{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:33:26Z","timestamp":1771025606818,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030142339","type":"print"},{"value":"9783030142346","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-14234-6_20","type":"book-chapter","created":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T08:02:08Z","timestamp":1550649728000},"page":"370-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Blockchain-Based Privacy Preserving Deep Learning"],"prefix":"10.1007","author":[{"given":"Xudong","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,21]]},"reference":[{"key":"20_CR1","unstructured":"Poushter, J.: Smartphone ownership and internet usage continues to climb in emerging economies. Pew Research Center Report (2016)"},{"key":"20_CR2","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., et al.: Communication-efficient learning of deep networks from decentralized data (2016). arXiv preprint: arXiv:1602.05629"},{"key":"20_CR3","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"20_CR4","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform. Ethereum project white paper (2014). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"20_CR5","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper (2014). http:\/\/gavwood.com\/paper.pdf"},{"key":"20_CR6","unstructured":"Hannun, A., Case, C., Casper, J., et al.: DeepSpeech: scaling up end-to-end speech recognition (2014). arXiv:1412.5567"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Delving deep into rectifiers: surpassing human-level performance on ImageNet classification (2015). arXiv:1502.01852","DOI":"10.1109\/ICCV.2015.123"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural networks. In: ICASSP (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"issue":"6","key":"20_CR9","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton, G., Deng, L., Yu, D., Dahl, G., et al.: Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process. Mag. 29(6), 82\u201397 (2012)","journal-title":"IEEE Signal Process. Mag."},{"key":"20_CR10","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.: ImageNet classification with deep convolutional neural networks. In: NIPS (2012)"},{"key":"20_CR11","unstructured":"Simard, P., Steinkraus, D., Platt, J.: Best practices for convolutional neural networks applied to visual document analysis. In: Document Analysis and Recognition (2013)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Taigman, Y., Yang, M., Ranzato, M., Wolf, L.: DeepFace: closing the gap to human-level performance in face verification. In: CVPR (2014)","DOI":"10.1109\/CVPR.2014.220"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"Y Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36\u201354. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44598-6_3"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Du, W., Han, Y., Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: SDM, vol. 4, pp. 222\u2013233 (2004)","DOI":"10.1137\/1.9781611972740.21"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: KDD (2002)","DOI":"10.1145\/775047.775142"},{"issue":"4","key":"20_CR16","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1007\/s00778-006-0041-y","volume":"17","author":"J Vaidya","year":"2008","unstructured":"Vaidya, J., Kantarco\u011flu, M., Clifton, C.: Privacy-preserving Naive Bayes classification. VLDB 17(4), 879\u2013898 (2008)","journal-title":"VLDB"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Wright, R.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: KDD (2005)","DOI":"10.1145\/1081870.1081942"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Dwork, C., Rothblum, G., Vadhan, S.: Boosting and differential privacy. In: FOCS (2010)","DOI":"10.1109\/FOCS.2010.12"},{"issue":"1","key":"20_CR19","first-page":"2905","volume":"14","author":"K Chaudhuri","year":"2013","unstructured":"Chaudhuri, K., Sarwate, A., Sinha, K.: A near-optimal algorithm for differentially-private principal components. JMLR 14(1), 2905\u20132943 (2013)","journal-title":"JMLR"},{"key":"20_CR20","unstructured":"Chaudhuri, K., Monteleoni, C.: Privacy-preserving logistic regression. In: NIPS (2009)"},{"issue":"11","key":"20_CR21","first-page":"1364","volume":"5","author":"J Zhang","year":"2012","unstructured":"Zhang, J., Zhang, Z., Xiao, X., Yang, Y., Winslett, M.: Functional mechanism: regression analysis under differential privacy. VLDB 5(11), 1364\u20131375 (2012)","journal-title":"VLDB"},{"issue":"1","key":"20_CR22","first-page":"4","volume":"4","author":"B