{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:08:13Z","timestamp":1773187693001,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030968953","type":"print"},{"value":"9783030968960","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96896-0_18","type":"book-chapter","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T12:16:52Z","timestamp":1657196212000},"page":"417-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving Vertical Federated Learning"],"prefix":"10.1007","author":[{"given":"Runhua","family":"Xu","sequence":"first","affiliation":[]},{"given":"Nathalie","family":"Baracaldo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Annie","family":"Abay","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Anwar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"18_CR1","first-page":"128","volume-title":"Decentralizing inner-product functional encryption","author":"M Abdalla","year":"2019","unstructured":"Abdalla M, Benhamouda F, Kohlweiss M, Waldner H (2019) Decentralizing inner-product functional encryption. In: IACR international workshop on public key cryptography. Springer, pp 128\u2013157"},{"key":"18_CR2","unstructured":"Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V (2018) How to backdoor federated learning. Preprint. arXiv:1807.00459"},{"key":"18_CR3","unstructured":"Bonawitz K, Eichner H, Grieskamp W, Huba D, Ingerman A, Ivanov V, Kiddon C, Konecny J, Mazzocchi S, McMahan HB et al (2019) Towards federated learning at scale: System design. Preprint. arXiv:1902.01046"},{"key":"18_CR4","unstructured":"Chen B, Carvalho W, Baracaldo N, Ludwig H, Edwards B, Lee T, Molloy I, Srivastava B (2018) Detecting backdoor attacks on deep neural networks by activation clustering. Preprint. arXiv:1811.03728"},{"key":"18_CR5","unstructured":"Chen T, Jin X, Sun Y, Yin W (2020) Vafl: a method of vertical asynchronous federated learning. Preprint. arXiv:2007.06081"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Chotard J, Sans ED, Gay R, Phan DH, Pointcheval D (2018) Decentralized multi-client functional encryption for inner product. In: International conference on the theory and application of cryptology and information security. Springer, pp 703\u2013732","DOI":"10.1007\/978-3-030-03329-3_24"},{"key":"18_CR7","unstructured":"Corinzia L, Buhmann JM (2019) Variational federated multi-task learning. Preprint. arXiv:1906.06268"},{"key":"18_CR8","unstructured":"Fang C, Li CJ, Lin Z, Zhang T (2018) Spider: Near-optimal non-convex optimization via stochastic path integrated differential estimator. Preprint. arXiv:1807.01695"},{"key":"18_CR9","first-page":"892","volume":"2016","author":"A Gasc\u00f3n","year":"2016","unstructured":"Gasc\u00f3n A, Schoppmann P, Balle B, Raykova M, Doerner J, Zahur S, Evans D (2016) Secure linear regression on vertically partitioned datasets. IACR Cryptology ePrint Archive 2016, 892","journal-title":"IACR Cryptology ePrint Archive"},{"key":"18_CR10","unstructured":"Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: A client level perspective. Preprint. arXiv:1712.07557"},{"issue":"4","key":"18_CR11","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1137\/120880811","volume":"23","author":"S Ghadimi","year":"2013","unstructured":"Ghadimi S, Lan G (2013) Stochastic first-and zeroth-order methods for nonconvex stochastic programming. SIAM J Optim 23(4):2341\u20132368","journal-title":"SIAM J Optim"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Gu B, Dang Z, Li X, Huang H (2020) Federated doubly stochastic kernel learning for vertically partitioned data. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2483\u20132493","DOI":"10.1145\/3394486.3403298"},{"key":"18_CR13","unstructured":"Hardy S, Henecka W, Ivey-Law H, Nock R, Patrini G, Smith G, Thorne B (2017) Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. Preprint. arXiv:1711.10677"},{"key":"18_CR14","first-page":"723","volume":"2019","author":"M Ion","year":"2019","unstructured":"Ion M, Kreuter B, Nergiz AE, Patel S, Raykova M, Saxena S, Seth K, Shanahan D, Yung M (2019) On deploying secure computing commercially: Private intersection-sum protocols and their business applications. IACR Cryptol. ePrint Arch. 2019, 723","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"18_CR15","unstructured":"Jin X, Du R, Chen PY, Chen T (2020) Cafe: Catastrophic data leakage in federated learning. OpenReview - Preprint"},{"key":"18_CR16","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. Preprint. arXiv:1412.6980"},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10107-018-1355-4","volume":"180","author":"G Lan","year":"2020","unstructured":"Lan G, Lee S, Zhou Y (2020) Communication-efficient algorithms for decentralized and stochastic optimization. Math Program 180(1):237\u2013284","journal-title":"Math Program"},{"key":"18_CR18","unstructured":"Li O, Sun J, Yang X, Gao W, Zhang H, Xie J, Smith V, Wang C (2021) Label leakage and protection in two-party split learning. Preprint. arXiv:2102.08504"},{"key":"18_CR19","unstructured":"Ludwig H, Baracaldo N, Thomas G, Zhou Y, Anwar A, Rajamoni S, Ong Y, Radhakrishnan J, Verma A, Sinn M, et al (2020) IBM federated learning: an enterprise framework white paper v0. 