{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:47:25Z","timestamp":1759092445522,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772282","61772454","61811530332"],"award-info":[{"award-number":["61772282","61772454","61811530332"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Human-centric computing is becoming an important part of data-driven artificial intelligence (AI) and the importance of data mining under Human-centric computing is getting more and more attention. The rapid development of machine learning has gradually increased its ability to mine data. In this paper, privacy protection is combined with machine learning, in which a logistic regression is adopted for local differential privacy protection to achieves classification task utilizing noise addition and feature selection. The design idea is mainly divided into three parts: noise addition, feature selection and logistic regression. In the part of noise addition, the way of adding noise using Laplace mechanism to original data achieves the purpose of disturbing data. The part of feature selection is to highlight the impact of noised data on the classifier. The part of logistic regression is to use logistic regression to implement classification task. The experimental results show that an accuracy of 85.7% can be achieved for the privacy data by choosing appropriate regularization coefficients.<\/jats:p>","DOI":"10.1186\/s13673-019-0195-4","type":"journal-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T07:03:20Z","timestamp":1567667000000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Local privacy protection classification based on human-centric computing"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5764-2432","authenticated-orcid":false,"given":"Chunyong","family":"Yin","sequence":"first","affiliation":[]},{"given":"Biao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhichao","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,4]]},"reference":[{"issue":"2","key":"195_CR1","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","volume":"20","author":"L Zhaojun","year":"2019","unstructured":"Zhaojun L, Gang Q, Zhenglin L (2019) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans Intell Transp Syst 20(2):760\u2013776","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"8","key":"195_CR2","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"L Xiong","year":"2018","unstructured":"Xiong L, Jian N, Bhuiyan MZA (2018) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inf 14(8):3599\u20133609","journal-title":"IEEE Trans Ind Inf"},{"issue":"7","key":"195_CR3","doi-asserted-by":"publisher","first-page":"4189","DOI":"10.1109\/TII.2019.2898174","volume":"15","author":"AK Sangaiah","year":"2019","unstructured":"Sangaiah AK, Medhane DV, Han T, Hossain MS, Muhammad G (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Trans Ind Inf 15(7):4189\u20134196","journal-title":"IEEE Trans Ind Inf"},{"issue":"2","key":"195_CR4","first-page":"286","volume":"14","author":"AJ Perez","year":"2018","unstructured":"Perez AJ, Zeadally S, Jabeur N (2018) Security and privacy in ubiquitous sensor networks. J Inf Process Syst 14(2):286\u2013308","journal-title":"J Inf Process Syst"},{"issue":"1","key":"195_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s13673-017-0087-4","volume":"7","author":"WM Kang","year":"2017","unstructured":"Kang WM, Moon SY, Park JH (2017) An enhanced security framework for home appliances in smart home. Human Centric Comput Inf Sci 7(1):6","journal-title":"Human Centric Comput Inf Sci"},{"issue":"1","key":"195_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/s13673-018-0136-7","volume":"8","author":"HW Kim","year":"2018","unstructured":"Kim HW, Jeong YS (2018) Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain. Human Centric Comput Inf Sci 8(1):11","journal-title":"Human Centric Comput Inf Sci"},{"issue":"5","key":"195_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model forprotecting privacy. Int J Uncertainty Fuzziness Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertainty Fuzziness Knowl Based Syst"},{"issue":"5","key":"195_CR8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) Achieving k-anonymity privacy protection using generalization, and suppression. Int J Uncertainty Fuzziness Knowl Based Syst 10(5):571\u2013588","journal-title":"Int J Uncertainty Fuzziness Knowl Based Syst"},{"key":"195_CR9","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A., Gehrke J., Kifer D., and Venkitasubramaniam M. (2006) L-diversity: privacy beyond k-anonymity. In: 22nd international conference on data engineering. IEEE Computer Society","DOI":"10.1109\/ICDE.2006.1"},{"key":"195_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Differential privacy. International colloquium on automata, languages, and programming","author":"C Dwork","year":"2006","unstructured":"Dwork C (2006) Differential privacy. International colloquium on automata, languages, and programming. Springer, Berlin, pp 