{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:02:33Z","timestamp":1730268153425,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infcomw.2019.8845203","type":"proceedings-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T02:23:05Z","timestamp":1569291785000},"page":"578-583","source":"Crossref","is-referenced-by-count":0,"title":["Learning with Vertically-Partitioned Data, Binary Feedback, and Random Parameter Update"],"prefix":"10.1109","author":[{"given":"Ngu","family":"Nguyen","sequence":"first","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"given":"Stephan","family":"Sigg","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]}],"member":"263","reference":[{"volume-title":"Machine learning, ser. McGraw Hill Series in Computer Science","year":"1997","author":"Mitchell","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390212"},{"key":"ref3","first-page":"2488","article-title":"Upper confidence weighted learning for efficient exploration in multiclass prediction with binary feedback","volume-title":"Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, ser. IJCAI \u201813","author":"Ngo","year":"2013"},{"volume-title":"Big Data: A Revolution That Will Transform How We Live, Work and Think. Viktor Mayer-Schnberger and Kenneth Cukier","year":"2013","author":"Mayer-Schnberger","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2881661"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.12.006"},{"key":"ref8","first-page":"3981","article-title":"Learning to learn by gradient descent by gradient descent","volume-title":"Advances in Neural Information Processing Systems 29","author":"Andrychowicz","year":"2016"},{"key":"ref9","first-page":"748","article-title":"Learning to learn without gradient descent by gradient descent","volume-title":"Proceedings of the 34th International Conference on Machine Learning, ser. Proceedings of Machine Learning Research","volume":"70","author":"Chen"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/16m1080173"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.patcog.2018.06.004","article-title":"A benchmark and comparison of active learning for logistic regression","volume":"83","author":"Yang","year":"2018","journal-title":"Pattern Recognition"},{"issue":"1","key":"ref12","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/BF00048682","article-title":"Multinomial logistic regression algorithm","volume":"44","author":"B\u00f6hning","year":"1992","journal-title":"Annals of the Institute of Statistical Mathematics"},{"key":"ref13","first-page":"101","article-title":"In defense of one-vs-all classification","volume":"5","author":"Rifkin","year":"2004","journal-title":"J. Mach. Learn. Res."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/100802001"},{"key":"ref15","first-page":"114","article-title":"Mining in a data-flow environment Experience in network intrusion detection","volume-title":"KDD","author":"Lee","year":"1999"},{"key":"ref16","first-page":"492","article-title":"An assessment of features related to phishing websites using an automated technique","volume-title":"2012 International Conference for Internet Technology and Secured Transactions","author":"Mohammad","year":"2012"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2019,4,29]]},"location":"Paris, France","end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8831168\/8845034\/08845203.pdf?arnumber=8845203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T12:11:02Z","timestamp":1709295062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8845203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2019.8845203","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}