowl Discov Data. 2007;1(1):1\u201312.","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"3","key":"4572_CR35","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1080\/03081079.2023.2173749","volume":"52","author":"O Vovk","year":"2023","unstructured":"Vovk O, Piho G, Ross P. Methods and tools for healthcare data anonymization: a literature review. Int J Gen Syst. 2023;52(3):326\u201342. https:\/\/doi.org\/10.1080\/03081079.2023.2173749.","journal-title":"Int J Gen Syst"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04572-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04572-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04572-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T10:30:44Z","timestamp":1767954644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04572-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,9]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["4572"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04572-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,9]]},"assertion":[{"value":"28 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies involving animals performed and any studies involving human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human Participants and\/or Animals"}},{"value":"There is no human or animal sample was involved in this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"81"}}