{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:57:05Z","timestamp":1743019025547,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031703409"},{"type":"electronic","value":"9783031703416"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70341-6_13","type":"book-chapter","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T20:26:39Z","timestamp":1725049599000},"page":"212-229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Dataset Condensation for\u00a0Privacy-Preserving and\u00a0Efficient Vertical Federated Learning"],"prefix":"10.1007","author":[{"given":"Dashan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Canhui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaojin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,22]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/3-540-44750-4_8","volume-title":"Advances in Cryptology \u2014 CRYPT0\u2019 95","author":"D Beaver","year":"1995","unstructured":"Beaver, D.: Precomputing oblivious transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97\u2013109. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-44750-4_8"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191 (2017)","DOI":"10.1145\/3133956.3133982"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., Chien, S., Nasr, M., Song, S., Terzis, A., Tramer, F.: Membership inference attacks from first principles. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1897\u20131914. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"13_CR5","unstructured":"Carlini, N., Feldman, V., Nasr, M.: No free lunch in \u201cprivacy for free: how does dataset condensation help privacy\u201d (2022)"},{"key":"13_CR6","unstructured":"Chen, C., et al.: Vertically federated graph neural network for privacy-preserving node classification. arXiv preprint arXiv:2005.11903 (2020)"},{"issue":"6","key":"13_CR7","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIS.2021.3082561","volume":"36","author":"K Cheng","year":"2021","unstructured":"Cheng, K., et al.: Secureboost: a lossless federated learning framework. IEEE Intell. Syst. 36(6), 87\u201398 (2021)","journal-title":"IEEE Intell. Syst."},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A., et\u00a0al.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"13_CR11","unstructured":"Fu, C., et al.: Label inference attacks against vertical federated learning. In: 31st USENIX Security Symposium (USENIX Security 2022), Boston, MA, pp. 1397\u20131414. USENIX Association (2022)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Fu, F., et al.: VF2Boost: very fast vertical federated gradient boosting for cross-enterprise learning. In: Proceedings of the 2021 International Conference on Management of Data, pp. 563\u2013576 (2021)","DOI":"10.1145\/3448016.3457241"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Gu, H., Luo, J., Kang, Y., Fan, L., Yang, Q.: Fedpass: privacy-preserving vertical federated deep learning with adaptive obfuscation. In: Elkind, E. (ed.) Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, pp. 3759\u20133767 (2023)","DOI":"10.24963\/ijcai.2023\/418"},{"key":"13_CR14","unstructured":"Huang, L., Li, Z., Sun, J., Zhao, H.: Coresets for vertical federated learning: regularized linear regression and $$ k $$-means clustering. In: Advances in Neural Information Processing Systems, vol. 35, pp. 29566\u201329581 (2022)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Johnson, A.E., et al.: MIMIC-III, a freely accessible critical care database. Sci. Data 3(1), 1\u20139 (2016)","DOI":"10.1038\/sdata.2016.35"},{"key":"13_CR16","unstructured":"Li, D., Wang, J.: Fedmd: heterogenous federated learning via model distillation. arXiv preprint arXiv:1910.03581 (2019)"},{"key":"13_CR17","unstructured":"Li, O., et al.: Label leakage and protection in two-party split learning. In: International Conference on Learning Representations (ICLR) (2022)"},{"key":"13_CR18","unstructured":"Li, Z., Wang, T., Li, N.: Differentially private vertical federated clustering. arXiv preprint arXiv:2208.01700 (2022)"},{"key":"13_CR19","unstructured":"Liu, P., Yu, X., Zhou, J.T.: Meta knowledge condensation for federated learning. In: The Eleventh International Conference on Learning Representations ICLR (2023)"},{"key":"13_CR20","unstructured":"Liu, Y., et al.: Vertical federated learning: concepts, advances and challenges (2023)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Mansouri, M., \u00d6nen, M., Jaballah, W.B., Conti, M.: SoK: secure aggregation based on cryptographic schemes for federated learning. In: PETS 2023, 23rd Privacy Enhancing Technologies Symposium, vol.\u00a02023, pp. 140\u2013157 (2023)","DOI":"10.56553\/popets-2023-0009"},{"key":"13_CR22","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-031-51482-1_2","volume-title":"Computer Security - ESORICS 2023","author":"Y Mao","year":"2024","unstructured":"Mao, Y., Xin, Z., Li, Z., Hong, J., Yang, Q., Zhong, S.: Secure split learning against property inference, data reconstruction, and feature space hijacking attacks. In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds.) ESORICS 2023. LNCS, vol. 14347, pp. 23\u201343. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-51482-1_2"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Mawuli, C.B., Che, L., Kumar, J., Din, S.U., Qin, Z., Yang, Q., Shao, J.: Fedstream: Prototype-based federated learning on distributed concept-drifting data streams. IEEE Trans. Syst. Man Cybern. Syst. (2023)","DOI":"10.1109\/TSMC.2023.3293462"},{"key":"13_CR24","unstructured":"Oh, S., et al.: Differentially private cutmix for split learning with vision transformer (2022)"},{"issue":"11","key":"13_CR25","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"13_CR27","unstructured":"Tran, L., Castiglia, T., Patterson, S., Milanova, A.: Privacy tradeoffs in vertical federated learning. In: Federated Learning Systems (FLSys) Workshop @ MLSys 2023 (2023)"},{"key":"13_CR28","unstructured":"Vepakomma, P., Gupta, O., Swedish, T., Raskar, R.: Split learning for health: distributed deep learning without sharing raw patient data. arXiv preprint arXiv:1812.00564 (2018)"},{"key":"13_CR29","unstructured":"Wang, T., Zhu, J.Y., Torralba, A., Efros, A.A.: Dataset distillation. arXiv preprint arXiv:1811.10959 (2018)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Xiong, Y., Wang, R., Cheng, M., Yu, F., Hsieh, C.J.: Feddm: iterative distribution matching for communication-efficient federated learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16323\u201316332 (2023)","DOI":"10.1109\/CVPR52729.2023.01566"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Yang, M., Xu, J., Ding, W., Liu, Y.: Fedhap: federated hashing with global prototypes for cross-silo retrieval. IEEE Trans. Parallel Distrib. Syst. (2023)","DOI":"10.1109\/TPDS.2023.3324426"},{"issue":"2","key":"13_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"13_CR33","doi-asserted-by":"publisher","unstructured":"Yao, D., Xiang, L., Xu, H., Ye, H., Chen, Y.: Privacy-preserving split learning via patch shuffling over transformers. In: 2022 IEEE International Conference on Data Mining (ICDM), pp. 638\u2013647 (2022). https:\/\/doi.org\/10.1109\/ICDM54844.2022.00074","DOI":"10.1109\/ICDM54844.2022.00074"},{"key":"13_CR34","unstructured":"Yu, L., et al.: A survey of privacy threats and defense in vertical federated learning: from model life cycle perspective (2024)"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, B., Bilen, H.: Dataset condensation with distribution matching. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 6514\u20136523 (2023)","DOI":"10.1109\/WACV56688.2023.00645"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases. Research Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70341-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T20:28:50Z","timestamp":1725049730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70341-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031703409","9783031703416"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70341-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilnius","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}