{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:44:21Z","timestamp":1774964661508,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031467806","type":"print"},{"value":"9783031467813","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-46781-3_27","type":"book-chapter","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T13:02:24Z","timestamp":1698325344000},"page":"321-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Novel Privacy-Preserving Federated Learning Model Based on\u00a0Secure Multi-party Computation"],"prefix":"10.1007","author":[{"given":"Anh Tu","family":"Tran","sequence":"first","affiliation":[]},{"given":"The Dung","family":"Luong","sequence":"additional","affiliation":[]},{"given":"Xuan Sang","family":"Pham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,25]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191 (2017)","DOI":"10.1145\/3133956.3133982"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"22359","DOI":"10.1109\/ACCESS.2022.3151670","volume":"10","author":"A El Ouadrhiri","year":"2022","unstructured":"El Ouadrhiri, A., Abdelhadi, A.: Differential privacy for deep and federated learning: a survey. IEEE Access 10, 22359\u201322380 (2022)","journal-title":"IEEE Access"},{"key":"27_CR3","unstructured":"European Commission: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance) (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"27_CR4","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press (2016). https:\/\/www.deeplearningbook.org"},{"key":"27_CR5","unstructured":"Google: Gboard: a google keyboard (2020). Accessed 17 Apr 2023"},{"key":"27_CR6","unstructured":"Gupta, S., Agrawal, A., Gopalakrishnan, K., Narayanan, P.: Deep learning with limited numerical precision. In: International Conference on Machine Learning (2015)"},{"key":"27_CR7","unstructured":"Kone\u010dn\u00fd, J., McMahan, H.B., Yu, F.X., Richtarik, P., Suresh, A.T., Bacon, D.: Federated learning: Strategies for improving communication efficiency. In: NIPS Workshop on Private Multi-Party Machine Learning (2016). https:\/\/arxiv.org\/abs\/1610.05492"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Liu, C., Chakraborty, S., Verma, D.: Secure model fusion for distributed learning using partial homomorphic encryption. Policy-Based Autonomic Data Governance, pp. 154\u2013179 (2019)","DOI":"10.1007\/978-3-030-17277-0_9"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Moshayedi, A.J., Roy, A.S., Kolahdooz, A., Shuxin, Y.: Deep learning application pros and cons over algorithm deep learning application pros and cons over algorithm. EAI Endorsed Trans. AI Robot. 1(1) (2022)","DOI":"10.4108\/airo.v1i.19"},{"key":"27_CR10","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. arXiv:abs\/1812.00910 (2018)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.neucom.2020.10.014","volume":"422","author":"AT Tran","year":"2021","unstructured":"Tran, A.T., Luong, T.D., Karnjana, J., Huynh, V.N.: An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation. Neurocomputing 422, 245\u2013262 (2021)","journal-title":"Neurocomputing"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Xu, R., Baracaldo, N., Zhou, Y., Anwar, A., Ludwig, H.: Hybridalpha: an efficient approach for privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 13\u201323 (2019)","DOI":"10.1145\/3338501.3357371"},{"key":"27_CR16","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: Batchcrypt: efficient homomorphic encryption for cross-silo federated learning. In: Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 2020) (2020)"}],"container-title":["Lecture Notes in Computer Science","Integrated Uncertainty in Knowledge Modelling and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-46781-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T13:08:26Z","timestamp":1698325706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-46781-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031467806","9783031467813"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-46781-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"25 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IUKM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kanazawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iukm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.jaist.ac.jp\/IUKM\/IUKM2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}