1\u201312"},{"key":"195_CR11","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.ins.2018.04.048","volume":"453","author":"S Jian","year":"2018","unstructured":"Jian S, Chen W, Tong L (2018) Secure data uploading scheme for a smart home system. Inf Sci 453:186\u2013197","journal-title":"Inf Sci"},{"issue":"6","key":"195_CR12","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2018.2883550","volume":"30","author":"SW Zhou","year":"2019","unstructured":"Zhou SW, He Y, Xiang SZ, Li KQ, Liu YH (2019) Region-based compressive networked storage with lazy encoding. IEEE Trans Parallel Distrib Syst 30(6):1390\u20131402","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"195_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu P, Dhelim S, Ning H (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27\u201342","journal-title":"J Netw Comput Appl"},{"key":"195_CR14","unstructured":"He S, Li Z, Tang Y, Liao Z, Wang J, Kim HJ (2019) Parameters compressing in deep learning. Comput Mater Con (accepted)"},{"key":"195_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6562-8","author":"J Zhang","year":"2018","unstructured":"Zhang J, Jin X, Sun J, Wang J, Sangaiah AK (2018) Spatial and semantic convolutional features for robust visual object tracking. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-018-6562-8","journal-title":"Multimedia Tools Appl"},{"key":"195_CR16","doi-asserted-by":"publisher","first-page":"43956","DOI":"10.1109\/ACCESS.2019.2908668","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang J, Jin X, Sun J, Wang J, Li K (2019) Dual model learning combined with multiple feature selection for accurate visual tracking. IEEE Access 7:43956\u201343969","journal-title":"IEEE Access"},{"key":"195_CR17","doi-asserted-by":"publisher","first-page":"83873","DOI":"10.1109\/ACCESS.2019.2924944","volume":"7","author":"J Zhang","year":"2019","unstructured":"Zhang J, Wu Y, Feng W, Wang J (2019) Spatially attentive visual tracking using multi-model adaptive response fusion. IEEE Access 7:83873\u201383887","journal-title":"IEEE Access"},{"key":"195_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-019-00731-9","author":"J Zhang","year":"2019","unstructured":"Zhang J, Wang W, Lu C, Wang J, Sangaiah AK (2019) Lightweight deep network for traffic sign classification. Ann Telecommun. https:\/\/doi.org\/10.1007\/s12243-019-00731-9","journal-title":"Ann Telecommun"},{"issue":"5","key":"195_CR19","doi-asserted-by":"publisher","first-page":"3345","DOI":"10.3934\/mbe.2019167","volume":"16","author":"J Zhang","year":"2019","unstructured":"Zhang J, Lu C, Li X, Kim H-J, Wang J (2019) A full convolutional network based on DenseNet for remote sensing scene classification. Math Biosci Eng 16(5):3345\u20133367","journal-title":"Math Biosci Eng"},{"key":"195_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01241-7","author":"Y Yin","year":"2019","unstructured":"Yin Y, Chen L, Xu Y, Wan J, Zhang H, Mai Z (2019) QoS prediction for service recommendation with deep feature learning in edge computing environment. Mobile Netw Appl. https:\/\/doi.org\/10.1007\/s11036-019-01241-7","journal-title":"Mobile Netw Appl"},{"key":"195_CR21","doi-asserted-by":"publisher","first-page":"62815","DOI":"10.1109\/ACCESS.2018.2877137","volume":"6","author":"Y Yin","year":"2018","unstructured":"Yin Y, Chen L, Xu Y, Wan J (2018) Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6:62815\u201362825","journal-title":"IEEE Access"},{"issue":"7","key":"195_CR22","doi-asserted-by":"publisher","first-page":"358","DOI":"10.3390\/e19070358","volume":"19","author":"Y Yin","year":"2017","unstructured":"Yin Y, Xu Y, Xu W, Gao M, Yu L, Pei Y (2017) Collaborative service selection via ensemble learning in mixed mobile network environments. Entropy 19(7):358","journal-title":"Entropy"},{"key":"195_CR23","first-page":"1","volume":"2017","author":"Y Yin","year":"2017","unstructured":"Yin Y, Xu W, Xu Y, Li H, Yu L (2017) Collaborative QoS prediction for mobile service with data filtering and SlopeOne model. Mobile Inf Syst 2017:1\u201314","journal-title":"Mobile Inf Syst"},{"key":"195_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.comcom.2018.07.003","volume":"131","author":"JM Rabaey","year":"2018","unstructured":"Rabaey JM (2018) Towards true human-centric computation. Commun Comput 131:73\u201376","journal-title":"Commun Comput"},{"issue":"2","key":"195_CR25","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1109\/TIE.2018.2793241","volume":"66","author":"Z Heng","year":"2019","unstructured":"Heng Z, Wenchao M, Jun Q (2019) Distributed load sharing under false data injection attack in an inverter-based microgrid. IEEE Trans Ind Electron 66(2):1543\u20131551","journal-title":"IEEE Trans Ind Electron"},{"key":"195_CR26","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.patrec.2018.10.029","volume":"116","author":"Kehua Guo","year":"2018","unstructured":"Guo Kehua, He Yan, Kui Xiaoyan, Sehdev Paramjit, Chi Tao, Zhang Ruifang, Li Jialun (2018) LLTO: towards efficient lesion localization based on template occlusion strategy in intelligent diagnosis. Pattern