{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:39Z","timestamp":1740099159262,"version":"3.37.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319992402"},{"type":"electronic","value":"9783319992419"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99241-9_13","type":"book-chapter","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T06:40:36Z","timestamp":1534833636000},"page":"246-261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Learning Without Peeking: Secure Multi-party Computation Genetic Programming"],"prefix":"10.1007","author":[{"given":"Jinhan","family":"Kim","sequence":"first","affiliation":[]},{"given":"Michael G.","family":"Epitropakis","sequence":"additional","affiliation":[]},{"given":"Shin","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,22]]},"reference":[{"key":"13_CR1","unstructured":"Anati, I., Gueron, S., Johnson, S., Scarlata, V.: Innovative technology for CPU based attestation and sealing. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, vol. 13 (2013)"},{"key":"13_CR2","unstructured":"Balcan, M., Blum, A., Fine, S., Mansour, Y.: Distributed learning, communication complexity and privacy. In: COLT 2012 - The 25th Annual Conference on Learning Theory, pp. 26.1\u201326.22 (2012)"},{"key":"13_CR3","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. In: Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation OSDI 2014, pp. 267\u2013283. USENIX Association, Berkeley, CA, USA (2014)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms, pp. 13\u201322. ACM (2001)","DOI":"10.1145\/508171.508174"},{"issue":"6","key":"13_CR5","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637\u2013647 (1985)","journal-title":"Commun. ACM"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Ferrucci, F., Gravino, C., Oliveto, R., Sarro, F.: Genetic programming for effort estimation: an analysis of the impact of different fitness functions. In: 2010 Second International Symposium on Search Based Software Engineering (SSBSE), pp. 89\u201398. IEEE (2010)","DOI":"10.1109\/SSBSE.2010.20"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Forrest, S., Nguyen, T., Weimer, W., Le Goues, C.: A genetic programming approach to automated software repair. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation GECCO 2009, pp. 947\u2013954. ACM (2009)","DOI":"10.1145\/1569901.1570031"},{"key":"13_CR8","first-page":"2171","volume":"13","author":"FA Fortin","year":"2012","unstructured":"Fortin, F.A., De Rainville, F.M., Gardner, M.A., Parizeau, M., Gagn\u00e9, C.: DEAP: evolutionary algorithms made easy. J. Mach. Learn. Res. 13, 2171\u20132175 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Gasc\u00f3n, A., et al.: Privacy-preserving distributed linear regression on high-dimensional data. In: Proceedings on Privacy Enhancing Technologies PPET 2017, vol. 4, pp. 345\u2013364 (2017)","DOI":"10.1515\/popets-2017-0053"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Gupta, T., Fingler, H., Alvisi, L., Walfish, M.: Pretzel: email encryption and provider-supplied functions are compatible. In: Proceedings of the Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2017, Los Angeles, CA, USA, 21\u201325 August 2017, pp. 169\u2013182 (2017)","DOI":"10.1145\/3098822.3098835"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Just, R., Jalali, D., Ernst, M.D.: Defects4J: a database of existing faults to enable controlled testing studies for Java programs. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis ISSTA 2014, pp. 437\u2013440. ACM, New York, NY, USA (2014). \nhttps:\/\/doi.org\/10.1145\/2610384.2628055","DOI":"10.1145\/2610384.2628055"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Kang, D., Sohn, J., Yoo, S.: Empirical evaluation of conditional operators in GP based fault localization. In: Genetic and Evolutionary Computation GECCO 2017, pp. 1295\u20131302 (2017)","DOI":"10.1145\/3071178.3071263"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/3-540-36599-0_7","volume-title":"Genetic Programming","author":"M Keijzer","year":"2003","unstructured":"Keijzer, M.: Improving symbolic regression with interval arithmetic and linear scaling. In: Ryan, C., Soule, T., Keijzer, M., Tsang, E., Poli, R., Costa, E. (eds.) EuroGP 2003. LNCS, vol. 2610, pp. 70\u201382. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/3-540-36599-0_7"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-319-66299-2_11","volume-title":"Search Based Software Engineering","author":"J Kim","year":"2017","unstructured":"Kim, J., Kim, J., Yoo, S.: GPGPGPU: evaluation of parallelisation of genetic programming using GPGPU. In: Menzies, T., Petke, J. (eds.) SSBSE 2017. LNCS, vol. 10452, pp. 137\u2013142. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-66299-2_11"},{"key":"13_CR15","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"JR Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Li, Z., Jing, X.Y., Zhu, X., Zhang, H., Xu, B., Ying, S.: On the multiple sources and privacy preservation issues for heterogeneous defect prediction. IEEE Trans. Softw. Eng. 1 (2017)","DOI":"10.1109\/TSE.2017.2780222"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Y., Khoshgoftaar, T.M.: Genetic programming model for software quality classification. In: Proceedings 6th International Symposium on High Assurance Systems Engineering, Special Topic: Impact of Networking, pp. 127\u2013136 (2001)","DOI":"10.1109\/HASE.2001.966814"},{"issue":"C","key":"13_CR18","first-page":"331","volume":"55","author":"G Maua","year":"2017","unstructured":"Maua, G., Galinac Grbac, T.: Co-evolutionary multi-population genetic programming for classification in software defect prediction. Appl. Soft Comput. 55(C), 331\u2013351 (2017)","journal-title":"Appl. Soft Comput."