{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:58:33Z","timestamp":1771873113780,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01215-5","type":"journal-article","created":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T16:19:02Z","timestamp":1752941942000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhance differential privacy mechanisms for clinical data analysis using CNNs and reinforcement learning"],"prefix":"10.1186","volume":"12","author":[{"given":"Rakesh","family":"Batchala","sequence":"first","affiliation":[]},{"given":"Priyank","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Manasi","family":"Gyanchandani","sequence":"additional","affiliation":[]},{"given":"Sanyam","family":"Shukla","sequence":"additional","affiliation":[]},{"given":"Rajesh","family":"Wadhvani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,19]]},"reference":[{"key":"1215_CR1","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/s40745-023-00475-3","volume":"11.2","author":"WK Liu","year":"2024","unstructured":"Liu WK, et al. A survey on differential privacy for medical data analysis. An Data Sci. 2024;11.2:733\u201347.","journal-title":"An Data Sci"},{"issue":"1","key":"1215_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi K, Beni-Hessane A, Khaloufi H. Big healthcare data: preserving security and privacy. J Big Data. 2018;5(1):1\u201318.","journal-title":"J Big Data"},{"key":"1215_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1186\/s40635-024-00614-x","volume":"12.1","author":"LF Roggeveen","year":"2024","unstructured":"Roggeveen LF, et al. Reinforcement learning for intensive care medicine: actionable clinical insights from novel approaches to reward shaping and off-policy model evaluation. Intensive Care Med Exp. 2024;12.1:32.","journal-title":"Intensive Care Med Exp"},{"key":"1215_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-0-387-70992-5_3","volume-title":"Privacy-preserving data mining","author":"J Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer J. A survey of inference control methods for privacy-preserving data mining. In: Aggarwal CC, Yu PS, editors. Privacy-preserving data mining. Boston: Springer; 2008. p. 53\u201380."},{"issue":"4","key":"1215_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134428","volume":"42","author":"J Zhang","year":"2017","unstructured":"Zhang J, Cormode G, Procopiuc CM, Srivastava D, Xiao X. Privbayes: private data release via Bayesian networks. ACM Trans Database Syst (TODS). 2017;42(4):1\u201341.","journal-title":"ACM Trans Database Syst (TODS)"},{"key":"1215_CR6","first-page":"61395","volume":"36","author":"D Qiao","year":"2024","unstructured":"Qiao D, Wang Y-X. Offline reinforcement learning with differential privacy. Adv Neural Inf Process Syst. 2024;36:61395\u2013436.","journal-title":"Adv Neural Inf Process Syst"},{"key":"1215_CR7","unstructured":"Xie L, Lin K, Wang S, Wang F, Zhou J. Differentially private generative adversarial network. 2018. arXiv preprint arXiv:1802.06739. Accessed 2 Jan 2025."},{"key":"1215_CR8","unstructured":"Mahiou S, Xu K, Ganev G. dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation. 2022. arXiv preprint arXiv:2207.05810. Accessed 2 Jan 2025."},{"issue":"7","key":"1215_CR9","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1002\/spe.2812","volume":"50","author":"F Prasser","year":"2020","unstructured":"Prasser F, Eicher J, Spengler H, Bild R, Kuhn KA. Flexible data anonymization using ARX\u2014current status and challenges ahead. Softw Pract Exp. 2020;50(7):1277\u2013304.","journal-title":"Softw Pract Exp"},{"issue":"1","key":"1215_CR10","first-page":"2653","volume":"18","author":"A Benavoli","year":"2017","unstructured":"Benavoli A, Corani G, Demsar J, Zaffalon M. Time for a change: a tutorial for comparing multiple classifiers through Bayesian analysis. J Mach Learn Res. 2017;18(1):2653\u201388.","journal-title":"J Mach Learn Res"},{"key":"1215_CR11","unstructured":"Choudhury O, et al. Differential privacy-enabled federated learning for sensitive health data. 2019. arXiv preprint arXiv:1910.02578. Accessed 2 Jan 2025."},{"key":"1215_CR12","doi-asserted-by":"crossref","unstructured":"Yeom S, et al. Privacy risk in machine learning: analyzing the connection to overfitting. 2018 IEEE 31st computer security foundations symposium (CSF). IEEE, 2018.","DOI":"10.1109\/CSF.2018.00027"},{"key":"1215_CR13","doi-asserted-by":"publisher","first-page":"5359","DOI":"10.1109\/TIFS.2023.3306159","volume":"18","author":"G Muthukrishnan","year":"2023","unstructured":"Muthukrishnan G, Kalyani S. Grafting laplace and gaussian distributions: a new noise mechanism for differential privacy. IEEE Trans Inf Forensics Secur. 