{"id":"https://openalex.org/W4416299602","doi":"https://doi.org/10.1002/spy2.70135","title":"Analysis of Student Data Privacy Protection Based on Convolutional Neural Networks","display_name":"Analysis of Student Data Privacy Protection Based on Convolutional Neural Networks","publication_year":2025,"publication_date":"2025-11-01","ids":{"openalex":"https://openalex.org/W4416299602","doi":"https://doi.org/10.1002/spy2.70135"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70135","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70135","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108744111","display_name":"Jason Cheng","orcid":"https://orcid.org/0009-0005-1509-741X"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingxuan Cheng","raw_affiliation_strings":["School of Marxism Northeastern University  Shenyang Liaoning China"],"raw_orcid":"https://orcid.org/0009-0005-1509-741X","affiliations":[{"raw_affiliation_string":"School of Marxism Northeastern University  Shenyang Liaoning China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5108744111"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17970663,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.25690001249313354,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.25690001249313354,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14413","display_name":"Advanced Technologies in Various Fields","score":0.039500001817941666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.026000000536441803,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5820000171661377},{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.5699999928474426},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.5475000143051147},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.545799970626831},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.48910000920295715},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.4830999970436096},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4417000114917755},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.43639999628067017},{"id":"https://openalex.org/keywords/database-normalization","display_name":"Database normalization","score":0.40529999136924744},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4043000042438507}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8610000014305115},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5820000171661377},{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.5699999928474426},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.5475000143051147},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.545799970626831},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5209000110626221},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4982999861240387},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.48910000920295715},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4867999851703644},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.4830999970436096},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4417000114917755},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.43639999628067017},{"id":"https://openalex.org/C162984825","wikidata":"https://www.wikidata.org/wiki/Q339072","display_name":"Database normalization","level":3,"score":0.40529999136924744},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4043000042438507},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.40220001339912415},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.39899998903274536},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3930000066757202},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.3582000136375427},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.3447999954223633},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.3246000111103058},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.3041999936103821},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.29260000586509705},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C138958017","wikidata":"https://www.wikidata.org/wiki/Q190087","display_name":"Data type","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C16910744","wikidata":"https://www.wikidata.org/wiki/Q7705759","display_name":"Test data","level":2,"score":0.250900000333786},{"id":"https://openalex.org/C121687571","wikidata":"https://www.wikidata.org/wiki/Q4677630","display_name":"Activity recognition","level":2,"score":0.250900000333786},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70135","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70135","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W4223926312","https://openalex.org/W4285255909","https://openalex.org/W4313350245","https://openalex.org/W4313417760","https://openalex.org/W4321329170","https://openalex.org/W4322749978","https://openalex.org/W4383092673","https://openalex.org/W4385322826","https://openalex.org/W4385421432","https://openalex.org/W4394825021","https://openalex.org/W4398184433","https://openalex.org/W4399406144","https://openalex.org/W4402848393","https://openalex.org/W4403140156","https://openalex.org/W4404196155","https://openalex.org/W4404630469","https://openalex.org/W4410355267","https://openalex.org/W4410721456","https://openalex.org/W4411747083","https://openalex.org/W4412410181","https://openalex.org/W4415970353"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"With":[1],"the":[2,114,129,133,157,179,200,221],"widespread":[3],"adoption":[4],"of":[5,12,132,187,223],"digital":[6],"platforms":[7],"in":[8,140,190,235],"education,":[9],"large":[10],"volumes":[11],"student":[13,60,71,232],"data,":[14],"ranging":[15],"from":[16],"personal":[17],"details":[18],"to":[19,97,136,159,230],"behavioral":[20],"logs,":[21,79],"are":[22],"continuously":[23],"generated.":[24],"While":[25],"this":[26],"data":[27,42,61,152,216,233],"enhances":[28,113],"learning":[29,107],"personalization":[30],"and":[31,41,58,80,94,118,151,173,206,237],"administrative":[32],"efficiency,":[33],"it":[34,210],"also":[35],"raises":[36],"significant":[37],"concerns":[38],"regarding":[39],"privacy":[40,62,142,193,234],"security.":[43],"This":[44,154,218],"research":[45,219],"proposes":[46],"a":[47,69],"scalable":[48,236],"walrus":[49,134],"optimizer\u2010driven":[50],"dynamic":[51],"convolutional":[52],"neural":[53],"network":[54],"(SWO\u2010DCNN)":[55],"for":[56,90,105,170,212],"analyzing":[57],"enhancing":[59],"protection.":[63],"Data":[64],"were":[65,86],"collected":[66],"that":[67,178],"contain":[68],"synthetic":[70],"activity":[72],"logs":[73],"dataset":[74],"comprising":[75],"user":[76],"interactions,":[77],"access":[78],"metadata.":[81],"Two":[82],"critical":[83],"preprocessing":[84],"steps":[85],"applied:":[87],"Min\u2013Max":[88],"normalization":[89],"uniform":[91],"feature":[92],"scaling":[93],"one\u2010hot":[95],"encoding":[96],"transform":[98],"categorical":[99],"variables":[100],"into":[101,214],"numerical":[102],"formats":[103],"suitable":[104],"deep":[106],"(DL)":[108],"models.":[109,197],"The":[110,126],"SWO":[111],"algorithm":[112,135],"DCNN's":[115],"convergence":[116],"speed":[117],"accuracy":[119,186],"by":[120],"adaptively":[121],"tuning":[122],"hyperparameters":[123],"during":[124],"training.":[125],"model":[127,158,171,181],"leverages":[128],"optimization":[130,155,228],"strength":[131],"improve":[137],"DCNN":[138],"performance":[139,185],"detecting":[141,191],"threats":[143],"such":[144],"as":[145],"unauthorized":[146],"access,":[147],"abnormal":[148],"usage":[149],"patterns,":[150],"tampering.":[153],"allows":[156],"identify":[160],"complex":[161],"intrusion":[162],"patterns":[163],"with":[164,226],"greater":[165],"precision.":[166],"Python":[167],"was":[168],"used":[169],"implementation":[172],"experimentation.":[174],"Experimental":[175],"results":[176],"show":[177],"SWO\u2010DCNN":[180],"achieves":[182],"an":[183],"overall":[184],"above":[188],"98%":[189],"potential":[192,222],"breaches,":[194],"outperforming":[195],"conventional":[196],"In":[198],"addition,":[199],"proposed":[201],"system":[202],"supports":[203],"real\u2010time":[204],"monitoring":[205],"alert":[207],"mechanisms,":[208],"making":[209],"practical":[211],"integration":[213],"educational":[215],"infrastructures.":[217],"highlights":[220],"combining":[224],"DL":[225],"intelligent":[227],"techniques":[229],"strengthen":[231],"adaptive":[238],"ways.":[239]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-18T00:00:00"}
