{"id":"https://openalex.org/W4387698100","doi":"https://doi.org/10.1145/3603765.3603773","title":"Preserving Users\u2019 Sensitive Data in Physical and Virtual World Using Machine Learning: A Strategy","display_name":"Preserving Users\u2019 Sensitive Data in Physical and Virtual World Using Machine Learning: A Strategy","publication_year":2023,"publication_date":"2023-05-10","ids":{"openalex":"https://openalex.org/W4387698100","doi":"https://doi.org/10.1145/3603765.3603773"},"language":"en","primary_location":{"id":"doi:10.1145/3603765.3603773","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603765.3603773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 the 7th International Conference on Information System and Data Mining (ICISDM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019909434","display_name":"Nasib Singh Gill","orcid":"https://orcid.org/0000-0002-8594-4320"},"institutions":[{"id":"https://openalex.org/I905734797","display_name":"Maharshi Dayanand University","ror":"https://ror.org/03kaab451","country_code":"IN","type":"education","lineage":["https://openalex.org/I905734797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Nasib Singh Gill","raw_affiliation_strings":["Department of Computer Science &amp; Applications, Maharshi Dayanand University, India"],"raw_orcid":"https://orcid.org/0000-0002-8594-4320","affiliations":[{"raw_affiliation_string":"Department of Computer Science &amp; Applications, Maharshi Dayanand University, India","institution_ids":["https://openalex.org/I905734797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050940035","display_name":"Preeti Gulia","orcid":"https://orcid.org/0000-0001-8535-4016"},"institutions":[{"id":"https://openalex.org/I905734797","display_name":"Maharshi Dayanand University","ror":"https://ror.org/03kaab451","country_code":"IN","type":"education","lineage":["https://openalex.org/I905734797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Preeti Gulia","raw_affiliation_strings":["Department of Computer Science &amp; Applications, Maharshi Dayanand University, India"],"raw_orcid":"https://orcid.org/0000-0001-8535-4016","affiliations":[{"raw_affiliation_string":"Department of Computer Science &amp; Applications, Maharshi Dayanand University, India","institution_ids":["https://openalex.org/I905734797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084368379","display_name":"Amit Sagu","orcid":"https://orcid.org/0000-0002-0129-7665"},"institutions":[{"id":"https://openalex.org/I905734797","display_name":"Maharshi Dayanand University","ror":"https://ror.org/03kaab451","country_code":"IN","type":"education","lineage":["https://openalex.org/I905734797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit Sagu","raw_affiliation_strings":["Department of Computer Science &amp; Applications, Maharshi Dayanand University, India"],"raw_orcid":"https://orcid.org/0000-0002-0129-7665","affiliations":[{"raw_affiliation_string":"Department of Computer Science &amp; Applications, Maharshi Dayanand University, India","institution_ids":["https://openalex.org/I905734797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008097251","display_name":"Bharti Goyal","orcid":"https://orcid.org/0000-0002-5817-763X"},"institutions":[{"id":"https://openalex.org/I905734797","display_name":"Maharshi Dayanand University","ror":"https://ror.org/03kaab451","country_code":"IN","type":"education","lineage":["https://openalex.org/I905734797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bharti Goyal","raw_affiliation_strings":["Department of Computer Science &amp; Applications, Maharshi Dayanand University, India"],"raw_orcid":"https://orcid.org/0000-0002-5817-763X","affiliations":[{"raw_affiliation_string":"Department of Computer Science &amp; Applications, Maharshi Dayanand University, India","institution_ids":["https://openalex.org/I905734797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019909434"],"corresponding_institution_ids":["https://openalex.org/I905734797"],"apc_list":null,"apc_paid":null,"fwci":0.9838,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77612251,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"18","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7492818236351013},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.7441378831863403},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6634053587913513},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6585322022438049},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5708631277084351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5299312472343445},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5205520391464233},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.513852596282959},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.41344523429870605},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3646641969680786},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3508000671863556},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34239524602890015},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2645750045776367}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7492818236351013},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.7441378831863403},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6634053587913513},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6585322022438049},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5708631277084351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5299312472343445},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5205520391464233},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.513852596282959},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.41344523429870605},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3646641969680786},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3508000671863556},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34239524602890015},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2645750045776367},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603765.3603773","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603765.3603773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 the 7th International Conference on Information System and Data Mining (ICISDM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1535753778","https://openalex.org/W2896508999","https://openalex.org/W2993853848","https://openalex.org/W2996897273","https://openalex.org/W3017210109","https://openalex.org/W3047515143","https://openalex.org/W3148181069","https://openalex.org/W3159587518","https://openalex.org/W3192098681","https://openalex.org/W3195505129","https://openalex.org/W3201835768","https://openalex.org/W3205185918","https://openalex.org/W3215880761","https://openalex.org/W4200594668","https://openalex.org/W4224214581","https://openalex.org/W4225138458","https://openalex.org/W4281727055","https://openalex.org/W4286218307","https://openalex.org/W4297973345","https://openalex.org/W4306836034","https://openalex.org/W4318043873","https://openalex.org/W4318615574","https://openalex.org/W4319320590"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2374550342"],"abstract_inverted_index":{"The":[0],"impact":[1],"of":[2,29,37,53,88,157],"computing":[3],"on":[4,161],"society":[5],"is":[6,104],"intricate":[7],"and":[8,12,32,45,72,78,99,108,120,135,143,154],"far-reaching":[9],"both":[10],"physically":[11],"virtually.":[13],"Computers":[14],"have":[15,24],"led":[16],"to":[17,50,75,125],"an":[18],"increase":[19],"in":[20,116],"productivity":[21],"since":[22],"they":[23],"made":[25,40],"a":[26,113,127],"wide":[27],"variety":[28],"operations":[30],"simpler":[31],"more":[33],"efficient.":[34],"Specifically,":[35],"Internet":[36],"Things":[38],"has":[39,58,69],"maintaining":[41],"infrastructure":[42],"faster,":[43],"cheaper,":[44],"greener.":[46],"When":[47],"it":[48],"comes":[49],"the":[51,54,61,76,85,148,152],"relevance":[52],"virtual":[55],"world,":[56],"technology":[57],"completely":[59],"altered":[60],"way":[62],"we":[63],"engage":[64],"with":[65,84],"one":[66],"another.":[67],"Communication":[68],"been":[70],"streamlined":[71],"quickened":[73],"thanks":[74],"internet":[77],"social":[79],"media":[80],"platforms.":[81],"But":[82],"along":[83],"rising":[86],"use":[87],"technology,":[89],"new":[90],"societal":[91],"challenges":[92],"are":[93],"being":[94],"witnessed":[95],"including":[96],"security,":[97],"freedom,":[98],"privacy.":[100],"Preserving":[101],"these":[102,118],"values":[103],"crucial":[105],"for":[106,131],"users,":[107],"machine":[109,128,163],"learning":[110,129,164],"may":[111],"play":[112],"key":[114],"role":[115],"mitigating":[117],"risks":[119],"challenges.":[121],"This":[122],"paper":[123,149],"attempts":[124],"provide":[126],"strategy":[130],"safeguarding":[132],"users'":[133],"personal":[134],"sensitive":[136],"data":[137],"against":[138],"intrusion,":[139],"fraud,":[140],"malware,":[141],"spam,":[142],"fake":[144],"profile,":[145],"etc.":[146],"Furthermore,":[147],"also":[150],"presents":[151],"fruitful":[153],"encouraging":[155],"results":[156],"various":[158],"experiments":[159],"based":[160],"proposed":[162],"strategies":[165],"while":[166],"utilizing":[167],"two":[168],"separate":[169],"datasets.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
