{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:29:34Z","timestamp":1740180574682,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T00:00:00Z","timestamp":1550448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61363025"],"award-info":[{"award-number":["61363025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China project","doi-asserted-by":"crossref","award":["61751314"],"award-info":[{"award-number":["61751314"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Guangxi","award":["2017GXNSFDA198033"],"award-info":[{"award-number":["2017GXNSFDA198033"]}]},{"DOI":"10.13039\/501100009329","name":"Scientific Research and Technology Development Program of Guangxi","doi-asserted-by":"publisher","award":["AB17195055"],"award-info":[{"award-number":["AB17195055"]}],"id":[{"id":"10.13039\/501100009329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecur"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s42400-019-0025-z","type":"journal-article","created":{"date-parts":[[2019,2,18]],"date-time":"2019-02-18T13:02:56Z","timestamp":1550494976000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-preserving decision tree for epistasis detection"],"prefix":"10.1186","volume":"2","author":[{"given":"Qingfeng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ruchang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,18]]},"reference":[{"issue":"10","key":"25_CR1","doi-asserted-by":"publisher","first-page":"e76300","DOI":"10.1371\/journal.pone.0076300","volume":"8","author":"O Anuncia\u00e7\u00e3o","year":"2013","unstructured":"Anuncia\u00e7\u00e3o, O, Vinga S, Oliveira AL (2013) Using information interaction to discover epistatic effects in complex diseases. PLoS ONE 8(10):e76300.","journal-title":"PLoS ONE"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/1065167.1065184","volume-title":"Proceedings of the Twenty-fourth ACM Sigmod-Sigact-Sigart Symposium on Principles of Database Systems","author":"A Blum","year":"2005","unstructured":"Blum, A, Dwork C, Mcsherry F, Nissim K (2005) Practical privacy:the sulq framework In: Proceedings of the Twenty-fourth ACM Sigmod-Sigact-Sigart Symposium on Principles of Database Systems, 128\u2013138.. ACM, New York."},{"issue":"3","key":"25_CR3","first-page":"582","volume":"40","author":"LI Breiman","year":"1984","unstructured":"Breiman, LI, Friedman JH, Olshen RA, Stone CJ (1984) Classification and regression trees (cart). Encycl Ecol 40(3):582\u2013588.","journal-title":"Encycl Ecol"},{"issue":"3","key":"25_CR4","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MIS.2015.2","volume":"31","author":"Q Chen","year":"2016","unstructured":"Chen, Q, Chen YP, Zhang C (2016) Interval-based similarity for classifying conserved rna secondary structures. IEEE Intell Syst 31(3):78\u201385. https:\/\/doi.org\/10.1109\/MIS.2015.2 .","journal-title":"IEEE Intell Syst"},{"issue":"5","key":"25_CR5","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TCBB.2016.2645202","volume":"14","author":"Q Chen","year":"2016","unstructured":"Chen, Q, Lan C, Chen B, Wang L, Li J, Zhang C (2016) Exploring consensus rna substructural patterns using subgraph mining. IEEE\/ACM Trans Comput Biol Bioinforma 14(5):1134\u20131146.","journal-title":"IEEE\/ACM Trans Comput Biol Bioinforma"},{"issue":"6","key":"25_CR6","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1093\/bfgp\/elx006","volume":"16","author":"Q Chen","year":"2017","unstructured":"Chen, Q, Lan C, Zhao L, Wang J, Chen B, Chen YP (2017) Recent advances in sequence assembly: principles and applications. Brief Funct Genomics 16(6):361\u2013378. https:\/\/doi.org\/10.1109\/MIS.2015.2 .","journal-title":"Brief Funct Genomics"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.knosys.2017.08.004","volume":"135","author":"Q Chen","year":"2017","unstructured":"Chen, Q, Wang Y, Chen B, Zhang C, Wang L, Li J (2017) Using propensity scores to predict the kinases of unannotated phosphopeptides. Knowl-Based Syst 135:60\u201376.","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"25_CR8","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1038\/sj.ejhg.5201921","volume":"16","author":"C Dong","year":"2008","unstructured":"Dong, C, Chu X, Wang Y, Wang Y, Jin L, Shi T, Huang W, Li Y (2008) Exploration of gene-gene interaction effects using entropy-based methods. Eur J Hum Genet 16(2):229\u2013235.","journal-title":"Eur J Hum Genet"},{"issue":"2","key":"25_CR9","first-page":"1","volume":"26","author":"C Dwork","year":"2006","unstructured":"Dwork, C (2006) Differential privacy. Lect Notes Comput Sci 26(2):1\u201312.","journal-title":"Lect Notes Comput Sci"},{"key":"25_CR10","volume-title":"Differential Privacy","author":"C Dwork","year":"2011","unstructured":"Dwork, C (2011) Differential Privacy. Springer, Berlin Heidelberg."