{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T17:21:06Z","timestamp":1776446466875,"version":"3.51.2"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031301100","type":"print"},{"value":"9783031301117","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30111-7_57","type":"book-chapter","created":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T01:02:51Z","timestamp":1681261371000},"page":"683-692","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Permissioned Blockchain-Based XGBoost for\u00a0Multi Banks Fraud Detection"],"prefix":"10.1007","author":[{"given":"Septiviana Savitri","family":"Asrori","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7553-423X","authenticated-orcid":false,"given":"Lihua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Seiichi","family":"Ozawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,13]]},"reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191 (2017)","DOI":"10.1145\/3133956.3133982"},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"57_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2604-9","volume-title":"Blockchain Basics: A Non-technical Introduction in 25 Steps","author":"D Drescher","year":"2017","unstructured":"Drescher, D.: Blockchain Basics: A Non-technical Introduction in 25 Steps, 1st edn. Apress, USA (2017)","edition":"1"},{"key":"57_CR4","unstructured":"Konecn\u1ef3, J., McMahan, H.B., Ramage, D., Richt\u00e1rik, P.: Federated optimization: distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527 (2016)"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Mazzoni, M., Corradi, A., Di Nicola, V.: Performance evaluation of permissioned blockchains for financial applications: the consensys quorum case study. Blockchain: Res. Appl. 3(1), 100026 (2022)","DOI":"10.1016\/j.bcra.2021.100026"},{"key":"57_CR6","doi-asserted-by":"publisher","first-page":"12806","DOI":"10.1109\/JIOT.2021.3072611","volume":"8","author":"DC Nguyen","year":"2021","unstructured":"Nguyen, D.C., et al.: Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet Things J. 8, 12806\u201312825 (2021)","journal-title":"IEEE Internet Things J."},{"key":"57_CR7","unstructured":"Van Rossum, G., Drake Jr., F.L.: Python reference manual. Centrum voor Wiskunde en Informatica Amsterdam (1995)"},{"issue":"7862","key":"57_CR8","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1038\/s41586-021-03583-3","volume":"594","author":"S Warnat-Herresthal","year":"2021","unstructured":"Warnat-Herresthal, S., et al.: Swarm learning for decentralized and confidential clinical machine learning. Nature 594(7862), 265\u2013270 (2021)","journal-title":"Nature"},{"key":"57_CR9","doi-asserted-by":"publisher","first-page":"43954","DOI":"10.1109\/ACCESS.2022.3169502","volume":"10","author":"F Yamamoto","year":"2022","unstructured":"Yamamoto, F., Ozawa, S., Wang, L.: EFL-boost: efficient federated learning for gradient boosting decision trees. IEEE Access 10, 43954\u201343963 (2022)","journal-title":"IEEE Access"},{"key":"57_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1007\/978-3-030-63833-7_47","volume-title":"Neural Information Processing","author":"F Yamamoto","year":"2020","unstructured":"Yamamoto, F., Wang, L., Ozawa, S.: New approaches to federated XGBoost learning for privacy-preserving data analysis. In: Yang, H., Pasupa, K., Leung, A.C.-S., Kwok, J.T., Chan, J.H., King, I. (eds.) ICONIP 2020. LNCS, vol. 12533, pp. 558\u2013569. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63833-7_47"},{"key":"57_CR11","doi-asserted-by":"publisher","unstructured":"Yang, R., et al.: Public and private blockchain in construction business process and information integration. Autom. Constr. 118 (2020). https:\/\/doi.org\/10.1016\/j.autcon.2020.103276, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0926580520301886","DOI":"10.1016\/j.autcon.2020.103276"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30111-7_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:31:16Z","timestamp":1776443476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30111-7_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031301100","9783031301117"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30111-7_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iconip2022.apnns.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}