{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:58:47Z","timestamp":1776445127051,"version":"3.51.2"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11771012"],"award-info":[{"award-number":["11771012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1811461"],"award-info":[{"award-number":["U1811461"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CMMI-1536398"],"award-info":[{"award-number":["CMMI-1536398"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["71731009"],"award-info":[{"award-number":["71731009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["71433001"],"award-info":[{"award-number":["71433001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["71732006"],"award-info":[{"award-number":["71732006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["71722014"],"award-info":[{"award-number":["71722014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["2018WZDXM020"],"award-info":[{"award-number":["2018WZDXM020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/tnnls.2020.2996972","type":"journal-article","created":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T20:30:41Z","timestamp":1591993841000},"page":"2105-2116","source":"Crossref","is-referenced-by-count":26,"title":["Privacy-Preserving Cost-Sensitive Learning"],"prefix":"10.1109","volume":"32","author":[{"given":"Yi","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3054-5629","authenticated-orcid":false,"given":"Shuai","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7150-0844","authenticated-orcid":false,"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9225-0477","authenticated-orcid":false,"given":"Xiangyu","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1309","article-title":"Differential privacy preservation for deep auto-encoders: An application of human behavior prediction","author":"phan","year":"2016","journal-title":"Proc 13th AAAI Conf Artif Intell"},{"key":"ref38","first-page":"118","article-title":"Differentially private learning with kernels","author":"jain","year":"2013","journal-title":"Proc 13th Int Conf Mach Learn"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.02.014"},{"key":"ref32","first-page":"545","article-title":"Result analysis of the nips 2003 feature selection challenge","author":"guyon","year":"2004","journal-title":"Proc 17th Int Conf Neural Inf Process Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/0916069"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm579"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.12.023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2013.2245674"},{"key":"ref35","author":"dheeru","year":"2017","journal-title":"UCI Machine Learning Repository"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"ref10","first-page":"2722","article-title":"Differentially private empirical risk minimization revisited: Faster and more general","author":"wang","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst 30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref12","first-page":"478","article-title":"Differentially private learning of undirected graphical models using collective graphical models","author":"bernstein","year":"2017","journal-title":"Proc 34th Int Conf Mach Learn"},{"key":"ref13","first-page":"32","article-title":"The price of differential privacy for online learning","author":"agarwal","year":"2017","journal-title":"Proc 34th Int Conf Mach Learn"},{"key":"ref14","first-page":"289","article-title":"Privacy-preserving logistic regression","author":"chaudhuri","year":"2008","journal-title":"Proc 32nd Int Conf Neural Inf Process Syst"},{"key":"ref15","first-page":"1069","article-title":"Differentially private empirical risk minimization","volume":"12","author":"chaudhuri","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref16","first-page":"97","article-title":"Adacost: Misclassification cost-sensitive boosting","author":"fan","year":"1999","journal-title":"Proc 16th Int Conf Mach Learn"},{"key":"ref17","first-page":"983","article-title":"A comparative study of cost-sensitive boosting algorithms","author":"ting","year":"2000","journal-title":"Proc 17th Int Conf Mach Learn"},{"key":"ref18","first-page":"1713","article-title":"Considering cost asymmetry in learning classifiers","volume":"7","author":"bach","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2578326"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015332"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.71"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref3","first-page":"3313","article-title":"Maximum likelihood in cost-sensitive learning: Model specification, approximations, and upper bounds","volume":"11","author":"dmochowski","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref6","first-page":"973","article-title":"The foundations of cost-sensitive learning","author":"elkan","year":"2001","journal-title":"Proc 17th Int Joint Conf Artif Intell"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000001370"},{"key":"ref5","first-page":"239","article-title":"Exploiting the cost (in)sensitivity of decision tree splitting criteria","author":"drummond","year":"2000","journal-title":"Proc 17th Int Conf Mach Learn"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2015.05.030"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2271535"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.009"},{"key":"ref9","first-page":"6343","article-title":"Distributed learning without distress: Privacy-preserving empirical risk minimization","author":"jayaraman","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/int.20049"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.spl.2004.03.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/S1110724303210032"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45435-7_22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1198\/016214505000000907"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1214\/12-EJS699"},{"key":"ref25","author":"duda","year":"2001","journal-title":"Pattern Classification"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/5962385\/9420773\/9115837-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/9420773\/09115837.pdf?arnumber=9115837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:16Z","timestamp":1652194396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9115837\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":39,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2020.2996972","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5]]}}}