},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Proceedings of the Third Conference on Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C, Mcsherry F, Nissim K (2006) Calibrating noise to sensitivity in private data analysis In: Proceedings of the Third Conference on Theory of Cryptography, 265\u2013284.. Springer-Verlag, Berlin."},{"key":"25_CR12","first-page":"99","volume-title":"Thirteenth Australasian Data Mining Conference (AusDM 2015)","author":"S Fletcher","year":"2015","unstructured":"Fletcher, S, Islam MZ (2015) A Differentially Private Decision Forest. In: Ong K. L., Zhao Y., Stone M. G., Islam M. Z. (eds)Thirteenth Australasian Data Mining Conference (AusDM 2015), 99\u2013108.. ACS, Sydney."},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1145\/1835804.1835868","volume-title":"Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.","author":"A Friedman","year":"2010","unstructured":"Friedman, A, Schuster A (2010) Data mining with differential privacy In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining., 493\u2013502.. ACM, NewYork."},{"issue":"9","key":"25_CR14","first-page":"901","volume":"33","author":"H Guo","year":"2011","unstructured":"Guo, H, Li FG, Wang ZP, Hui L (2011) Current status of snps interaction in genome-wide association study. Hereditas 33(9):901.","journal-title":"Hereditas"},{"issue":"Suppl 1","key":"25_CR15","first-page":"1","volume":"10","author":"R Jiang","year":"2009","unstructured":"Jiang, R, Tang W, Wu X, Fu W (2009) A random forest approach to the detection of epistatic interactions in case-control studies. BMC Bioinformatics 10(Suppl 1):1\u201312.","journal-title":"BMC Bioinformatics"},{"issue":"1","key":"25_CR16","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1145\/2487575.2487687","volume":"2013","author":"A Johnson","year":"2013","unstructured":"Johnson, A, Shmatikov V (2013) Privacy-preserving data exploration in genome-wide association studies. KDD Proc Int Conf Knowl Disc Data Min 2013(1):1079\u20131087.","journal-title":"KDD Proc Int Conf Knowl Disc Data Min"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/B978-1-55860-247-2.50037-1","volume-title":"Proceedings of the Ninth International Workshop on Machine Learning (ML 1992)","author":"K Kira","year":"1992","unstructured":"Kira, K, Rendell LA (1992) A practical approach to feature selection In: Proceedings of the Ninth International Workshop on Machine Learning (ML 1992), 249\u2013256.. Morgan Kaufmann, San Fracisco."},{"issue":"5720","key":"25_CR18","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1126\/science.1109557","volume":"308","author":"RJ Klein","year":"2005","unstructured":"Klein, RJ, Zeiss C, Chew EY, Tsai JY, Sackler RS, Haynes C, Henning AK, Sangiovanni JP, Mane SM, Mayne ST (2005) Complement factor h polymorphism in age-related macular degeneration. Science 308(5720):385\u2013389.","journal-title":"Science"},{"issue":"3","key":"25_CR19","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TCBB.2013.61","volume":"10","author":"X Li","year":"2013","unstructured":"Li, X, Liao B, Cai L, Cao Z, Zhu W (2013) Informative snps selection based on two-locus and multilocus linkage disequilibrium: Criteria of max-correlation and min-redundancy. IEEE\/ACM Trans Comput Biol Bioinforma 10(3):688\u2013695.","journal-title":"IEEE\/ACM Trans Comput Biol Bioinforma"},{"issue":"4","key":"25_CR20","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1038\/ng1537","volume":"37","author":"J Marchini","year":"2005","unstructured":"Marchini, J, Donnelly P, Cardon LR (2005) Genome-wide strategies for detecting multiple loci that influence complex diseases. Nat Genet 37(4):413.","journal-title":"Nat Genet"},{"key":"25_CR21","first-page":"94","volume-title":"Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science","author":"F Mcsherry","year":"2007","unstructured":"Mcsherry, F, Talwar K (2007) Mechanism design via differential privacy In: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 94\u2013103.. IEEE Computer Society, Washington, DC."