{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:26:44Z","timestamp":1770337604567,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T00:00:00Z","timestamp":1677196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangxi Natural Science Foundation","award":["2020GXNSFBA297103"],"award-info":[{"award-number":["2020GXNSFBA297103"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862007"],"award-info":[{"award-number":["61862007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,24]]},"DOI":"10.1145\/3596871.3596880","type":"proceedings-article","created":{"date-parts":[[2023,7,20]],"date-time":"2023-07-20T16:23:49Z","timestamp":1689870229000},"page":"52-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Differential privacy protection method for decision tree ensemble model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2322-9831","authenticated-orcid":false,"given":"Xia","family":"Qin","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Guangxi Minzu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6872-7933","authenticated-orcid":false,"given":"Lina","family":"Ge","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Guangxi Minzu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7528-1180","authenticated-orcid":false,"given":"Jie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Guangxi Minzu University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.21629\/JSEE.2017.01.19"},{"key":"e_1_3_2_1_4_1","unstructured":"Yang Chen Shoujian Yu. 2017. Research on differential privacy for decision tree release technology.Computer And Modernization (3):59-64.  Yang Chen Shoujian Yu. 2017. Research on differential privacy for decision tree release technology.Computer And Modernization (3):59-64."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101930"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.6.3.88-95"},{"key":"e_1_3_2_1_7_1","volume-title":"Differential Privacy: What is all the noise about?. arXiv preprint arXiv:2205.09453","author":"Danger Roxana","year":"2022","unstructured":"Roxana Danger . 2022 . Differential Privacy: What is all the noise about?. arXiv preprint arXiv:2205.09453 Roxana Danger. 2022. Differential Privacy: What is all the noise about?. arXiv preprint arXiv:2205.09453"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_10_1","first-page":"1026","article-title":"ESA: A Novel Privacy Preserving Framework","volume":"20210608","author":"Leixia Wang","year":"2021","unstructured":"Wang Leixia and Meng Xiaofeng . 2021 . ESA: A Novel Privacy Preserving Framework . Journal of Computer Research and Development. https:\/\/kns.cnki.net\/kcms\/detail\/11.1777.TP. 20210608 . 1026 .006.html Wang Leixia and Meng Xiaofeng. 2021. ESA: A Novel Privacy Preserving Framework. Journal of Computer Research and Development. https:\/\/kns.cnki.net\/kcms\/detail\/11.1777.TP.20210608.1026.006.html","journal-title":"Journal of Computer Research and Development. https:\/\/kns.cnki.net\/kcms\/detail\/11.1777.TP."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"issue":"04","key":"e_1_3_2_1_14_1","first-page":"927","article-title":"Differential privacy in data publication and analysis","volume":"37","author":"Xiaojian Zhang","year":"2014","unstructured":"Zhang Xiaojian and Meng Xiaofeng . 2014 . Differential privacy in data publication and analysis . Chinese Journal of Computers , 37 ( 04 ): 927 - 949 . Zhang Xiaojian and Meng Xiaofeng. 2014. Differential privacy in data publication and analysis. Chinese Journal of Computers, 37(04):927-949.","journal-title":"Chinese Journal of Computers"},{"key":"e_1_3_2_1_15_1","volume-title":"Jian Pei and Hanghang Tong","author":"Han Jiawei","year":"2022","unstructured":"Jiawei Han , Jian Pei and Hanghang Tong . 2022 . Data mining: concepts and techniques. Morgan kaufmann. Jiawei Han, Jian Pei and Hanghang Tong. 2022. Data mining: concepts and techniques. Morgan kaufmann."},{"key":"e_1_3_2_1_16_1","volume-title":"5: programs for machine learning","author":"Quinlan J R.","unstructured":"Quinlan J R. 2014. C4. 5: programs for machine learning . Elsevier . Quinlan J R. 2014. C4. 5: programs for machine learning. Elsevier."},{"issue":"3","key":"e_1_3_2_1_17_1","first-page":"358","article-title":"Classification and regression trees (CART)","volume":"40","author":"Li B","year":"1984","unstructured":"B Li , J Friedman , R Olshen and C Stone . 1984 . Classification and regression trees (CART) . Biometrics , 40 ( 3 ): 358 - 361 . B Li, J Friedman, R Olshen and C Stone. 1984. Classification and regression trees (CART). Biometrics, 40(3): 358-361.","journal-title":"Biometrics"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2006.11.010"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/insr.12016"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171341"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5422"}],"event":{"name":"ICCBN 2023: 2023 11th International Conference on Communications and Broadband Networking","location":"Xi'an China","acronym":"ICCBN 2023"},"container-title":["Proceedings of the 2023 11th International Conference on Communications and Broadband Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596871.3596880","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3596871.3596880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:47Z","timestamp":1750182527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596871.3596880"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,24]]},"references-count":21,"alternative-id":["10.1145\/3596871.3596880","10.1145\/3596871"],"URL":"https:\/\/doi.org\/10.1145\/3596871.3596880","relation":{},"subject":[],"published":{"date-parts":[[2023,2,24]]},"assertion":[{"value":"2023-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}