Recogn Lett 116:225\u2013232","journal-title":"Pattern Recogn Lett"},{"key":"195_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.adhoc.2018.07.014","volume":"80","author":"Kehua Guo","year":"2018","unstructured":"Guo Kehua, Li Ting, Huang Runhe, Kang Jian, Chi Tao (2018) DDA: a deep neural network-based cognitive system for IoT-aided dermatosis discrimination. Ad Hoc Netw 80:95\u2013103","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"195_CR28","doi-asserted-by":"publisher","first-page":"3411","DOI":"10.1109\/JIOT.2018.2883905","volume":"6","author":"M Ozatay","year":"2019","unstructured":"Ozatay M, Verma N (2019) Exploiting emerging sensing technologies toward structure in data for enhancing perception in Human-Centric applications. IEEE Internet Things J 6(2):3411\u20133422","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"195_CR29","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TKDE.2018.2855136","volume":"31","author":"A Gergely","year":"2019","unstructured":"Gergely A, Luca M, Castelluccia C (2019) Differentially private mixture of generative neural networks. IEEE Trans Knowl Data Eng 31(6):1109\u20131121","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"8","key":"195_CR30","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"C Yin","year":"2018","unstructured":"Yin C, Xi J, Sun R, Wang J (2018) Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things. IEEE Trans Ind Inf 14(8):3628\u20133636","journal-title":"IEEE Trans Ind Inf"},{"key":"195_CR31","doi-asserted-by":"crossref","unstructured":"Vaidya J, Shafiq B, Basu A, Hong Y (2013) Differentially private Naive Bayes classification. In: Proceedings of the 2013 IEEE\/WIC\/ACM international joint conferences on web intelligence (WI) and intelligent agent technologies (IAT)","DOI":"10.1109\/WI-IAT.2013.80"},{"key":"195_CR32","doi-asserted-by":"crossref","unstructured":"Mohammed N (2011) Differentially private data release for data mining. In: ACM SIGKDD international conference on knowledge discovery and data mining ACM; 2011. pp 493\u2013501","DOI":"10.1145\/2020408.2020487"},{"issue":"2","key":"195_CR33","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s11042-018-6166-3","volume":"78","author":"DY Tang","year":"2019","unstructured":"Tang DY, Zhou SW, Yang WJ (2019) Random-filtering based sparse representation parallel face recognition. Multimedia Tools Appl 78(2):1419\u20131439","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"195_CR34","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1186\/s13673-019-0177-6","volume":"9","author":"C Yin","year":"2019","unstructured":"Yin C, Ding S, Wang J (2019) Mobile marketing recommendation method based on user location feedback. Human Centric Comput Inf Sci 9(1):14\u201331","journal-title":"Human Centric Comput Inf Sci"},{"key":"195_CR35","first-page":"1","volume":"7","author":"C Yin","year":"2019","unstructured":"Yin C, Shi L, Sun R, Wang J (2019) Improved collaborative filtering recommendation algorithm based on differential privacy protection. J Supercomput 7:1\u201314","journal-title":"J Supercomput"},{"issue":"8","key":"195_CR36","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1109\/TPDS.2018.2809624","volume":"29","author":"Q Jia","year":"2018","unstructured":"Jia Q, Guo L, Jin Z (2018) Preserving model privacy for machine learning in distributed systems. IEEE Trans Parallel Distrib Syst 29(8):1808\u20131822","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"195_CR37","doi-asserted-by":"publisher","first-page":"711","DOI":"10.32604\/cmc.2019.05450","volume":"58","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Wu W, Lim S (2019) An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput Mater Continua 58(3):711\u2013725","journal-title":"Comput Mater Continua"},{"issue":"7","key":"195_CR38","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.3390\/s19071494","volume":"19","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Sangaiah AK, Kim H-J (2019) Energy efficient routing algorithm with mobile sink support for wireless sensor networks. Sensors 19(7):1494","journal-title":"Sensors"},{"issue":"6","key":"195_CR39","first-page":"1717","volume":"19","author":"J-S Pan","year":"2018","unstructured":"Pan J-S, Kong L, Sung T-W, Tsai P-W, Snasel V (2018) Alpha-fraction first strategy for hierarchical wireless sensor networks. J Internet Technol 19(6):1717\u20131726","journal-title":"J Internet Technol"},{"issue":"7","key":"195_CR40","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/TVLSI.2019.2903289","volume":"27","author":"J-S Pan","year":"2019","unstructured":"Pan J-S, Lee C-Y, Sghaier A, Zeghid M, Xie J (2019) Novel systolization of subquadratic space complexity multipliers based on Toeplitz matrix-vector product approach. IEEE Trans Very Large Scale Integr Syst 27(7):1614\u20131622","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"key":"195_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2910409","author":"S He","year":"2019","unstructured":"He S, Xie K, Xie K, Xu C, Wang J (2019) Interference-aware