},{"key":"25_CR22","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1145\/2020408.2020487","volume-title":"Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"N Mohammed","year":"2011","unstructured":"Mohammed, N, Chen R, Fung BCM, Yu PS (2011) Differentially private data release for data mining In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 493\u2013501.. ACM, New York."},{"issue":"4","key":"25_CR23","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1002\/gepi.20307","volume":"32","author":"AA Motsinger-Reif","year":"2008","unstructured":"Motsinger-Reif, AA, Dudek SM, Hahn LW, Ritchie MD (2008) Comparison of approaches for machine-learning optimization of neural networks for detecting gene-gene interactions in genetic epidemiology. Genet Epidemiol 32(4):325\u2013340.","journal-title":"Genet Epidemiol"},{"issue":"1","key":"25_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2767007","volume":"48","author":"M Naveed","year":"2015","unstructured":"Naveed, M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux JP, Malin BA, Wang X (2015) Privacy in the genomic era. ACM Comput Surv 48(1):1\u201344.","journal-title":"ACM Comput Surv"},{"issue":"8","key":"25_CR25","doi-asserted-by":"publisher","first-page":"e1000167","DOI":"10.1371\/journal.pgen.1000167","volume":"4","author":"H Nils","year":"2008","unstructured":"Nils, H, Szabolcs S, Margot R, David D, Waibhav T, Jill M, Pearson JV, Stephan DA, Nelson SF, Craig DW (2008) Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genet 4(8):e1000167.","journal-title":"PLoS Genet"},{"key":"25_CR26","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1250790.1250803","volume-title":"Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing","author":"K Nissim","year":"2007","unstructured":"Nissim, K, Raskhodnikova S (2007) Smooth sensitivity and sampling in private data analysis In: Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing, 75\u201384.. ACM, New York."},{"issue":"2","key":"25_CR27","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1002\/gepi.10218","volume":"24","author":"MD Ritchie","year":"2003","unstructured":"Ritchie, MD, Hahn LW, Moore JH (2003) Power of multifactor dimensionality reduction for detecting gene-gene interactions in the presence of genotyping error, missing data, phenocopy, and genetic heterogeneity. Genet Epidemiol 24(2):150\u20137.","journal-title":"Genet Epidemiol"},{"issue":"9","key":"25_CR28","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1093\/bioinformatics\/btw009","volume":"32","author":"S Simmons","year":"2016","unstructured":"Simmons, S, Berger B (2016) Realizing privacy preserving genome-wide association studies. Bioinformatics 32(9):1293\u20131300.","journal-title":"Bioinformatics"},{"issue":"1","key":"25_CR29","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.cels.2016.04.013","volume":"3","author":"S Simmons","year":"2016","unstructured":"Simmons, S, Sahinalp C, Berger B (2016) Enabling privacy-preserving gwass in heterogeneous human populations. Cell Syst 3(1):54\u201361.","journal-title":"Cell Syst"},{"issue":"5","key":"25_CR30","doi-asserted-by":"publisher","first-page":"e1000464","DOI":"10.1371\/journal.pgen.1000464","volume":"5","author":"W Tang","year":"2009","unstructured":"Tang, W, Wu X, Jiang R, Li Y (2009) Epistatic module detection for case-control studies: a bayesian model with a gibbs sampling strategy. PLoS Genet 5(5):e1000464.","journal-title":"PLoS Genet"},{"issue":"1","key":"25_CR31","first-page":"137","volume":"5","author":"C Uhlerop","year":"2012","unstructured":"Uhlerop, C, Slavkovi\u0107 A, Fienberg SE (2012) Privacy-preserving data sharing for genome-wide association studies. J Priv Confidentiality 5(1):137.","journal-title":"J Priv Confidentiality"},{"issue":"3","key":"25_CR32","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.ajhg.2010.07.021","volume":"87","author":"X Wan","year":"2010","unstructured":"Wan, X, Yang C, Yang Q, Xue H, Fan X (2010) Boost: A fast approach to detecting gene-gene interactions in genome-wide case-control studies. Am J Hum Genet 87(3):325\u2013340.","journal-title":"Am J Hum Genet"},{"issue":"1","key":"25_CR33","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1093\/bioinformatics\/btp622","volume":"26","author":"X Wan","year":"2010","unstructured":"Wan, X, Yang C, Yang Q, Xue H, Tang NLS, Yu W (2010) Predictive rule inference