Rubinstein","year":"2012","unstructured":"Rubinstein, B., Bartlett, P., Huang, L., Taft, N.: Learning in a large function space: privacy-preserving mechanisms for SVM learning. J. Priv. Confidentiality 4(1), 4 (2012)","journal-title":"J. Priv. Confidentiality"},{"issue":"5","key":"20_CR23","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSP.2013.2259911","volume":"30","author":"A Sarwate","year":"2013","unstructured":"Sarwate, A., Chaudhuri, K.: Signal processing and machine learning with differential privacy: algorithms and challenges for continuous data. IEEE Signal Process. Mag. 30(5), 86\u201394 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"20_CR24","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.: Differentially private empirical risk minimization. JMLR 12, 1069\u20131109 (2011)","journal-title":"JMLR"},{"key":"20_CR25","unstructured":"Wainwright, M., Jordan, M., Duchi, J.: Privacy aware learning. In: NIPS (2012)"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321. ACM (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"20_CR27","unstructured":"Hamm, J., Cao, P., Belkin, M.: Learning privately from multiparty data. In: Proceedings of the 33rd International Conference on Machine Learning, pp. 555\u2013563 (2016)"},{"key":"20_CR28","unstructured":"Papernot, N., Abadi, M., Erlingsson, U., Goodfellow, I., Talwar, K.: Semi-supervised knowledge transfer for deep learning from private training data. In: Proceedings of the 5th International Conference on Learning Representations (2017)"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Ateniese, G., P\u00e9rez-Cruz, F.: Deep models under the GAN: information leakage from collaborative deep learning. CoRR, vol. abs\/1702.07464 (2017)","DOI":"10.1145\/3133956.3134012"},{"issue":"5","key":"20_CR30","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Georgiev, P., Lane, N.D., Rachuri, K.K., Mascolo, C.: DSP.Ear: leveraging co-processor support for continuous audio sensing on smartphones. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, pp. 295\u2013309. ACM (2014)","DOI":"10.1145\/2668332.2668349"},{"key":"20_CR32","series-title":"New Economic Windows","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-42448-4_13","volume-title":"Banking Beyond Banks and Money","author":"GW Peters","year":"2016","unstructured":"Peters, G.W., Panayi, E.: Understanding modern banking ledgers through blockchain technologies: future of transaction processing and smart contracts on the internet of money. In: Tasca, P., Aste, T., Pelizzon, L., Perony, N. (eds.) Banking Beyond Banks and Money. NEW, pp. 239\u2013278. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42448-4_13"},{"issue":"6","key":"20_CR33","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1093\/jamia\/ocx068","volume":"24","author":"TT Kuo","year":"2017","unstructured":"Kuo, T.T., Kim, H.-E., Ohno-Machado, L.: Blockchain distributed ledger technologies for biomedical and health care applications. J. Am. Med. Inform. Assoc. 24(6), 1211\u20131220 (2017)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"20_CR34","unstructured":"Kuo, T.T., Ohno-Machado, L.: ModelChain: decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks (2018). arXiv preprint: arXiv:1802.01746"},{"key":"20_CR35","doi-asserted-by":"publisher","first-page":"i2770","DOI":"10.1136\/bmj.i2770","volume":"353","author":"EJ Topol","year":"2016","unstructured":"Topol, E.J.: Money back guarantees for non-reproducible results? BMJ 353, i2770 (2016)","journal-title":"BMJ"},{"issue":"1","key":"20_CR36","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1093\/itnow\/bww017","volume":"58","author":"G Baxendale","year":"2016","unstructured":"Baxendale, G.: Can blockchain revolutionise EPRs? ITNOW 58(1), 38\u201339 (2016)","journal-title":"ITNOW"},{"key":"20_CR37","unstructured":"Taylor, P.: Applying blockchain technology to medicine traceability (2016)"},{"key":"20_CR38","unstructured":"Brodersen, C., Kalis, B., Leong, C., et al.: Applying blockchain technology to medicine traceability (2016)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14234-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:05:22Z","timestamp":1709823922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-14234-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030142339","9783030142346"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14234-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/xxhb.fjnu.edu.cn\/inscrypt2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}