multi-source transmission in multi-radio and multi-channel wireless network. IEEE Syst J. https:\/\/doi.org\/10.1109\/JSYST.2019.2910409","journal-title":"IEEE Syst J"},{"key":"195_CR42","doi-asserted-by":"publisher","first-page":"17996","DOI":"10.1109\/ACCESS.2018.2820093","volume":"6","author":"S He","year":"2018","unstructured":"He S, Xie K, Chen W, Zhang D, Wen J (2018) Energy-aware routing for SWIPT in multi-hop energy-constrained wireless network. IEEE Access 6:17996\u201318008","journal-title":"IEEE Access"},{"issue":"3","key":"195_CR43","first-page":"1510","volume":"11","author":"S He","year":"2017","unstructured":"He S, Zeng W, Xie K, Yang H, Lai M, Su X (2017) PPNC: privacy preserving scheme for random linear network coding in smart grid. KSII Trans Internet Inf Syst 11(3):1510\u20131533","journal-title":"KSII Trans Internet Inf Syst"},{"key":"195_CR44","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9472075","author":"J Wang","year":"2018","unstructured":"Wang J, Gao Y, Yin X, Li F, Kim HJ (2018) An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wire Commun Mobile Comput. https:\/\/doi.org\/10.1155\/2018\/9472075","journal-title":"Wire Commun Mobile Comput"},{"key":"195_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921721","author":"T-T Nguyen","year":"2019","unstructured":"Nguyen T-T, Pan J-S, Dao T-K (2019) An improved flower pollination algorithm for optimizing layouts of nodes in wireless sensor network. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2921721","journal-title":"IEEE Access"},{"key":"195_CR46","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.knosys.2019.01.006","volume":"168","author":"Z Meng","year":"2019","unstructured":"Meng Z, Pan J-S, Tseng K-K (2019) PaDE: an enhanced differential Evolution algorithm with novel control parameter adaptstion schemes for numerical optimization. Knowl Based Syst 168:80\u201399","journal-title":"Knowl Based Syst"},{"issue":"4","key":"195_CR47","first-page":"1111","volume":"19","author":"J-S Pan","year":"2018","unstructured":"Pan J-S, Kong L, Sung T-W, Tsai P-W, Sn\u00e1el V (2018) A clustering scheme for wireless sensor networks based on genetic algorithm and dominating set. J Internet Technol 19(4):1111\u20131118","journal-title":"J Internet Technol"},{"issue":"2","key":"195_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJDWM.2018040101","volume":"14","author":"Z Gao","year":"2018","unstructured":"Gao Z, Sun Y, Cui X (2018) Privacy-preserving hybrid K-means. Int J Data Warehouse Min 14(2):1\u201317","journal-title":"Int J Data Warehouse Min"},{"issue":"4","key":"195_CR49","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1109\/TII.2017.2695487","volume":"13","author":"K Xing","year":"2017","unstructured":"Xing K, Hu C, Yu J (2017) Mutual privacy preserving k-means clustering in social participat-ory sensing. IEEE Trans Ind Inf 13(4):2066\u20132076","journal-title":"IEEE Trans Ind Inf"},{"key":"195_CR50","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.knosys.2019.02.028","volume":"173","author":"M Gong","year":"2019","unstructured":"Gong M, Pan K, Xie Y (2019) Differential privacy preservation in regression analysis based on relevance. Knowl Based Syst 173:140\u2013149","journal-title":"Knowl Based Syst"},{"issue":"3","key":"195_CR51","doi-asserted-by":"publisher","first-page":"671","DOI":"10.3390\/s19030671","volume":"19","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ (2019) An improved routing schema with special clustering using PSO algorithm for heterogeneous wireless sensor Network. Sensors 19(3):671\u2013688","journal-title":"Sensors"},{"key":"195_CR52","first-page":"433","volume":"56","author":"J Wang","year":"2018","unstructured":"Wang J, Ju C, Gao Y, Sangaiah AK, Kim G-J (2018) A PSO based energy efficient coverage control algorithm for wireless sensor networks. Comput Mater Continua 56:433\u2013446","journal-title":"Comput Mater Continua"},{"key":"195_CR53","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.catena.2016.11.032","volume":"151","author":"W Chen","year":"2017","unstructured":"Chen W, Xie X, Wang J (2017) A comparative study of logistic model tree, random forest, and classification and regression tree models for spatial prediction of landslide susceptibility. CATENA 151:147\u2013160","journal-title":"CATENA"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0195-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-019-0195-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0195-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T11:46:44Z","timestamp":1627645604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-019-0195-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,4]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["195"],"URL":"https:\/\/doi.org\/10.1186\/s13673-019-0195-4","relation":{},"ISSN":["2192-1962"],"issn-type":[{"type":"electronic","value":"2192-1962"}],"subject":[],"published":{"date-parts":[[2019,9,4]]},"assertion":[{"value":"9 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"33"}}