{"id":"https://openalex.org/W2792294582","doi":"https://doi.org/10.1145/3180445.3180452","title":"Differentially Private Feature Selection for Data Mining","display_name":"Differentially Private Feature Selection for Data Mining","publication_year":2018,"publication_date":"2018-03-15","ids":{"openalex":"https://openalex.org/W2792294582","doi":"https://doi.org/10.1145/3180445.3180452","mag":"2792294582"},"language":"en","primary_location":{"id":"doi:10.1145/3180445.3180452","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3180445.3180452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036633741","display_name":"Balamurugan Anandan","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Balamurugan Anandan","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080294173","display_name":"Chris Clifton","orcid":"https://orcid.org/0000-0001-7274-1471"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chris Clifton","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036633741"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.8144,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.78827868,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"43","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8315120935440063},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.8267356753349304},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7035422921180725},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6936529278755188},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6715822219848633},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.6073375344276428},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5695168972015381},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.519367516040802},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5172829627990723},{"id":"https://openalex.org/keywords/minimum-redundancy-feature-selection","display_name":"Minimum redundancy feature selection","score":0.47940585017204285},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4748057425022125},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4424762725830078},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.43300673365592957},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4283641576766968},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3989430367946625},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12704673409461975},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07281157374382019}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8315120935440063},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.8267356753349304},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7035422921180725},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6936529278755188},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6715822219848633},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.6073375344276428},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5695168972015381},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.519367516040802},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5172829627990723},{"id":"https://openalex.org/C16811321","wikidata":"https://www.wikidata.org/wiki/Q17138905","display_name":"Minimum redundancy feature selection","level":3,"score":0.47940585017204285},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4748057425022125},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4424762725830078},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.43300673365592957},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4283641576766968},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3989430367946625},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12704673409461975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07281157374382019},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3180445.3180452","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3180445.3180452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309815","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W40229419","https://openalex.org/W1523389133","https://openalex.org/W1557833142","https://openalex.org/W1796631669","https://openalex.org/W1992735538","https://openalex.org/W2001238748","https://openalex.org/W2005107218","https://openalex.org/W2036175803","https://openalex.org/W2075291208","https://openalex.org/W2109135024","https://openalex.org/W2109426455","https://openalex.org/W2121727866","https://openalex.org/W2124612670","https://openalex.org/W2132594509","https://openalex.org/W2149706766","https://openalex.org/W2242728483","https://openalex.org/W2403112189","https://openalex.org/W2435251607","https://openalex.org/W2536977318","https://openalex.org/W2952054416","https://openalex.org/W3085162807","https://openalex.org/W3120740533","https://openalex.org/W4205373044","https://openalex.org/W4389138872","https://openalex.org/W6824583106"],"related_works":["https://openalex.org/W2156571267","https://openalex.org/W2998727463","https://openalex.org/W2805829984","https://openalex.org/W4388573469","https://openalex.org/W3135058836","https://openalex.org/W4249305026","https://openalex.org/W2883787619","https://openalex.org/W2940071312","https://openalex.org/W2290248771","https://openalex.org/W2286904880"],"abstract_inverted_index":{"One":[0],"approach":[1,12],"to":[2,30,39,46,76,111,138],"analysis":[3,33,109],"of":[4,49,62,73,88,101,121],"private":[5,31,68,108,141],"data":[6,16,32,95],"is":[7,34,43],"\u03b5-differential":[8],"privacy,":[9],"a":[10],"randomization-based":[11],"that":[13,35,99,131],"protects":[14],"individual":[15],"items":[17],"by":[18],"injecting":[19],"carefully":[20],"limited":[21],"noise":[22,37],"into":[23],"results.":[24],"A":[25],"challenge":[26],"in":[27,94],"applying":[28],"this":[29,58,82],"the":[36,40,47,60,71,77,86,119,132],"added":[38],"feature":[41,54,63,78,90,125],"parameters":[42,50],"directly":[44],"proportional":[45],"number":[48],"learned.":[51],"While":[52],"careful":[53],"selection":[55,64,79,91,126],"would":[56],"alleviate":[57],"problem,":[59],"process":[61],"itself":[65],"can":[66,135],"reveal":[67],"information,":[69],"requiring":[70],"application":[72],"differential":[74],"privacy":[75],"process.":[80],"In":[81],"paper,":[83],"we":[84],"analyze":[85],"sensitivity":[87,124],"various":[89],"techniques":[92],"used":[93,137],"mining":[96],"and":[97],"show":[98,130],"some":[100],"them":[102],"are":[103],"not":[104],"suitable":[105],"for":[106],"differentially":[107,140],"due":[110],"high":[112],"sensitivity.":[113],"We":[114,128],"give":[115],"experimental":[116],"results":[117],"showing":[118],"value":[120],"using":[122],"low":[123],"techniques.":[127],"also":[129],"same":[133],"concepts":[134],"be":[136],"improve":[139],"decision":[142],"trees.":[143]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
