Privacy-preserving techniques in recommender systems: state-of-the-art review and future research agenda

D Pramod - Data Technologies and Applications, 2022 - emerald.com
Purpose This study explores privacy challenges in recommender systems (RSs) and how
they have leveraged privacy-preserving technology for risk mitigation. The study also …

A review of feature selection methods based on meta-heuristic algorithms

Z Sadeghian, E Akbari, H Nematzadeh… - … of Experimental & …, 2023 - Taylor & Francis
Feature selection is a real-world problem that finds a minimal feature subset from an original
feature set. A good feature selection method, in addition to selecting the most relevant …

Benefiting from single-objective feature selection to multiobjective feature selection: a multiform approach

R Jiao, B Xue, M Zhang - IEEE Transactions on Cybernetics, 2022 - ieeexplore.ieee.org
Evolutionary multiobjective feature selection (FS) has gained increasing attention in recent
years. However, it still faces some challenges, for example, the frequently appeared …

Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation

GS Kumar, K Premalatha, GU Maheshwari… - … Applications of Artificial …, 2024 - Elsevier
Mountainous amounts of information are now available in hospitals, finance, counter-
terrorism, education and many other sectors. Those information can offer a rich source for …

Feature selection using relative dependency complement mutual information in fitting fuzzy rough set model

J Xu, X Meng, K Qu, Y Sun, Q Hou - Applied Intelligence, 2023 - Springer
As a reliable and valid tool for analyzing uncertain information, fuzzy rough set theory has
attracted widespread concern in feature selection. However, the performance of fuzzy rough …

Network intrusion detection method based on FCWGAN and BiLSTM

Z Ma, J Li, Y Song, X Wu, C Chen - Computational Intelligence …, 2022 - Wiley Online Library
Imbalanced datasets greatly affect the analysis capability of intrusion detection models,
biasing their classification results toward normal behavior and leading to high false‐positive …

A fast intrusion detection system based on swift wrapper feature selection and speedy ensemble classifier

E Zorarpaci - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Due to the widespread use of the internet, computer network systems may be exposed to
different types of attacks. For this reason, the intrusion detection systems (IDSs) are often …

Feature selection based on correlation label and BR belief function (FSCLBF) in multi-label data

Z Mehravaran, J Hamidzadeh, R Monsefi - Soft Computing, 2024 - Springer
In many real-world problems, each sample has more than one label, which may also exist
semantic correlations among labels. However, in multi-label datasets, there are many …

Privacy-Preserving Photo Sharing on Online Social Networks: A Review.

MD Sajid, S Kavitha - International Journal of Safety & …, 2024 - search.ebscohost.com
Online social networking applications and their services have become an essential part of
the human lifestyle. These social services help online users in different ways, such as …

Social networks data analytical approaches for trust‐based recommender systems: A systematic literature review

N Vatani, AM Rahmani, HHS Javadi… - International Journal of …, 2024 - Wiley Online Library
With the explosive growth of information on the web and the quick provision of novel web
services, recommendation systems have emerged as efficient mechanism for providing …