1. Preprint. arXiv:2007.10987"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Luo X, Wu Y, Xiao X, Ooi BC (2021) Feature inference attack on model predictions in vertical federated learning. In: 2021 IEEE 37th international conference on data engineering (ICDE). IEEE, pp 181\u2013192","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"18_CR21","unstructured":"McMahan HB, Moore E, Ramage D, Hampson S et al (2016) Communication-efficient learning of deep networks from decentralized data. Preprint. arXiv:1602.05629"},{"issue":"4","key":"18_CR22","first-page":"5","volume":"3","author":"Y Nesterov","year":"1998","unstructured":"Nesterov Y (1998) Introductory lectures on convex programming volume I: Basic course. Lecture Notes 3(4):5","journal-title":"Lecture Notes"},{"key":"18_CR23","unstructured":"Nock R, Hardy S, Henecka W, Ivey-Law H, Patrini G, Smith G, Thorne B (2018) Entity resolution and federated learning get a federated resolution. Preprint. arXiv:1803.04035"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Schnell R, Bachteler T, Reiher J (2011) A novel error-tolerant anonymous linking code. German Record Linkage Center, Working Paper Series No. WP-GRLC-2011-02","DOI":"10.2139\/ssrn.3549247"},{"key":"18_CR25","unstructured":"Singh A, Vepakomma P, Gupta O, Raskar R (2019) Detailed comparison of communication efficiency of split learning and federated learning. Preprint. arXiv:1909.09145"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Slavkovic AB, Nardi Y, Tibbits MM (2007) Secure logistic regression of horizontally and vertically partitioned distributed databases. In: Seventh IEEE international conference on data mining workshops (ICDMW 2007). IEEE, pp. 723\u2013728","DOI":"10.1109\/ICDMW.2007.114"},{"key":"18_CR27","unstructured":"Thapa C, Chamikara MAP, Camtepe S (2020) Splitfed: When federated learning meets split learning. Preprint. arXiv:2004.12088"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Vaidya J (2008) A survey of privacy-preserving methods across vertically partitioned data. In: Privacy-preserving data mining. Springer, pp 337\u2013358","DOI":"10.1007\/978-0-387-70992-5_14"},{"issue":"3","key":"18_CR29","first-page":"14","volume":"2","author":"J Vaidya","year":"2008","unstructured":"Vaidya J, Clifton C, Kantarcioglu M, Patterson AS (2008) Privacy-preserving decision trees over vertically partitioned data. ACM Trans Knowl Discov Data (TKDD) 2(3):14","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"18_CR30","unstructured":"Vepakomma P, Gupta O, Swedish T, Raskar R (2018) Split learning for health: Distributed deep learning without sharing raw patient data. Preprint. arXiv:1812.00564"},{"key":"18_CR31","unstructured":"Wang C, Liang J, Huang M, Bai B, Bai K, Li H (2020) Hybrid differentially private federated learning on vertically partitioned data. Preprint. arXiv:2009.02763"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Xu R, Baracaldo N, Zhou Y, Anwar A, Ludwig H (2019) Hybridalpha: An efficient approach for privacy-preserving federated learning. In: Proceedings of the 12th ACM workshop on artificial intelligence and security. ACM","DOI":"10.1145\/3338501.3357371"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Xu R, Baracaldo N, Zhou Y, Anwar A, Joshi J, Ludwig H (2021) Fedv: Privacy-preserving federated learning over vertically partitioned data. Preprint. arXiv:2103.03918","DOI":"10.1145\/3474369.3486872"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Yang, K, Fan T, Chen T, Shi Y, Yang Q (2019) A quasi-newton method based vertical federated learning framework for logistic regression. Preprint. arXiv:1912.00513","DOI":"10.1007\/978-3-031-01585-4_5"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Yu H, Vaidya J, Jiang X (2006) Privacy-preserving SVM classification on vertically partitioned data. In: Pacific-Asia conference on knowledge discovery and data mining. Springer, pp 647\u2013656","DOI":"10.1007\/11731139_74"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Zhang Q, Gu B, Deng C, Huang H (2021) Secure bilevel asynchronous vertical federated learning with backward updating. Preprint. arXiv:2103.00958","DOI":"10.1609\/aaai.v35i12.17301"},{"key":"18_CR37","unstructured":"Zhao Y, Li M, Lai L, Suda N, Civin D, Chandra V (2018) Federated learning with non-IID data. Preprint. arXiv:1806.00582"}],"container-title":["Federated Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96896-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T02:23:38Z","timestamp":1676082218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96896-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030968953","9783030968960"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96896-0_18","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}