{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:52:32Z","timestamp":1769921552365,"version":"3.49.0"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Eng. Manage."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tem.2021.3098463","type":"journal-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T20:26:33Z","timestamp":1628108793000},"page":"2732-2746","source":"Crossref","is-referenced-by-count":20,"title":["Analysis of Subfeature for Classification in Data Mining"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9712-7280","authenticated-orcid":false,"given":"Hemanta Kumar","family":"Bhuyan","sequence":"first","affiliation":[{"name":"Department of Information Technology, Vignan&#x0027;s Foundation for Science, Technology and Research (Deemed to be University), Guntur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6873-6469","authenticated-orcid":false,"given":"Vinayakumar","family":"Ravi","sequence":"additional","affiliation":[{"name":"Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/0305215X.2021.1922897"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CSB.2003.1227396"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.029"},{"key":"ref34","first-page":"424","article-title":"An approach for privacy preservation of distributed data in peer-to-peer network using multiparty computation","volume":"3","author":"bhuyan","year":"2011","journal-title":"Int J Comput Sci Issues"},{"key":"ref15","first-page":"71","article-title":"Unsupervised feature subset selection","author":"s\u00f8ndberg-madsen","year":"2003","journal-title":"Proc Workshop Probabilistic Graph Models Classification"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/34.990133"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.531"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2455509"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.97.18.10101"},{"key":"ref11","first-page":"2138","article-title":"Clustering-guided sparse structural learning for unsupervised feature selection","volume":"26","author":"li","year":"2013","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref33","first-page":"434","article-title":"Privacy preserving for feature selection in data mining using centralized network","volume":"9","author":"bhuyan","year":"2012","journal-title":"Int J Comput Sci Issues"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl214"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"297","DOI":"10.4156\/ijact.vol4.issue1.34","article-title":"Privacy preservation with penalty in decentralized network using multiparty computation","volume":"4","author":"bhuyan","year":"2012","journal-title":"International Journal of Advancements in Computing Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2877746"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2875712"},{"key":"ref17","first-page":"507","article-title":"Laplacian score for feature selection","author":"he","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2878698"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339673"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2007.4295533"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2865778"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835848"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2892363"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2868836"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0643-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2504420"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2864732"},{"key":"ref42","year":"2021"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TNSE.2021.3059881","article-title":"CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU","volume":"8","author":"rehman","year":"2021","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2904662"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2019.2901634"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2018.8553763"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2021.3065699"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0024259"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-9-425"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2010.2044189"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2426703"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2879797"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.06.060"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-014-0393-9"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2904256"}],"container-title":["IEEE Transactions on Engineering Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/17\/10155273\/09507052.pdf?arnumber=9507052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:01:20Z","timestamp":1689015680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9507052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":42,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tem.2021.3098463","relation":{},"ISSN":["0018-9391","1558-0040"],"issn-type":[{"value":"0018-9391","type":"print"},{"value":"1558-0040","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}