2023;18:5359\u201374.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1215_CR14","unstructured":"Prasad N, et al. A reinforcement learning approach to weaning of mechanical ventilation in intensive care units. 2017. arXiv preprint arXiv:1704.06300. Accessed 7 Jan 2025."},{"key":"1215_CR15","unstructured":"Raghu A, et al. Deep reinforcement learning for sepsis treatment. 2017. arXiv preprint arXiv:1711.09602. Accessed 8 Jan 2025."},{"issue":"21","key":"1215_CR16","doi-asserted-by":"publisher","first-page":"19117","DOI":"10.1109\/JIOT.2023.3281347","volume":"10","author":"W Gong","year":"2023","unstructured":"Gong W, et al. Federated inverse reinforcement learning for smart icus with differential privacy. IEEE Internet Things J. 2023;10(21):19117\u201324.","journal-title":"IEEE Internet Things J"},{"key":"1215_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2024.3415115","author":"A Shirali","year":"2024","unstructured":"Shirali A, Schubert A, Alaa A. Pruning the way to reliable policies: a multi-objective deep Q-learning approach to critical care. IEEE J Biomed Health Inf. 2024. https:\/\/doi.org\/10.1109\/JBHI.2024.3415115.","journal-title":"IEEE J Biomed Health Inf"},{"key":"1215_CR18","unstructured":"Raghu A, et al. Continuous state-space models for optimal sepsis treatment: a deep reinforcement learning approach. Machine Learning for Healthcare Conference. PMLR. 2017."},{"key":"1215_CR19","doi-asserted-by":"crossref","unstructured":"Nemati S, Ghassemi MM, Clifford GD. Optimal medication dosing from suboptimal clinical examples: a deep reinforcement learning approach. 2016 38th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE. 2016.","DOI":"10.1109\/EMBC.2016.7591355"},{"key":"1215_CR20","doi-asserted-by":"publisher","DOI":"10.13026\/C2HM2Q","author":"A Johnson","year":"2019","unstructured":"Johnson A, et al. MIMIC-III clinical database demo (version 1.4). PhysioNet. 2019. https:\/\/doi.org\/10.13026\/C2HM2Q.","journal-title":"PhysioNet"},{"key":"1215_CR21","unstructured":"Balle B, Wang Y-X. Improving the Gaussian Mechanism for Differential Privacy. Proceedings of the 35th International Conference on Machine Learning. 2018."},{"issue":"3\u20134","key":"1215_CR22","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A. The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci. 2014;9(3\u20134):211\u2013407.","journal-title":"Found Trends Theor Comput Sci"},{"key":"1215_CR23","doi-asserted-by":"crossref","unstructured":"McSherry F, Talwar K. Mechanism Design via Differential Privacy. 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907). 2007.","DOI":"10.1109\/FOCS.2007.4389483"},{"key":"1215_CR24","doi-asserted-by":"crossref","unstructured":"Bun M, Steinke T. Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds. 2016. arXiv preprint arXiv:1605.02065. Accessed 8 Jan 2025.","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"1215_CR25","doi-asserted-by":"crossref","unstructured":"Mironov, I. R\u00e9nyi Differential Privacy. 2017 IEEE 30th Computer Security Foundations Symposium (CSF). 2017.","DOI":"10.1109\/CSF.2017.11"},{"key":"1215_CR26","unstructured":"Holohan N, Antonatos S, Braghin S, Mac Aonghusa P. (k, $$\\epsilon$$)-Anonymity: k-Anonymity with $$\\epsilon$$-Differential Privacy. 2017. arXiv preprint arXiv:1710.01615. Accessed 15 Jan 2025."},{"key":"1215_CR27","doi-asserted-by":"publisher","first-page":"4069","DOI":"10.1109\/TSP.2020.3006760","volume":"68","author":"J He","year":"2020","unstructured":"He J, Cai L, Guan X. Differential private noise adding mechanism and its application on consensus algorithm. IEEE Trans Signal Process. 2020;68:4069\u201382.","journal-title":"IEEE Trans Signal Process"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01215-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01215-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01215-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T15:34:07Z","timestamp":1757259247000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01215-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,19]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1215"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01215-5","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,19]]},"assertion":[{"value":"22 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"178"}}