{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:41:49Z","timestamp":1726062109596},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030369378"},{"type":"electronic","value":"9783030369385"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36938-5_21","type":"book-chapter","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:04:11Z","timestamp":1575936251000},"page":"352-370","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preserving Machine Learning with Limited Information Leakage"],"prefix":"10.1007","author":[{"given":"Wenyi","family":"Tang","sequence":"first","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Suyun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Boning","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yunzhi","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 308\u2013318. ACM (2016). \nhttps:\/\/doi.org\/10.1145\/2976749.2978318\n\n, \nhttp:\/\/doi.acm.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Weikum, G., K\u00f6nig, A.C., De\u00dfloch, S. (eds.) Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, 13\u201318 June 2004, pp. 563\u2013574. ACM (2004). \nhttps:\/\/doi.org\/10.1145\/1007568.1007632\n\n, \nhttp:\/\/doi.acm.org\/10.1145\/1007568.1007632","DOI":"10.1145\/1007568.1007632"},{"key":"21_CR3","doi-asserted-by":"publisher","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Chen, W., Naughton, J.F., Bernstein, P.A. (eds.) Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 16\u201318 May 2000, Dallas, Texas, USA, pp. 439\u2013450. ACM (2000). \nhttps:\/\/doi.org\/10.1145\/342009.335438\n\n, \nhttp:\/\/doi.acm.org\/10.1145\/342009.335438","DOI":"10.1145\/342009.335438"},{"issue":"2","key":"21_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1345448.1345465","volume":"9","author":"RM Bell","year":"2007","unstructured":"Bell, R.M., Koren, Y.: Lessons from the Netflix prize challenge. SIGKDD Explor. 9(2), 75\u201379 (2007). \nhttps:\/\/doi.org\/10.1145\/1345448.1345465\n\n. \nhttp:\/\/doi.acm.org\/10.1145\/1345448.1345465","journal-title":"SIGKDD Explor."},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01001-9_13"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-22792-9_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"A Boldyreva","year":"2011","unstructured":"Boldyreva, A., Chenette, N., O\u2019Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578\u2013595. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-22792-9_33"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/978-3-662-46803-6_19","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"D Boneh","year":"2015","unstructured":"Boneh, D., Lewi, K., Raykova, M., Sahai, A., Zhandry, M., Zimmerman, J.: Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 563\u2013594. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46803-6_19"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, 8\u201311 February 2015. The Internet Society (2015). \nhttps:\/\/www.ndss-symposium.org\/ndss2015\/machine-learning-classification-over-encrypted-data","DOI":"10.14722\/ndss.2015.23241"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-662-52993-5_24","volume-title":"Fast Software Encryption","author":"N Chenette","year":"2016","unstructured":"Chenette, N., Lewi, K., Weis, S.A., Wu, D.J.: Practical order-revealing encryption with limited leakage. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 474\u2013493. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-662-52993-5_24"},{"key":"21_CR10","unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017). \nhttp:\/\/archive.ics.uci.edu\/ml"},{"key":"21_CR11","doi-asserted-by":"publisher","unstructured":"Durak, F.B., DuBuisson, T.M., Cash, D.: What else is revealed by order-revealing encryption? In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 1155\u20131166. ACM (2016). \nhttps:\/\/doi.org\/10.1145\/2976749.2978379","DOI":"10.1145\/2976749.2978379"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, 31 May\u20132 June, 2009, pp. 169\u2013178. ACM (2009). \nhttps:\/\/doi.org\/10.1145\/1536414.1536440\n\n, \nhttp:\/\/doi.acm.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"21_CR14","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K.E., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Balcan, M., Weinberger, K.Q. (eds.) Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, 19\u201324 June 2016. JMLR Workshop and Conference Proceedings, vol. 48, pp. 201\u2013210 (2016). \nJMLR.org\n\n, \nhttp:\/\/jmlr.org\/proceedings\/papers\/v48\/gilad-bachrach16.html"},{"key":"21_CR15","doi-asserted-by":"publisher","unstructured":"Grubbs, P., Sekniqi, K., Bindschaedler, V., Naveed, M., Ristenpart, T.: Leakage-abuse attacks against order-revealing encryption. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22\u201326 May 2017, pp. 655\u2013672. IEEE Computer Society (2017). \nhttps:\/\/doi.org\/10.1109\/SP.2017.44","DOI":"10.1109\/SP.2017.44"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Kerschbaum, F.: Frequency-hiding order-preserving encryption. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12\u201316 October 2015, pp. 656\u2013667. ACM (2015). \nhttps:\/\/doi.org\/10.1145\/2810103.2813629","DOI":"10.1145\/2810103.2813629"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-319-72359-4_30","volume-title":"Information Security Practice and Experience","author":"Y-N Li","year":"2017","unstructured":"Li, Y.-N., Wu, Q., Tang, W., Qin, B., Wang, Q., Miao, M.: Outsourcing encrypted excel files. In: Liu, J.K., Samarati, P. (eds.) ISPEC 2017. LNCS, vol. 10701, pp. 506\u2013524. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-72359-4_30"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"Y Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36\u201354. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-44598-6_3"},{"key":"21_CR19","doi-asserted-by":"publisher","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via MiniONN transformations. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October\u201303 November 2017, pp. 619\u2013631. ACM (2017). \nhttps:\/\/doi.org\/10.1145\/3133956.3134056","DOI":"10.1145\/3133956.3134056"},{"key":"21_CR20","unstructured":"Meng, X., et al.: Personalized privacy-preserving social recommendation. In: McIlraith, S.A., Weinberger, K.Q. (eds.) Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, New Orleans, Louisiana, USA, 2\u20137 February 2018. AAAI Press (2018). \nhttps:\/\/www.aaai.org\/ocs\/index.php\/AAAI\/AAAI18\/paper\/view\/16768"},{"key":"21_CR21","doi-asserted-by":"publisher","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22\u201326 May 2017, pp. 19\u201338. IEEE Computer Society (2017). \nhttps:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"21_CR22","doi-asserted-by":"publisher","unstructured":"Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, 19\u201322 May 2013, pp. 334\u2013348. IEEE Computer Society (2013). \nhttps:\/\/doi.org\/10.1109\/SP.2013.30","DOI":"10.1109\/SP.2013.30"},{"key":"21_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-642-29011-4_23","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"O Pandey","year":"2012","unstructured":"Pandey, O., Rouselakis, Y.: Property preserving symmetric encryption. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 375\u2013391. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-29011-4_23"},{"key":"21_CR24","unstructured":"Papernot, N., Abadi, M., Erlingsson, \u00da., Goodfellow, I.J., Talwar, K.: Semi-supervised knowledge transfer for deep learning from private training data. CoRR abs\/1610.05755 (2016). \nhttp:\/\/arxiv.org\/abs\/1610.05755"},{"key":"21_CR25","doi-asserted-by":"publisher","unstructured":"Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, 19\u201322 May 2013, pp. 463\u2013477. IEEE Computer Society (2013). \nhttps:\/\/doi.org\/10.1109\/SP.2013.38","DOI":"10.1109\/SP.2013.38"},{"key":"21_CR26","doi-asserted-by":"publisher","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12\u201316 October 2015, pp. 1310\u20131321. ACM (2015). \nhttps:\/\/doi.org\/10.1145\/2810103.2813687\n\n, \nhttp:\/\/doi.acm.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"key":"21_CR27","doi-asserted-by":"publisher","unstructured":"Yao, A.C.: Protocols for secure computations (extended abstract). In: 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, 3\u20135 November 1982, pp. 160\u2013164. IEEE Computer Society (1982). \nhttps:\/\/doi.org\/10.1109\/SFCS.1982.38","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36938-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:07:30Z","timestamp":1575936450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36938-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030369378","9783030369385"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36938-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sapporo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}