{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:47:47Z","timestamp":1760316467588,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032078834","type":"print"},{"value":"9783032078841","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07884-1_4","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:22:56Z","timestamp":1760286176000},"page":"62-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PriSM: A Privacy-Friendly Support Vector Machine"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8521-896X","authenticated-orcid":false,"given":"Michele","family":"Barbato","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0983-2706","authenticated-orcid":false,"given":"Alberto","family":"Ceselli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0793-3551","authenticated-orcid":false,"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1658-6734","authenticated-orcid":false,"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7395-4620","authenticated-orcid":false,"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"4_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of VLDB. Santiago, Chile (1994)"},{"issue":"3","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.ejor.2024.03.035","volume":"316","author":"M Barbato","year":"2024","unstructured":"Barbato, M., Ceselli, A.: Mathematical programming for simultaneous feature selection and outlier detection under l1 norm. Eur. J. Oper. Res. 316(3), 1070\u20131084 (2024)","journal-title":"Eur. J. Oper. Res."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Barezzani, S., De Capitani di Vimercati, S., Foresti, S., Ghirimoldi, V., Samarati, P.: TA_DA: Target-aware data anonymization. IEEE TP 2, 15\u201326 (2025)","DOI":"10.1109\/TP.2025.3527461"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2022.09.004","volume":"613","author":"L Caruccio","year":"2022","unstructured":"Caruccio, L., Desiato, D., Polese, G., Tortora, G., Zannone, N.: A decision-support framework for data anonymization with application to machine learning processes. Inf. Sci. 613, 1\u201332 (2022)","journal-title":"Inf. Sci."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Chen, C., Wei, L., Xie, J., Shi, Y.: Privacy-preserving machine learning based on cryptography: a survey. ACM TKDD 19(4), 1\u201333 (2025)","DOI":"10.1145\/3729234"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Coscia, P., Ferrari, S., Piuri, V., Salman, A.: Synthetic and (Un)secure: evaluating generalized membership inference attacks on image data. In: Proceedings of SECRYPT. Bilbao, Spain (2025)","DOI":"10.5220\/0013657700003979"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE TDSC 11(6), 510\u2013523 (2014)","DOI":"10.1109\/TDSC.2013.2295798"},{"key":"4_CR9","unstructured":"De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: k-Anonymity: from theory to applications. Trans. Data Priv. 16(1), 25\u201349 (2023)"},{"issue":"6","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3712000","volume":"57","author":"L Demelius","year":"2025","unstructured":"Demelius, L., Kern, R., Tr\u00fcgler, A.: Recent advances of differential privacy in centralized deep learning: a systematic survey. ACM CSUR 57(6), 1\u201328 (2025)","journal-title":"ACM CSUR"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Dick, T., Dwork, C., Kearns, M., Liuc, T., Roth, A., Vietri, G., Wu, Z.: Confidence-ranked reconstruction of census microdata from published statistics. PNAS 120(8), e2218605120 (2023)","DOI":"10.1073\/pnas.2218605120"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"El Mestari, S., Lenzini, G., Demirci, H.: Preserving data privacy in machine learning systems. COSE 137, 103605 (2024)","DOI":"10.1016\/j.cose.2023.103605"},{"key":"4_CR13","unstructured":"Fredrikson, M., Lantz, E., Jha, S., Lin, S., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing. In: Proceedings of USENIX. San Diego, CA, USA (2014)"},{"key":"4_CR14","unstructured":"Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: Proceedings of USENIX. Santa Clara, CA, USA (2019)"},{"key":"4_CR15","unstructured":"Jia, J., Gong, N.Z.: AttriGuard: a practical defense against attribute inference attacks via adversarial machine learning. In: Proceedings of the USENIX. Baltimore, MD, USA (2018)"},{"key":"4_CR16","unstructured":"Larose, D.T.: Data Mining and Predictive Analytics. Wiley (2015)"},{"key":"4_CR17","first-page":"38899","volume":"35","author":"J van der Linden","year":"2022","unstructured":"van der Linden, J., de Weerdt, M., Demirovi\u0107, E.: Fair and optimal decision trees: a dynamic programming approach. Adv. Neural. Inf. Process. Syst. 35, 38899\u201338911 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"6","key":"4_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3457607","volume":"54","author":"N Mehrabi","year":"2022","unstructured":"Mehrabi, N., Morstatter, F., Saxena, N., Lerman, K., Galstyan, A.: A survey on bias and fairness in machine learning. ACM CSUR 54(6), 1\u201335 (2022)","journal-title":"ACM CSUR"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: Proceedings of IEEE S &P. San Jose, CA, USA (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Rao, B., Zhang, J., Wu, D., Zhu, C., Sun, X., Chen, B.: Privacy inference attack and defense in centralized and federated learning: a comprehensive survey. IEEE TAI 6(2), 333\u2013353 (2025)","DOI":"10.1109\/TAI.2024.3363670"},{"issue":"4","key":"4_CR21","first-page":"1","volume":"56","author":"M Rigaki","year":"2023","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM CSUR 56(4), 1\u201334 (2023)","journal-title":"ACM CSUR"},{"issue":"5","key":"4_CR22","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1162\/089976600300015565","volume":"12","author":"B Scholkopf","year":"2000","unstructured":"Scholkopf, B., Smola, A., Williamson, R., Bartlett, P.: New support vector algorithms. Neural Comput. 12(5), 1207\u20131245 (2000)","journal-title":"Neural Comput."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: Proc. of IEEE S &P. San Jose, CA, USA (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Slijep\u010devi\u0107, D., Henz, M., Klausner, L., Dam, T., Kieseberg, P., Zeppelzauer, M.: $$k$$-anonymity in practice: how generalisation and suppression affect machine learning classifiers. COSE 111, 102488 (2021)","DOI":"10.1016\/j.cose.2021.102488"},{"key":"4_CR25","unstructured":"Song, C., Shmatikov, V.: Overlearning reveals sensitive attributes. In: Proceedings of ICLR. virtual (2020)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving SVM classification. Knowl. Inf. Syst. 14, 161\u2013178 (2008)","DOI":"10.1007\/s10115-007-0073-7"},{"key":"4_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/9781119606475","volume-title":"Integer Programming","author":"L Wolsey","year":"2020","unstructured":"Wolsey, L.: Integer Programming. Wiley, Ltd (2020)"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"74720","DOI":"10.1109\/ACCESS.2020.2987435","volume":"8","author":"M Xue","year":"2020","unstructured":"Xue, M., Yuan, C., Wu, H., Zhang, Y., Liu, W.: Machine learning security: threats, countermeasures, and evaluations. IEEE Access 8, 74720\u201374742 (2020)","journal-title":"IEEE Access"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Proceedings of NIPS. Vancouver, Canada (2019)","DOI":"10.1007\/978-3-030-63076-8_2"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07884-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:23:03Z","timestamp":1760286183000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07884-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032078834","9783032078841"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07884-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}