{"id":"https://openalex.org/W4385059233","doi":"https://doi.org/10.1145/3596871.3596880","title":"Differential privacy protection method for decision tree ensemble model","display_name":"Differential privacy protection method for decision tree ensemble model","publication_year":2023,"publication_date":"2023-02-24","ids":{"openalex":"https://openalex.org/W4385059233","doi":"https://doi.org/10.1145/3596871.3596880"},"language":"en","primary_location":{"id":"doi:10.1145/3596871.3596880","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3596871.3596880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 11th International Conference on Communications and Broadband Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001024124","display_name":"Xia Qin","orcid":"https://orcid.org/0000-0002-2322-9831"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xia Qin","raw_affiliation_strings":["School of Artificial Intelligence, Guangxi Minzu University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064694591","display_name":"Lina Ge","orcid":"https://orcid.org/0000-0001-6872-7933"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Ge","raw_affiliation_strings":["School of Artificial Intelligence, Guangxi Minzu University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039341294","display_name":"Jie Wang","orcid":"https://orcid.org/0000-0002-7528-1180"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Wang","raw_affiliation_strings":["School of Artificial Intelligence, Guangxi Minzu University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, China","institution_ids":["https://openalex.org/I145897649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001024124"],"corresponding_institution_ids":["https://openalex.org/I145897649"],"apc_list":null,"apc_paid":null,"fwci":0.3487,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64852038,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"52","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8186370134353638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7949577569961548},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.7866814136505127},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6712035536766052},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5502066612243652},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5206652879714966},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5155227184295654},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4581716060638428},{"id":"https://openalex.org/keywords/decision-tree-model","display_name":"Decision tree model","score":0.451510488986969},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.41593942046165466},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.4153837263584137},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2876235842704773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20511466264724731},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11074966192245483},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07363384962081909}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8186370134353638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7949577569961548},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.7866814136505127},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6712035536766052},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5502066612243652},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5206652879714966},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5155227184295654},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4581716060638428},{"id":"https://openalex.org/C56289965","wikidata":"https://www.wikidata.org/wiki/Q5249246","display_name":"Decision tree model","level":3,"score":0.451510488986969},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.41593942046165466},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.4153837263584137},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2876235842704773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20511466264724731},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11074966192245483},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07363384962081909},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3596871.3596880","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3596871.3596880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 11th International Conference on Communications and Broadband Networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G4477226527","display_name":null,"funder_award_id":"61862007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W30651129","https://openalex.org/W1504694836","https://openalex.org/W1519043595","https://openalex.org/W1873763122","https://openalex.org/W1988287322","https://openalex.org/W2000164913","https://openalex.org/W2077217970","https://openalex.org/W2123820077","https://openalex.org/W2594311007","https://openalex.org/W2598082813","https://openalex.org/W2608178897","https://openalex.org/W2963699739","https://openalex.org/W2998640192","https://openalex.org/W3036408858","https://openalex.org/W4205228770","https://openalex.org/W4226445327","https://openalex.org/W4233341945","https://openalex.org/W4253298716"],"related_works":["https://openalex.org/W3010781909","https://openalex.org/W4200233390","https://openalex.org/W4315705624","https://openalex.org/W4304208041","https://openalex.org/W2605443953","https://openalex.org/W3116386889","https://openalex.org/W4313218046","https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W2943138144"],"abstract_inverted_index":{"As":[0],"a":[1,50,67,120],"machine":[2],"learning":[3],"model":[4,54,124,141,148,159,197],"widely":[5],"used":[6],"in":[7,29,89],"data":[8,11,18,38,113],"mining":[9],"and":[10,20,110,115,176],"analysis,":[12],"decision":[13,51,91,121,145,172,185,194],"tree":[14,52,122,146,173,195],"cannot":[15],"balance":[16],"properly":[17],"availability":[19,114],"security":[21],"due":[22],"to":[23,36,42,69,83,105,149,181,192],"improper":[24],"allocation":[25],"of":[26,32,130,139,184],"privacy":[27,35,57,71,81,97,103,136,163,201],"budget":[28,58,72,104],"the":[30,44,90,102,135,140,151,157,170,177,182,193,199],"process":[31],"applying":[33],"differential":[34,131,200],"protect":[37],"privacy.":[39],"In":[40],"order":[41],"solve":[43],"above":[45],"problems,":[46],"this":[47],"paper":[48],"proposes":[49],"ensemble":[53,123,147,174,196],"for":[55],"allocating":[56],"based":[59,73,125],"on":[60,74,126],"leaf":[61,75,84],"node":[62,76],"depth.":[63,77],"First,":[64],"we":[65,118,143],"design":[66],"strategy":[68,100],"allocate":[70],"By":[78],"assigning":[79],"different":[80,87],"budgets":[82],"nodes":[85],"with":[86,169],"depths":[88],"tree,":[92],"each":[93],"query":[94],"consumes":[95],"same":[96],"budget.":[98],"This":[99],"enables":[101],"be":[106],"more":[107],"fully":[108],"used,":[109],"better":[111],"balances":[112],"security.":[116],"And":[117,187],"propose":[119],"parallel":[127],"composition":[128],"theorem":[129],"privacy,":[132],"which":[133],"improves":[134],"protection":[137,164],"degree":[138,165],"when":[142],"use":[144],"improve":[150],"performance.":[152],"Simulation":[153],"experiments":[154],"show":[155],"that":[156],"improved":[158,167],"is":[160,166,179,190],"effective.":[161],"Its":[162],"compared":[168],"general":[171],"model,":[175],"improvement":[178],"proportional":[180],"number":[183],"tree.":[186],"its":[188],"accuracy":[189],"close":[191],"without":[198],"protection.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
