{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:35:47Z","timestamp":1769826947159,"version":"3.49.0"},"reference-count":17,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2022,3,31]]},"abstract":"<jats:p>Frequent pattern mining (FIM) identifies the most important patterns in data sets. However, due to the huge and high-dimensional nature of transactional data, classical pattern mining techniques suffer from the limitations of dimensions and data annotations. Recently, data mining while preserving privacy is considered as an important research area. Information privacy is a tradeoff that must be considered when using data. Through many years, privacy-preserving data mining (PPDM) made use of methods that are mostly based on heuristics. The operation of deletion was used to hide the sensitive information in PPDM. In this study, we used deep active learning to protect private and sensitive information. This paper combines entropy-based active learning with an attention-based approach to effectively hide sensitive patterns. The constructed models are then validated using high-dimensional transactional data with attention-based and active learning methods in a reinforcement environment. The results show that the proposed model can support and improve the effectiveness of decision-making by increasing the number of training instances through the use of a pooling technique and an entropy uncertainty measure. The proposed paradigm can achieve data sanitization by the hiding sensitive items and avoiding to hide the non-sensitive items. The model outperforms greedy, genetic, and particle swarm optimization approaches.<\/jats:p>","DOI":"10.3233\/jifs-219262","type":"journal-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T12:02:32Z","timestamp":1640088152000},"page":"4751-4758","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Deep active reinforcement learning for privacy preserve data mining in 5G environments"],"prefix":"10.1177","volume":"42","author":[{"given":"Usman","family":"Ahmed","sequence":"first","affiliation":[{"name":"Department of Computer Science, Electronic Engineering and Mathematical Science Western Norway University of Applied Sciences, Bergen, Norway"}]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Electronic Engineering and Mathematical Science Western Norway University of Applied Sciences, Bergen, Norway"}]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Department of Mathematics &amp; Computer Science, Brandon University, Brandon, Canada"},{"name":"Research Centre for Interneural Computing, China Medical University, Taiwan"}]},{"given":"Hsing-Chung","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Information Engineering, Asia University, Taiwan"},{"name":"Department of Medical Research, China Medical University Hospital, China Medical University Taichung, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2021,12,21]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"AggarwalC.C. PeiJ. and ZhangB. On privacy preservation against adversarial data mining in Proceedings of the 12thACMSIGKDD international conference on Knowledge discovery and data mining (2006) pp. 510\u2013516.","DOI":"10.1145\/1150402.1150460"},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","unstructured":"AhmedU. LinJ.C.-W. SrivastavaG. and DjenouriY. A deep q-learning sanitization approach for privacy preserving data mining in Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking (2021) pp. 43\u201348.","DOI":"10.1145\/3427477.3429990"},{"issue":"2","key":"e_1_3_1_4_2","first-page":"28","article-title":"Toolsfor privacy preserving distributed data mining","volume":"4","author":"Clifton C.","year":"2002","unstructured":"CliftonC., KantarciogluM., VaidyaJ., LinX. and ZhuM.Y., Toolsfor privacy preserving distributed data mining, ACM SigkddExplorations Newsletter4(2) (2002), 28\u201334.","journal-title":"ACM SigkddExplorations Newsletter"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.4.6.555-562"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"DworkC. McSherryF. NissimK. and SmithA. Calibrating noise to sensitivity in private data analysis in Theory of cryptography conference Springer (2006) pp. 265\u2013284.","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2933899"},{"issue":"4","key":"e_1_3_1_8_2","first-page":"201","article-title":"A greedybasedapproach for hiding sensitive itemsets by transaction insertion","volume":"4","author":"Lin C.W.","year":"2013","unstructured":"LinC.W., HongT.P., ChangC.C. and WangS.L., A greedybasedapproach for hiding sensitive itemsets by transaction insertion, Journal of Information Hiding and Multimedia Signal Processing4(4) (2013), 201\u2013227.","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"e_1_3_1_9_2","first-page":"2014","article-title":"Reducing side effects of hidingsensitive itemsets in privacy preserving data mining","volume":"2014","author":"Lin C.W.","unstructured":"LinC.W., HongT.P. and HsuH.C., Reducing side effects of hidingsensitive itemsets in privacy preserving data mining, TheScientific World Journal2014, 2014.","journal-title":"TheScientific World Journal"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0590-5"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.03.007"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.07.003"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"LindellY. and PinkasB. Privacy preserving data mining in Annual International Cryptology Conference. Springer (2000) pp. 36\u201354.","DOI":"10.1007\/3-540-44598-6_3"},{"key":"e_1_3_1_14_2","unstructured":"LiuX.Y. DingZ. BorstS. and WalidA. Deep reinforcement learning for intelligent transportation systems arXiv preprint arXiv:1812.00979 2018."},{"key":"e_1_3_1_15_2","unstructured":"SchroderC. and NieklerA. A survey of active learning for text classification using deep neural networks https:\/\/arxiv.org\/abs\/2008.07267 2020."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2017.210"},{"key":"e_1_3_1_17_2","unstructured":"VaswaniA. ShazeerN. ParmarN. UszkoreitJ. JonesL. GomezA.N. Kaiser\u0141. and PolosukhinI. Attention is all you need in Advances in Neural Information Processing Systems (2017) pp. 5998\u20136008."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-219262","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-219262","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-219262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T14:22:52Z","timestamp":1769782972000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-219262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,3,31]]}},"alternative-id":["10.3233\/JIFS-219262"],"URL":"https:\/\/doi.org\/10.3233\/jifs-219262","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,21]]}}}