{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:21:14Z","timestamp":1772644874801,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030172763","type":"print"},{"value":"9783030172770","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-17277-0_9","type":"book-chapter","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T09:55:51Z","timestamp":1556099751000},"page":"154-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Secure Model Fusion for Distributed Learning Using Partial Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Changchang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Supriyo","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Dinesh","family":"Verma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"key":"9_CR1","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S.: Communication-efficient learning of deep networks from decentralized data. arXiv preprint \n                      arXiv:1602.05629\n                      \n                     (2016)"},{"key":"9_CR2","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for federated learning on user-held data. arXiv preprint \n                      arXiv:1611.04482\n                      \n                     (2016)"},{"key":"9_CR3","unstructured":"Verma, D., Julier, S., Cirincione, G.: Federated AI for building AI solutions across multiple agencies. In: AAAI FSS-18: Artificial Intelligence in Government and Public Sector, Arlington, VA, USA (2018)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Wang, S., et al.: When edge meets learning: adaptive control for resource-constrained distributed machine learning. In: IEEE International Conference on Computer Communications (2018)","DOI":"10.1109\/INFOCOM.2018.8486403"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Verma, D., Chakraborty, S., Calo, S., Julier, S., Pasteris, S.: An algorithm for model fusion for distributed learning. In: Ground\/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX, vol. 10635, p. 106350O. International Society for Optics and Photonics (2018)","DOI":"10.1117\/12.2304542"},{"key":"9_CR6","unstructured":"Li, M., et al.: Scaling distributed machine learning with the parameter server. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI), vol. 14, pp. 583\u2013598 (2014)"},{"key":"9_CR7","unstructured":"Kraska, T., Talwalkar, A., Duchi, J.: MLbase: a distributed machine-learning system. In: 6th Biennial Conference on Innovative Data Systems Research (CIDR 2013) (2013)"},{"key":"9_CR8","unstructured":"Dean, J., et al.: Large scale distributed deep networks. In: Advances in Neural Information Processing Systems, pp. 1223\u20131231 (2012)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"9_CR10","unstructured":"Long, Y., et al.: Understanding membership inferences on well-generalized learning models. arXiv preprint \n                      arXiv:1802.04889\n                      \n                     (2018)"},{"key":"9_CR11","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Stanford University (2009)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology\u2014EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). \n                      https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9_CR14","unstructured":"Nakano, K., Olariu, S.: A survey on leader election protocols for radio networks. In: Proceedings. International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN 2002, pp. 71\u201376. IEEE (2002)"},{"key":"9_CR15","unstructured":"Gupta, S., Agrawal, A., Gopalakrishnan, K., Narayanan, P.: Deep learning with limited numerical precision. In: International Conference on Machine Learning, pp. 1737\u20131746 (2015)"},{"issue":"11","key":"9_CR16","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"9_CR17","unstructured":"Snoek, J., Larochelle, H., Adams, R.P.: Practical Bayesian optimization of machine learning algorithms. In: Advances in Neural Information Processing Systems, pp. 2951\u20132959 (2012)"},{"key":"9_CR18","unstructured":"https:\/\/blog.n1analytics.com\/distributed-machine-learning-and-partially-homomorphic-encryption-1\/"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333. ACM (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"9_CR20","unstructured":"Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary version 78 (1998)"}],"container-title":["Lecture Notes in Computer Science","Policy-Based Autonomic Data Governance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17277-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T09:45:04Z","timestamp":1558345504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17277-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030172763","9783030172770"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17277-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}