{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:43:07Z","timestamp":1775230987596,"version":"3.50.1"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031708893","type":"print"},{"value":"9783031708909","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70890-9_18","type":"book-chapter","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:24:24Z","timestamp":1725528264000},"page":"353-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BMI: Bounded Mutual Information for\u00a0Efficient Privacy-Preserving Feature Selection"],"prefix":"10.1007","author":[{"given":"David","family":"Eklund","sequence":"first","affiliation":[]},{"given":"Alfonso","family":"Iacovazzi","sequence":"additional","affiliation":[]},{"given":"Han","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Apostolos","family":"Pyrgelis","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,6]]},"reference":[{"key":"18_CR1","unstructured":"Akavia, A., Galili, B., Shaul, H., Weiss, M., Yakhini, Z.: Privacy preserving feature selection for sparse linear regression. Cryptology ePrint Archive, Paper 2023\/1354 (2023). https:\/\/eprint.iacr.org\/2023\/1354"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Alishahi, M., Moghtadaiee, V.: Feature selection on anonymized datasets. In: IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC) (2023)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361521"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Alishahi, M., Moghtadaiee, V., Navidan, H.: Add noise to remove noise: local differential privacy for feature selection. Comput. Secur. (2022)","DOI":"10.1016\/j.cose.2022.102934"},{"key":"18_CR4","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S., et\u00a0al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. (2017)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedings of the 2016 ACM Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978331"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Banerjee, M., Chakravarty, S.: Privacy preserving feature selection for distributed data using virtual dimension. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management (2011)","DOI":"10.1145\/2063576.2063946"},{"key":"18_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-030-92307-5_56","volume-title":"Neural Information Processing","author":"S Banerjee","year":"2021","unstructured":"Banerjee, S., Elmroth, E., Bhuyan, M.: Fed-FiS: a\u00a0novel information-theoretic federated feature selection for\u00a0learning stability. In: Mantoro, T., Lee, M., Ayu, M.A., Wong, K.W., Hidayanto, A.N. (eds.) ICONIP 2021. CCIS, vol. 1516, pp. 480\u2013487. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92307-5_56"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Battiti, R.: Using mutual information for selecting features in supervised neural net learning. IEEE Trans. Neural Netw. (1994)","DOI":"10.1109\/72.298224"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer Security - ESORICS 2008","author":"D Bogdanov","year":"2008","unstructured":"Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192\u2013206. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88313-5_13"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Cassara, P., Gotta, A., Valerio, L.: Federated feature selection for cyber-physical systems of systems. IEEE Trans. Veh. Technol. (2022)","DOI":"10.1109\/TVT.2022.3178612"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-15317-4_13","volume-title":"Security and Cryptography for Networks","author":"O Catrina","year":"2010","unstructured":"Catrina, O., de Hoogh, S.: Improved primitives for secure multiparty integer computation. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 182\u2013199. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15317-4_13"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-14577-3_6","volume-title":"Financial Cryptography and Data Security","author":"O Catrina","year":"2010","unstructured":"Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35\u201350. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_6"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. (2014)","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"18_CR14","unstructured":"Covert, I.C., Qiu, W., Lu, M., Kim, N.Y., White, N.J., Lee, S.-I.: Learning to maximize mutual information for dynamic feature selection. In: International Conference on Machine Learning. PMLR (2023)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Cramer, R., Damg\u00e5rd, I.B., et\u00a0al.: Secure Multiparty Computation. Cambridge University Press (2015)","DOI":"10.1017\/CBO9781107337756"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Dankar, F.K., Madathil, N., Dankar, S.K., Boughorbel, S.: Privacy-preserving analysis of distributed biomedical data: designing efficient and secure multiparty computations using distributed statistical learning theory. JMIR Med. Inf. (2019)","DOI":"10.2196\/12702"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Evans, D., Kolesnikov, V., Rosulek, M., et\u00a0al.: A pragmatic introduction to secure multi-party computation. Found. Trends\u00ae Priv. Secur. (2018)","DOI":"10.1561\/9781680835090"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Froelicher, D., et al.: Scalable and privacy-preserving federated principal component analysis. In: IEEE Symposium on Security and Privacy (SP) (2023)","DOI":"10.1109\/SP46215.2023.10179350"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Froelicher, D., et al.: Scalable privacy-preserving distributed learning. In: Proceedings on Privacy Enhancing Technologies (2021)","DOI":"10.2478\/popets-2021-0030"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Fu, R., Wu, Y., Xu, Q., Zhang, M.: FEAST: a communication-efficient federated feature selection framework for relational data. Proc. ACM Manag. Data (2023)","DOI":"10.1145\/3588961"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Gasc\u00f3n, A.: Privacy-preserving distributed linear regression on high-dimensional data. Proc. Priv. Enhancing Technol. (2017)","DOI":"10.1515\/popets-2017-0053"},{"key":"18_CR22","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority, pp. 307\u2013328. Association for Computing Machinery (2019)"},{"key":"18_CR23","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. (2003)"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Hu, Y., Zhang, Y., Gong, D., Sun, X.: Multi-participant federated feature selection algorithm with particle swarm optimizaiton for imbalanced data under privacy protection. IEEE Trans. Artif. Intell. (2022)","DOI":"10.1109\/TAI.2022.3145333"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Jafer, Y., Matwin, S., Sokolova, M.: A framework for a privacy-aware feature selection evaluation measure. In: 13th Annual Conference on Privacy, Security and Trust (PST). IEEE (2015)","DOI":"10.1109\/PST.2015.7232955"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Kamm, L., Bogdanov, D., Laur, S., Vilo, J.: A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics (2013)","DOI":"10.1093\/bioinformatics\/btt066"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Karhu, T.: Desaturation event scoring criteria affect the perceived severity of nocturnal hypoxic load. Sleep Med. 100, 479\u2013486 (2022)","DOI":"10.1016\/j.sleep.2022.09.024"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Karhu, T., Lepp\u00e4nen, T., T\u00f6yr\u00e4s, J., Oksenberg, A., Myllymaa, S., Nikkonen, S.: ABOSA - freely available automatic blood oxygen saturation signal analysis software: structure and validation. Comput. Methods Programs Biomed. (2022)","DOI":"10.1016\/j.cmpb.2022.107120"},{"key":"18_CR29","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2021.657126","volume":"15","author":"T Karhu","year":"2021","unstructured":"Karhu, T., Myllymaa, S., Nikkonen, S., Mazzotti, D.R., T\u00f6yr\u00e4s, J., Lepp\u00e4nen, T.: Longer and deeper desaturations are associated with the worsening of mild sleep apnea: the sleep heart health study. Front. Neurosci. 15, 657126 (2021)","journal-title":"Front. Neurosci."},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Keller, M.: MP-SPDZ: a versatile framework for multi-party computation. In: Proceedings of the ACM Conference on Computer and Communications Security (2020)","DOI":"10.1145\/3372297.3417872"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Klosh, G., et\u00a0al.: The siesta project polygraphic and clinical database. IEEE Eng. Med. Biol. Mag. (2001)","DOI":"10.1109\/51.932725"},{"key":"18_CR32","unstructured":"Knott, B., Venkataraman, S., Hannun, A., Sengupta, S., Ibrahim, M., van\u00a0der Maaten, L.: CrypTen: secure multi-party computation meets machine learning. In: Advances in Neural Information Processing Systems (2021)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. (1997)","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Liedtke, J., M\u00fcller, J., Rausch, D., Vogt, A.: Ordinos: a verifiable tally-hiding e-voting system. In: IEEE European Symposium on Security and Privacy (EuroS &P) (2020)","DOI":"10.1109\/EuroSP48549.2020.00022"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Langley, P., et\u00a0al.: Selection of relevant features in machine learning. In: Proceedings of the AAAI Fall Symposium on Relevance (1994)","DOI":"10.21236\/ADA292575"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Law, M.H., Figueiredo, M.A., Jain, A.K.: Simultaneous feature selection and clustering using mixture models. IEEE Trans. Pattern Anal. Mach. Intell. (2004)","DOI":"10.1109\/TPAMI.2004.71"},{"key":"18_CR37","unstructured":"Li, A., et al.: Efficient and privacy-preserving feature importance-based vertical federated learning. IEEE Trans. Mob. Comput. (2023)"},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Li, J., et al.: Feature selection: a data perspective. ACM Comput. Surv. (CSUR) (2017)","DOI":"10.1145\/3136625"},{"key":"18_CR39","unstructured":"Li, X., Dowsley, R., De\u00a0Cock, M.: Privacy-preserving feature selection with secure multiparty computation. In: International Conference on Machine Learning. PMLR (2021)"},{"issue":"10","key":"18_CR40","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.1109\/PROC.1973.9318","volume":"61","author":"J Majithia","year":"1973","unstructured":"Majithia, J., Levan, D.: A note on base-2 logarithm computations. Proc. IEEE 61(10), 1519\u20131520 (1973)","journal-title":"Proc. IEEE"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Mitra, P., Murthy, C., Pal, S.K.: Unsupervised feature selection using feature similarity. IEEE Trans. Pattern Anal. Mach. Intell. (2002)","DOI":"10.1109\/34.990133"},{"key":"18_CR42","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: IEEE Symposium on Security and Privacy (SP) (2013)","DOI":"10.1109\/SP.2013.30"},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Ono, S., Takata, J., Kataoka, M., Shin, T.I.K., Sakamoto, H.: Privacy-preserving feature selection with fully homomorphic encryption. Algorithms (2022)","DOI":"10.3390\/a15070229"},{"key":"18_CR44","unstructured":"Polychroniadou, A., et al.: Prime match: a privacy-preserving inventory matching system. In: 32nd USENIX Security Symposium (2023)"},{"key":"18_CR45","doi-asserted-by":"crossref","unstructured":"Qin, Y., Kondo, M.: Federated learning-based network intrusion detection with a feature selection approach. In: IEEE International Conference on Electrical, Communication, and Computer Engineering (2021)","DOI":"10.1109\/ICECCE52056.2021.9514222"},{"key":"18_CR46","doi-asserted-by":"crossref","unstructured":"Raab, R.: Federated electronic health records for the European health data space. Lancet Digit. Health (2023)","DOI":"10.1016\/S2589-7500(23)00156-5"},{"key":"18_CR47","unstructured":"Rao, V., Long, Y., Eldardiry, H., Rane, S., Rossi, R., Torres, F.: Secure two-party feature selection. arXiv preprint arXiv:1901.00832 (2019)"},{"key":"18_CR48","doi-asserted-by":"crossref","unstructured":"Romero, E., Sopena, J.M.: Performing feature selection with multilayer perceptrons. IEEE Trans. Neural Netw. (2008)","DOI":"10.1109\/TNN.2007.909535"},{"key":"18_CR49","doi-asserted-by":"publisher","unstructured":"Russell Graves-Morris, P., Saff, E.B., Varga, R.S.: Rational Approximation and Interpolation. Lecture Notes in Mathematics. Springer, Heidelberg (1983). https:\/\/doi.org\/10.1007\/BFb0072395","DOI":"10.1007\/BFb0072395"},{"key":"18_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/978-3-030-32101-7_35","volume-title":"Financial Cryptography and Data Security","author":"A Sangers","year":"2019","unstructured":"Sangers, A., et al.: Secure multiparty pagerank algorithm for collaborative fraud detection. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 605\u2013623. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_35"},{"key":"18_CR51","doi-asserted-by":"crossref","unstructured":"Sav, S., Diaa, A., Pyrgelis, A., Bossuat, J.-P., Hubaux, J.-P.: Privacy-preserving federated recurrent neural networks. In: Proceedings on Privacy Enhancing Technologies (2023)","DOI":"10.56553\/popets-2023-0122"},{"key":"18_CR52","doi-asserted-by":"crossref","unstructured":"Sav, S., et al.: POSEIDON: privacy-preserving federated neural network learning. In: 28th Network And Distributed System Security Symposium (NDSS). Internet Society (2021)","DOI":"10.14722\/ndss.2021.24119"},{"key":"18_CR53","doi-asserted-by":"crossref","unstructured":"Sheikhalishahi, M., Martinelli, F.: Privacy-utility feature selection as a privacy mechanism in collaborative data classification. In: IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (2017)","DOI":"10.1109\/WETICE.2017.15"},{"key":"18_CR54","unstructured":"Stracuzzi, D.J., Utgoff, P.E.: Randomized variable elimination. J. Mach. Learn. Res. (2004)"},{"key":"18_CR55","unstructured":"Volder, J.: The CORDIC computing technique. In: International Workshop on Managing Requirements Knowledge. IEEE Computer Society (1959)"},{"key":"18_CR56","doi-asserted-by":"crossref","unstructured":"Wagh, S., Gupta, D., Chandran, N.: SecureNN: 3-party secure computation for neural network training. In: Proceedings on Privacy Enhancing Technologies (2019)","DOI":"10.2478\/popets-2019-0035"},{"key":"18_CR57","doi-asserted-by":"crossref","unstructured":"Yang, J., Honavar, V.: Feature subset selection using a genetic algorithm. IEEE Intell. Syst. Their Appl. (1998)","DOI":"10.1007\/978-1-4615-5725-8_8"},{"key":"18_CR58","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science. IEEE (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"18_CR59","doi-asserted-by":"crossref","unstructured":"Yao, X., Huang, T., Wu, C., Zhang, R., Sun, L.: Towards faster and better federated learning: a feature fusion approach. In: IEEE International Conference on Image Processing (ICIP) (2019)","DOI":"10.1109\/ICIP.2019.8803001"},{"key":"18_CR60","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Wang, C., Wu, H., Xin, C., Phuong, T.V.: GELU-Net: a globally encrypted, locally unencrypted deep neural network for privacy-preserved learning. In: International Joint Conferences on Artificial Intelligence (2018)","DOI":"10.24963\/ijcai.2018\/547"},{"key":"18_CR61","doi-asserted-by":"crossref","unstructured":"Zhang, R., Li, H., Hao, M., Chen, H., Zhang, Y.: Secure feature selection for vertical federated learning in eHealth systems. In: IEEE International Conference on Communications (2022)","DOI":"10.1109\/ICC45855.2022.9838917"},{"key":"18_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, X., Mavromatics, A., Vafeas, A., Nejabati, R., Simeonidou, D.: Federated feature selection for horizontal federated learning in IoT networks. IEEE Internet Things (2023)","DOI":"10.1109\/JIOT.2023.3237032"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70890-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:28:20Z","timestamp":1725528500000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70890-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708893","9783031708909"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70890-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"6 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}