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"McKeen, F., et al.: Innovative instructions and software model for isolated execution. In: Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy HASP 2013, p. 10:1. ACM, New York, NY, USA (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Moore, C., O\u2019Neill, M., O\u2019Sullivan, E., Dor\u00f6z, Y., Sunar, B.: Practical homomorphic encryption: a survey. In: IEEE International Symposium on Circuits and Systems ISCAS 2014, pp. 2792\u20132795, June 2014","DOI":"10.1109\/ISCAS.2014.6865753"},{"issue":"8","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TSE.2013.6","volume":"39","author":"F Peters","year":"2013","unstructured":"Peters, F., Menzies, T., Gong, L., Zhang, H.: Balancing privacy and utility in cross-company defect prediction. IEEE Trans. Softw. Eng. 39(8), 1054\u20131068 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR22","unstructured":"Poli, R., Langdon, W.B., McPhee, N.F.: A field guide to genetic programming. Published via \nhttp:\/\/lulu.com\n\n, \nhttp:\/\/www.gp-field-guide.org.uk\n\n (2008)"},{"issue":"2","key":"13_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"5","key":"13_CR24","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MSP.2013.2259911","volume":"30","author":"AD Sarwate","year":"2013","unstructured":"Sarwate, A.D., Chaudhuri, K.: Signal processing and machine learning with differential privacy: algorithms and challenges for continuous data. IEEE Signal Process. 30(5), 86\u201394 (2013)","journal-title":"IEEE Signal Process."},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Schuster, F., et al.: VC3: trustworthy data analytics in the cloud using SGX. In: 2015 IEEE Symposium on Security and Privacy, pp. 38\u201354, May 2015","DOI":"10.1109\/SP.2015.10"},{"issue":"11","key":"13_CR26","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Sohn, J., Yoo, S.: FLUCCS: using code and change metrics to improve fault localisation. In: Proceedings of the International Symposium on Software Testing and Analysis ISSTA 2017, pp. 273\u2013283. ACM, July 2017","DOI":"10.1145\/3092703.3092717"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Songhori, E.M., Hussain, S.U., Sadeghi, A.R., Schneider, T., Koushanfar, F.: Tinygarble: highly compressed and scalable sequential garbled circuits. In: IEEE Symposium on Security and Privacy SSP 2015, pp. 411\u2013428, May 2015","DOI":"10.1109\/SP.2015.32"},{"key":"13_CR29","unstructured":"Tian, L., Jayaraman, B., Gu, Q., Evans, D.: Aggregating private sparse learning models using multi-party computation. In: NIPS Workshop on Private Multi-Party Machine Learning, PMPML 2016 (2016)"},{"issue":"2","key":"13_CR30","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10710-010-9121-2","volume":"12","author":"NQ Uy","year":"2011","unstructured":"Uy, N.Q., Hoai, N.X., O\u2019Neill, M., McKay, R.I., Galv\u00e1n-L\u00f3pez, E.: Semantically-based crossover in genetic programming: application to real-valued symbolic regression. Genet. Program. Evolvable Mach. 12(2), 91\u2013119 (2011)","journal-title":"Genet. Program. Evolvable Mach."},{"issue":"2","key":"13_CR31","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TEVC.2008.926486","volume":"13","author":"EJ Vladislavleva","year":"2009","unstructured":"Vladislavleva, E.J., Smits, G.F., den Hertog, D.: Order of nonlinearity as a complexity measure for models generated by symbolic regression via pareto genetic programming. IEEE Trans. Evol. Comput. 13(2), 333\u2013349 (2009)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Weimer, W., Nguyen, T., Goues, C.L., Forrest, S.: Automatically finding patches using genetic programming. In: Proceedings of the 31st IEEE International Conference on Software Engineering ICSE 2009, pp. 364\u2013374. IEEE, May 2009","DOI":"10.1109\/ICSE.2009.5070536"},{"issue":"1","key":"13_CR33","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10710-012-9177-2","volume":"14","author":"DR White","year":"2013","unstructured":"White, D.R., et al.: Better GP benchmarks: community survey results and proposals. Genet. Program. Evolvable Mach. 14(1), 3\u201329 (2013)","journal-title":"Genet. Program. Evolvable Mach."},{"issue":"8","key":"13_CR34","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSE.2016.2521368","volume":"42","author":"WE Wong","year":"2016","unstructured":"Wong, W.E., Gao, R., Li, Y., Abreu, R., Wotawa, F.: A survey on software fault localization. IEEE Trans. Softw.Eng. 42(8), 707 (2016)","journal-title":"IEEE Trans. Softw.Eng."},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: How to generate and exchange secrets. In: Proceedings of the 27th Annual Symposium on Foundations of Computer Science SFCS 1986, pp. 162\u2013167. IEEE Computer Society, Washington, DC, USA (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"13_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-33119-0_18","volume-title":"Search Based Software Engineering","author":"S Yoo","year":"2012","unstructured":"Yoo, S.: Evolving human competitive spectra-based fault localisation techniques. In: Fraser, G., Teixeira de Souza, J. (eds.) SSBSE 2012. LNCS, vol. 7515, pp. 244\u2013258. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-33119-0_18"},{"key":"13_CR37","first-page":"1153","volume":"2015","author":"S Zahur","year":"2015","unstructured":"Zahur, S., Evans, D.: Obliv-C: a language for extensible data-oblivious computation. IACR Cryptol. ePrint Arch. 2015, 1153 (2015)","journal-title":"IACR Cryptol. ePrint Arch."}],"container-title":["Lecture Notes in Computer Science","Search-Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99241-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T06:54:36Z","timestamp":1534834476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99241-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319992402","9783319992419"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99241-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}