{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:15:07Z","timestamp":1743070507973,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031703409"},{"type":"electronic","value":"9783031703416"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70341-6_19","type":"book-chapter","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T20:26:39Z","timestamp":1725049599000},"page":"313-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Label Privacy Source Coding in\u00a0Vertical Federated Learning"],"prefix":"10.1007","author":[{"given":"Dashan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Sheng","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Hanlin","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Lixin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,22]]},"reference":[{"key":"19_CR1","unstructured":"Alemi, A.A., Fischer, I., Dillon, J.V., Murphy, K.: Deep variational information bottleneck (2016). arXiv preprint arXiv:1612.00410"},{"key":"19_CR2","unstructured":"Belghazi, M.I., et al.: Mutual information neural estimation. In: International Conference on Machine Learning, pp. 531\u2013540. PMLR (2018)"},{"issue":"462","key":"19_CR3","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1198\/016214503000125","volume":"98","author":"P B\u00fchlmann","year":"2003","unstructured":"B\u00fchlmann, P., Yu, B.: Boosting with the L2 loss: regression and classification. J. Am. Stat. Assoc. 98(462), 324\u2013339 (2003)","journal-title":"J. Am. Stat. Assoc."},{"issue":"6","key":"19_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIS.2021.3082561","volume":"36","author":"K Cheng","year":"2021","unstructured":"Cheng, K., Fan, T., et al.: SecureBoost: a lossless federated learning framework. IEEE Intell. Syst. 36(6), 87\u201398 (2021)","journal-title":"IEEE Intell. Syst."},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119\u2013139 (1997). https:\/\/doi.org\/10.1006\/jcss.1997.1504","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"19_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: a statistical view of boosting. Ann. Stat. 28(2), 337\u2013407 (2000)","journal-title":"Ann. Stat."},{"key":"19_CR8","unstructured":"Fu, C., Zhang, X., et\u00a0al.: Label inference attacks against vertical federated learning. In: 31st USENIX Security Symposium (USENIX Security 22), Boston, MA (2022)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Fu, F., et al.: VF2Boost: very fast vertical federated gradient boosting for cross-enterprise learning. In: Proceedings of the 2021 International Conference on Management of Data, pp. 563\u2013576 (2021)","DOI":"10.1145\/3448016.3457241"},{"key":"19_CR10","first-page":"27131","volume":"34","author":"B Ghazi","year":"2021","unstructured":"Ghazi, B., Golowich, N., Kumar, R., Manurangsi, P., Zhang, C.: Deep learning with label differential privacy. NeurIPS 34, 27131\u201327145 (2021)","journal-title":"NeurIPS"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Gu, H., Luo, J., Kang, Y., Fan, L., Yang, Q.: FedPass: privacy-preserving vertical federated deep learning with adaptive obfuscation. In: IJCAI-23, pp. 3759\u20133767","DOI":"10.24963\/ijcai.2023\/418"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Guo, H., TANG, R., Ye, Y., Li, Z., He, X.: DeepFM: a factorization-machine based neural network for CTR prediction. In: IJCAI-17, pp. 1725\u20131731 (2017)","DOI":"10.24963\/ijcai.2017\/239"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"He, Z., Zhang, T., Lee, R.B.: Model inversion attacks against collaborative inference. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 148\u2013162 (2019)","DOI":"10.1145\/3359789.3359824"},{"key":"19_CR14","unstructured":"Huang, Y., Song, Z., Li, K., Arora, S.: InstaHide: instance-hiding schemes for private distributed learning. In: Proceedings of the 37th International Conference on Machine Learning. vol.\u00a0119, pp. 4507\u20134518. PMLR (2020)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Johnson, A.E., et al.: MIMIC-III, a freely accessible critical care database. Sci. Data 3(1), 1\u20139 (2016)","DOI":"10.1038\/sdata.2016.35"},{"key":"19_CR16","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization (2014). arXiv preprint arXiv:1412.6980"},{"key":"19_CR17","unstructured":"Li, O., et al.: Label leakage and protection in two-party split learning. In: ICLR (2022)"},{"issue":"4","key":"19_CR18","first-page":"1","volume":"13","author":"Z Ren","year":"2022","unstructured":"Ren, Z., Yang, L., Chen, K.: Improving availability of vertical federated learning: relaxing inference on non-overlapping data. ACM TIST 13(4), 1\u201320 (2022)","journal-title":"ACM TIST"},{"issue":"1","key":"19_CR19","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1108\/03684921311295547","volume":"42","author":"RE Schapire","year":"2013","unstructured":"Schapire, R.E., Freund, Y.: Boosting: foundations and algorithms. Kybernetes 42(1), 164\u2013166 (2013)","journal-title":"Kybernetes"},{"key":"19_CR20","unstructured":"Sun, J., Yang, X., et\u00a0al.: Label leakage and protection from forward embedding in vertical federated learning (2022). arXiv preprint arXiv:2203.01451"},{"key":"19_CR21","unstructured":"Tran, B., Li, J., Madry, A.: Spectral signatures in backdoor attacks. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"issue":"9","key":"19_CR22","doi-asserted-by":"publisher","first-page":"5018","DOI":"10.1109\/TIT.2016.2584610","volume":"62","author":"W Wang","year":"2016","unstructured":"Wang, W., Ying, L., Zhang, J.: On the relation between identifiability, differential privacy, and mutual-information privacy. IEEE Trans. Inf. Theory 62(9), 5018\u20135029 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"19_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM TIST 10(2), 1\u201319 (2019)","journal-title":"ACM TIST"},{"key":"19_CR24","unstructured":"Yang, X., Sun, J., Yao, Y., Xie, J., Wang, C.: Differentially private label protection in split learning (2022). arXiv preprint arXiv:2203.02073"},{"issue":"12","key":"19_CR25","doi-asserted-by":"publisher","first-page":"4428","DOI":"10.1016\/j.patcog.2012.06.006","volume":"45","author":"S Zheng","year":"2012","unstructured":"Zheng, S., Liu, W.: Functional gradient ascent for Probit regression. Pattern Recogn. 45(12), 4428\u20134437 (2012)","journal-title":"Pattern Recogn."},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Zou, T., et al.: Defending batch-level label inference and replacement attacks in vertical federated learning. IEEE Trans. Big Data 1\u201312 (2022)","DOI":"10.1109\/TBDATA.2022.3192121"},{"key":"19_CR27","unstructured":"Zou, T., Liu, Y., Zhang, Y.Q.: Mutual information regularization for vertical federated learning (2023). arXiv preprint arXiv:2301.01142"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases. Research Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70341-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T20:29:33Z","timestamp":1725049773000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70341-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031703409","9783031703416"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70341-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilnius","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}