{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:39:30Z","timestamp":1770341970931,"version":"3.49.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030630751","type":"print"},{"value":"9783030630768","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63076-8_19","type":"book-chapter","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T20:03:24Z","timestamp":1606334604000},"page":"269-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-Preserving Stacking with Application to Cross-organizational Diabetes Prediction"],"prefix":"10.1007","author":[{"given":"Xiawei","family":"Guo","sequence":"first","affiliation":[]},{"given":"Quanming","family":"Yao","sequence":"additional","affiliation":[]},{"given":"James","family":"Kwok","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Yuqiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenyuan","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,26]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: SIGSAC, pp. 308\u2013318. ACM (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bassily, R., Smith, A., Thakurta, A.: Private empirical risk minimization: efficient algorithms and tight error bounds. In: FOCS, pp. 464\u2013473. IEEE (2014)","DOI":"10.1109\/FOCS.2014.56"},{"issue":"1","key":"19_CR3","first-page":"1","volume":"3","author":"S Boyd","year":"2011","unstructured":"Boyd, S., Parikh, N., Chu, E.: Distributed optimization and statistical learning via the alternating direction method of multipliers. Found. Trends\u00ae Mach. Learn. 3(1), 1\u2013122 (2011)","journal-title":"Found. Trends\u00ae Mach. Learn."},{"issue":"2","key":"19_CR4","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. ML 24(2), 123\u2013140 (1996)","journal-title":"ML"},{"issue":"1","key":"19_CR5","first-page":"49","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Stacked regressions. ML 24(1), 49\u201364 (1996)","journal-title":"ML"},{"key":"19_CR6","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.: Differentially private empirical risk minimization. JMLR 12, 1069\u20131109 (2011)","journal-title":"JMLR"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"3\u20134","key":"19_CR8","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Mach. Learn. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends\u00ae Mach. Learn."},{"issue":"3","key":"19_CR9","first-page":"255","volume":"54","author":"S D\u017eeroski","year":"2004","unstructured":"D\u017eeroski, S., \u017denko, B.: Is combining classifiers with stacking better than selecting the best one? ML 54(3), 255\u2013273 (2004)","journal-title":"ML"},{"issue":"2","key":"19_CR10","first-page":"348","volume":"63","author":"F Emek\u00e7i","year":"2007","unstructured":"Emek\u00e7i, F., Sahin, O., Agrawal, D., El Abbadi, A.: Privacy preserving decision tree learning over multiple parties. TKDE 63(2), 348\u2013361 (2007)","journal-title":"TKDE"},{"issue":"2","key":"19_CR11","first-page":"353","volume":"24","author":"P Fong","year":"2012","unstructured":"Fong, P., Weber-Jahnke, J.: Privacy preserving decision tree learning using unrealized data sets. TKDE 24(2), 353\u2013364 (2012)","journal-title":"TKDE"},{"issue":"2","key":"19_CR12","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: a statistical view of boosting. Ann. Stat. 28(2), 337\u2013407 (2000)","journal-title":"Ann. Stat."},{"key":"19_CR13","series-title":"Springer Series in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. SSS. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-84858-7"},{"key":"19_CR14","unstructured":"Hamm, J., Cao, Y., Belkin, M.: Learning privately from multiparty data. In: ICML. pp. ,555\u2013563 (2016)"},{"issue":"3","key":"19_CR15","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1148\/radiology.148.3.6878708","volume":"148","author":"J Hanley","year":"1983","unstructured":"Hanley, J., McNeil, B.: A method of comparing the areas under receiver operating characteristic curves derived from the same cases. Radiology 148(3), 839\u2013843 (1983)","journal-title":"Radiology"},{"key":"19_CR16","unstructured":"Kasiviswanathan, P., Jin, H.: Efficient private empirical risk minimization for high-dimensional learning. In: ICML, pp. 488\u2013497 (2016)"},{"key":"19_CR17","unstructured":"Kuzborskij, I., Orabona, F.: Stability and hypothesis transfer learning. In: ICML, pp. 942\u2013950 (2013)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Lang, K.: NewsWeeder: learning to filter netnews. In: ICML. Citeseer (1995)","DOI":"10.1016\/B978-1-55860-377-6.50048-7"},{"issue":"11","key":"19_CR19","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"19_CR20","unstructured":"Ozay, M., Vural, F.: A new fuzzy stacked generalization technique and analysis of its performance. Technical report. arXiv:1204.0171 (2012)"},{"issue":"10","key":"19_CR21","first-page":"1345","volume":"22","author":"J Pan","year":"2010","unstructured":"Pan, J., Yang, Q.: A survey on transfer learning. TKDE 22(10), 1345\u20131359 (2010)","journal-title":"TKDE"},{"key":"19_CR22","unstructured":"Papernot, N., Abadi, M., Erlingsson, U., Goodfellow, I., Talwar, K.: Semi-supervised knowledge transfer for deep learning from private training data. In: ICLR (2017)"},{"key":"19_CR23","unstructured":"Pathak, M., Rane, S., Raj, B.: Multiparty differential privacy via aggregation of locally trained classifiers. In: NIPS, pp. 1876\u20131884 (2010)"},{"key":"19_CR24","unstructured":"Rajkumar, A., Agarwal, S.: A differentially private stochastic gradient descent algorithm for multiparty classification. In: AISTAT, pp. 933\u2013941 (2012)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: SIGSAC, pp. 1310\u20131321 (2015)","DOI":"10.1145\/2810103.2813687"},{"issue":"1\u20132","key":"19_CR26","first-page":"59","volume":"36","author":"P Smyth","year":"1999","unstructured":"Smyth, P., Wolpert, D.: Linearly combining density estimators via stacking. ML 36(1\u20132), 59\u201383 (1999)","journal-title":"ML"},{"key":"19_CR27","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1613\/jair.594","volume":"10","author":"K Ting","year":"1999","unstructured":"Ting, K., Witten, I.: Issues in stacked generalization. JAIR 10, 271\u2013289 (1999)","journal-title":"JAIR"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Y., Gu, Q., Brown, D.: Differentially private hypothesis transfer learning. In: ECML (2018)","DOI":"10.1007\/978-3-030-10928-8_48"},{"issue":"2","key":"19_CR29","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"D Wolpert","year":"1992","unstructured":"Wolpert, D.: Stacked generalization. Neural Netw. 5(2), 241\u2013259 (1992)","journal-title":"Neural Netw."},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Xie, L., Baytas, I., Lin, K., Zhou, J.: Privacy-preserving distributed multi-task learning with asynchronous updates. In: SIGKDD, pp. 1195\u20131204 (2017)","DOI":"10.1145\/3097983.3098152"},{"key":"19_CR31","doi-asserted-by":"publisher","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods: Foundations and Algorithms","author":"ZH Zhou","year":"2012","unstructured":"Zhou, Z.H.: Ensemble Methods: Foundations and Algorithms. Chapman and Hall\/CRC, New York (2012)"}],"container-title":["Lecture Notes in Computer Science","Federated Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63076-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T11:15:22Z","timestamp":1606389322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63076-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630751","9783030630768"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63076-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"26 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}