for epistatic interaction detection in genome-wide association studies. Bioinformatics 26(1):30\u201337.","journal-title":"Bioinformatics"},{"issue":"1","key":"25_CR34","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1093\/bioinformatics\/btr600","volume":"28","author":"Y Wang","year":"2012","unstructured":"Wang, Y, Liu G, Feng M, Wong L (2012) Response: an empirical comparison of several recent epistatic interaction detection methods. Bioinformatics 28(1):145\u2013146.","journal-title":"Bioinformatics"},{"issue":"1","key":"25_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1756-0500-3-117","volume":"3","author":"Y Wang","year":"2010","unstructured":"Wang, Y, Liu X, Robbins K, Rekaya R (2010) Antepiseeker: detecting epistatic interactions for case-control studies using a two-stage ant colony optimization algorithm. BMC Res Notes 3(1):1\u20138.","journal-title":"BMC Res Notes"},{"issue":"4","key":"25_CR36","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1093\/bioinformatics\/btn652","volume":"25","author":"C Yang","year":"2009","unstructured":"Yang, C, He Z, Wan X, Yang Q, Xue H, Yu W (2009) Snpharvester: a filtering-based approach for detecting epistatic interactions in genome-wide association studies. Bioinformatics 25(4):504.","journal-title":"Bioinformatics"},{"issue":"6","key":"25_CR37","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1038\/nrg3723","volume":"15","author":"E Yaniv","year":"2014","unstructured":"Yaniv, E, Arvind N (2014) Routes for breaching and protecting genetic privacy. Nat Rev Genet 15(6):409\u2013421.","journal-title":"Nat Rev Genet"},{"issue":"7","key":"25_CR38","doi-asserted-by":"publisher","first-page":"e69321","DOI":"10.1371\/journal.pone.0069321","volume":"8","author":"J Yee","year":"2013","unstructured":"Yee, J, Kwon MS, Park T, Park M (2013) A modified entropy-based approach for identifying gene-gene interactions in case-control study. PloS ONE 8(7):e69321.","journal-title":"PloS ONE"},{"issue":"S1","key":"25_CR39","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.jbi.2014.01.008","volume":"50","author":"F Yu","year":"2014","unstructured":"Yu, F, Fienberg SE, Slavkovi\u0107 AB, Uhler C (2014) Scalable privacy-preserving data sharing methodology for genome-wide association studies. J Biomed Inform 50(S1):133\u2013141.","journal-title":"J Biomed Inform"},{"key":"25_CR40","first-page":"170","volume-title":"Privacy in Statistical Databases, PSD 2014","author":"F Yu","year":"2014","unstructured":"Yu, F, Rybar M, Uhler C, Fienberg SE (2014) Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases. In: Josep Domingo-Ferrer (ed)Privacy in Statistical Databases, PSD 2014, 170\u2013184.. Springer International Publishing, Cham, Ibiza."},{"issue":"12","key":"25_CR41","doi-asserted-by":"publisher","first-page":"i217","DOI":"10.1093\/bioinformatics\/btq186","volume":"26","author":"X Zhang","year":"2010","unstructured":"Zhang, X, Huang S, Zou F, Wang W (2010) Team: efficient two-locus epistasis tests in human genome-wide association study. Bioinformatics 26(12):i217.","journal-title":"Bioinformatics"},{"issue":"99","key":"25_CR42","first-page":"1","volume":"PP","author":"T Zhu","year":"2017","unstructured":"Zhu, T, Li G, Zhou W, Yu PS (2017) Differentially private data publishing and analysis: A survey. IEEE Trans Knowl Data Eng PP(99):1\u20131.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"25_CR43","first-page":"388","volume-title":"Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","author":"T Zhu","year":"2013","unstructured":"Zhu, T, Xiong P, Xiang Y, Zhou W (2013) An Effective Deferentially Private Data Releasing Algorithm for Decision Tree In: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 388\u2013395.. IEEE Computer Society, Washington, DC."}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-019-0025-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s42400-019-0025-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-019-0025-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T01:20:16Z","timestamp":1662945616000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-019-0025-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,18]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1186\/s42400-019-0025-z","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2019,2,18]]},"assertion":[{"value":"25 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"7"}}