{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T14:10:41Z","timestamp":1726150241427},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030936624"},{"type":"electronic","value":"9783030936631"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93663-1_8","type":"book-chapter","created":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T05:30:01Z","timestamp":1641015001000},"page":"85-102","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Distributed Support Vector Machines"],"prefix":"10.1007","author":[{"given":"Simone","family":"Bottoni","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Braghin","sequence":"additional","affiliation":[]},{"given":"Theodora","family":"Brisimi","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Trombetta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"8_CR1","unstructured":"Ajmera, A.: Framingham heart study dataset (2018). Data Accessed from Kaggle. https:\/\/www.kaggle.com\/amanajmera1\/framingham-heart-study-dataset"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.ijmedinf.2018.01.007","volume":"112","author":"TS Brisimi","year":"2018","unstructured":"Brisimi, T.S., Chen, R., Mela, T., Olshevsky, A., Paschalidis, I.C., Shi, W.: Federated learning of predictive models from federated electronic health records. Int. J. Med. Inform. 112, 59\u201367 (2018)","journal-title":"Int. J. Med. Inform."},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-44987-6_15","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"D Catalano","year":"2001","unstructured":"Catalano, D., Gennaro, R., Howgrave-Graham, N.: The bit security of Paillier\u2019s encryption scheme and its applications. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 229\u2013243. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_15"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chen, H., Dai, W., Kim, M., Song, Y.: Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. Cryptology ePrint Archive, Report 2019\/524 (2019). https:\/\/eprint.iacr.org\/2019\/524","DOI":"10.1145\/3319535.3363207"},{"key":"8_CR5","unstructured":"CSIRO Data61: Python Paillier Library (2013). https:\/\/github.com\/data61\/python-paillier"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"279","DOI":"10.2105\/AJPH.41.3.279","volume":"41","author":"TR Dawber","year":"1951","unstructured":"Dawber, T.R., Meadors, G.F., Moore, F.E.: Epidemiological approaches to heart disease: the Framingham Study. Am. J. Public Health Nations Health 41(3), 279\u2013286 (1951)","journal-title":"Am. J. Public Health Nations Health"},{"issue":"5","key":"8_CR7","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/0002-9149(89)90524-9","volume":"64","author":"R Detrano","year":"1989","unstructured":"Detrano, R., et al.: International application of a new probability algorithm for the diagnosis of coronary artery disease. Am. J. Cardiol. 64(5), 304\u2013310 (1989)","journal-title":"Am. J. Cardiol."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Du, W., Han, Y.S., Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: Berry, M.W., Dayal, U., Kamath, C., Skillicorn, D.B. (eds.) Proceedings of the Fourth SIAM International Conference on Data Mining, Lake Buena Vista, Florida, USA, 22\u201324 April 2004, pp. 222\u2013233. SIAM (2004)","DOI":"10.1137\/1.9781611972740.21"},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P Erd\u00f6s","year":"1959","unstructured":"Erd\u00f6s, P., R\u00e9nyi, A.: On random graphs I. Publicationes Math. Debrecen 6, 290 (1959)","journal-title":"Publicationes Math. Debrecen"},{"issue":"4","key":"8_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/fi13040094","volume":"13","author":"H Fang","year":"2021","unstructured":"Fang, H., Qian, Q.: Privacy preserving machine learning with homomorphic encryption and federated learning. Future Internet 13(4), 94 (2021)","journal-title":"Future Internet"},{"key":"8_CR11","series-title":"Springer Texts in Statistics","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-1-4757-2765-4_3","volume-title":"A First Course in Multivariate Statistics","author":"B Flury","year":"1997","unstructured":"Flury, B.: The multivariate normal distribution. In: Flury, B. (ed.) A First Course in Multivariate Statistics. STS, pp. 171\u2013207. Springer, New York (1997). https:\/\/doi.org\/10.1007\/978-1-4757-2765-4_3"},{"key":"8_CR12","unstructured":"Guo, J., Liu, Z., Lam, K., Zhao, J., Chen, Y., Xing, C.: Secure weighted aggregation in federated learning. CoRR abs\/2010.08730 (2020)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Kantarci, B., Labatut, V.: Classification of complex networks based on topological properties. In: 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, 30 September\u20132 October 2013, pp. 297\u2013304. IEEE Computer Society (2013)","DOI":"10.1109\/CGC.2013.54"},{"key":"8_CR14","unstructured":"Ludwig, H., et al.: IBM federated learning: an enterprise framework. White Paper V0.1 (2020)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Lyu, L., et al.: Privacy and robustness in federated learning: attacks and defenses. CoRR abs\/2012.06337 (2020)","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Ma, J., Naas, S.A., Sigg, S., Lyu, X.: Privacy-preserving federated learning based on multi-key homomorphic encryption (2021)","DOI":"10.1002\/int.22818"},{"key":"8_CR17","unstructured":"Mammen, P.M.: Federated learning: opportunities and challenges. CoRR abs\/2101.05428 (2021)"},{"key":"8_CR18","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data (2017)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., Cristofaro, E.D., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, 19\u201323 May 2019, pp. 691\u2013706. IEEE (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J.: Random graphs as models of networks, pp. 35\u201368. Wiley (2002)","DOI":"10.1002\/3527602755.ch2"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"8_CR22","unstructured":"Patel, J., Tejalupadhyay, S., Patel, S.: Heart disease prediction using machine learning and data mining technique, March 2016"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Cavallaro, L., et al. (eds.) Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, 15 November 2019, pp. 1\u201311. ACM (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Xu, R., Baracaldo, N., Zhou, Y., Anwar, A., Ludwig, H.: Hybridalpha: an efficient approach for privacy-preserving federated learning. In: Cavallaro, L., et al. (eds.) Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, 15 November 2019, pp. 13\u201323. ACM (2019)","DOI":"10.1145\/3338501.3357371"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 12:1\u201312:19 (2019)","DOI":"10.1145\/3298981"},{"issue":"3","key":"8_CR26","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TNSE.2021.3074185","volume":"8","author":"L Yin","year":"2021","unstructured":"Yin, L., Feng, J., Xun, H., Sun, Z., Cheng, X.: A privacy-preserving federated learning for multiparty data sharing in social IoTs. IEEE Trans. Netw. Sci. Eng. 8(3), 2706\u20132718 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"8_CR27","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: BatchCrypt: efficient homomorphic encryption for cross-silo federated learning. In: Gavrilovska, A., Zadok, E. (eds.) 2020 USENIX Annual Technical Conference, USENIX ATC 2020, 15\u201317 July 2020, pp. 493\u2013506. USENIX Association (2020)"}],"container-title":["Lecture Notes in Computer Science","Heterogeneous Data Management, Polystores, and Analytics for Healthcare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93663-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T11:18:21Z","timestamp":1674299901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93663-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030936624","9783030936631"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93663-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMAH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"VLDB Workshop on Data Management and Analytics for Medicine and Healthcare","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmah2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/vldbdmah2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 Invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}