{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:58:30Z","timestamp":1775199510979,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030622220","type":"print"},{"value":"9783030622237","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_36","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"417-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Survey on Privacy-Preserving Machine Learning Protocols"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1012-4595","authenticated-orcid":false,"given":"Ruidi","family":"Yang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"key":"36_CR1","first-page":"1","volume":"41","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Cui, Y., Liu, J.: Application of machine learning in cyberspace security research. Chinese J. Comput. 41, 1\u201334 (2018)","journal-title":"Chinese J. Comput."},{"key":"36_CR2","first-page":"1117","volume":"55","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Dong, Y., Liu, C.: Status, trends and prospects of deep learning applied to cyberspace security. Comput. Res. Dev. 55, 1117 (2018)","journal-title":"Comput. Res. Dev."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321. ACM (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"36_CR4","first-page":"762","volume":"2017","author":"M Chase","year":"2017","unstructured":"Chase, M., Gilad-Bachrach, R., Laine, K., Lauter, K., Rindal, P.: Private Collaborative Neural Network Learning. IACR Crypt. ePrint Archive 2017, 762 (2017)","journal-title":"IACR Crypt. ePrint Archive"},{"key":"36_CR5","unstructured":"Dahl, M.: Private image analysis with MPC: training CNNs on sensitive data using SPDZ (2017).https:\/\/mortendahl.github.io\/2017\/09\/19\/private-image-analysis-with-mpc\/"},{"key":"36_CR6","first-page":"396","volume":"2017","author":"P Mohassel","year":"2017","unstructured":"Mohassel, P., Zhang, Y.: SecureML: A System for Scalable Privacy-Preserving Machine Learning. IACR Crypt. ePrint Archive 2017, 396 (2017)","journal-title":"IACR Crypt. ePrint Archive"},{"key":"36_CR7","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013210 (2016)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 146\u2013151. ACM (2006)","DOI":"10.1145\/1161366.1161393"},{"issue":"1","key":"36_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2007\/37343","volume":"2007","author":"C Orlandi","year":"2007","unstructured":"Orlandi, C., Piva, A., Barni, M.: Oblivious neural network computing via homomorphic encryption. EURASIP J. Inf. Secur. 2007(1), 1\u201311 (2007). https:\/\/doi.org\/10.1155\/2007\/37343","journal-title":"EURASIP J. Inf. Secur."},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Rouhani, B.D., Riazi, M.S., Koushanfar, F.: Deepsecure: Scalable provably-secure deep learning. CoRR.abs\/1705.08963 (2017)","DOI":"10.1145\/3195970.3196023"},{"key":"36_CR11","unstructured":"Riazi, M.S., et. al.: Chameleon: A hybrid secure computation framework for machine learning applications. Cryptology ePrint Archive, Report 2017\/1164 (2017). https:\/\/eprint.iacr.org\/2017\/1164"},{"key":"36_CR12","unstructured":"Juvekar, C., Vaikuntanathan, V., Chandrakasan, A.: GAZELLE: A Low Latency Framework for Secure Neural Network Inference. Cryptology ePrint Archive, Report 2018\/073 (2018). https:\/\/eprint.iacr.org\/2018\/073"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via minionn transformations. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 \u2212 November 03, pp. 619\u2013631 (2017)","DOI":"10.1145\/3133956.3134056"},{"key":"36_CR14","unstructured":"Bourse, F., Minelli, M., Minihold, M., Paillier, P.: Fast homomorphic evaluation of deep discretized neural network. IACR Cryptology ePrint Archive, 2017:1114 (2017). https:\/\/eprint.iacr.org\/2017\/1114"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Laur, S., Lipmaa, H., Mielik\u00a8ainen, T.: Cryptographically private support vector machines. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618\u2013624. ACM (2006)","DOI":"10.1145\/1150402.1150477"},{"issue":"5","key":"36_CR16","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TDSC.2013.51","volume":"11","author":"Y Rahulamathavan","year":"2014","unstructured":"Rahulamathavan, Y., Phan, R.C.-W., Veluru, S., Cumanan, K., Rajarajan, M.: Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud. IEEE Trans. Dependable Secure Comput. 11(5), 467\u2013479 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"36_CR17","unstructured":"Makri, E., Rotaru, D., Smart, N.P., Vercauteren, F.: PICS: Private Image Classification with SVM. IACR Cryptology ePrint Archive 2017\/1190 (2017)"},{"key":"36_CR18","first-page":"857","volume":"2017","author":"A Barnett","year":"2017","unstructured":"Barnett, A., Santokhi, J., Simpson, M., Smart, N.P., Stainton-Bygrave, C., Vivek, S., Waller, A.: Image classification using non-linear support vector machines on encrypted data. IACR Crypt. ePrint Archive 2017, 857 (2017)","journal-title":"IACR Crypt. ePrint Archive"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Lin, K.-P., Chen, M.-S.: Privacy-preserving outsourcing support vector machines with random transformation. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 363\u2013372. ACM (2010)","DOI":"10.1145\/1835804.1835852"},{"issue":"11","key":"36_CR20","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1109\/TKDE.2010.193","volume":"23","author":"K-P Lin","year":"2011","unstructured":"Lin, K.-P., Chen, M.-S.: On the design and analysis of the privacy-preserving SVM classifier. IEEE Trans. Knowl. Data Eng. 23(11), 1704\u20131717 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"36_CR21","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10115-007-0073-7","volume":"14","author":"J Vaidya","year":"2008","unstructured":"Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving SVM classification. Knowl. Inf. Syst. 14(2), 161\u2013178 (2008)","journal-title":"Knowl. Inf. Syst."},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Teo, S.G., Han, S., Lee, V.C.: Privacy preserving support vector machine using non-linear kernels on hadoop mahout. In: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE), pp. 941\u2013948. IEEE (2013)","DOI":"10.1109\/CSE.2013.200"},{"key":"36_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37682-5_1","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"T Graepel","year":"2013","unstructured":"Graepel, T., Lauter, K., Naehrig, M.: ML Confidential: Machine learning on encrypted data. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 1\u201321. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37682-5_1"},{"key":"36_CR24","unstructured":"Aslett, L.J., Esperanca, P.M., Holmes, C.C.: Encrypted Statistical Machine Learning: New Privacy Preserving Methods. arXiv preprint arXiv:1508.06845 (2015)"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23241"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:17:02Z","timestamp":1605003422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}