{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T04:29:07Z","timestamp":1764563347814,"version":"3.46.0"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819549566"},{"type":"electronic","value":"9789819549573"}],"license":[{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-4957-3_33","type":"book-chapter","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T04:24:27Z","timestamp":1764563067000},"page":"406-417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Balancing Accuracy and\u00a0Latency in\u00a0Privacy-Preserving User Behavior Classification with\u00a0Tree-Based Models"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0522-7725","authenticated-orcid":false,"given":"Kiet","family":"Nguyen Tuan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8362-4848","authenticated-orcid":false,"given":"Vo Minh","family":"Tri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9630-3610","authenticated-orcid":false,"given":"Nguyen Duc","family":"Thai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","unstructured":"Agamennone, P.: Polynomial approximations of ReLU for secure CNN inference in homomorphic encryption environments E108.A(7), 977\u2013980. https:\/\/doi.org\/10.1587\/transfun.2024EAL2090. https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/7\/E108.A_2024EAL2090\/_article","DOI":"10.1587\/transfun.2024EAL2090"},{"key":"33_CR2","doi-asserted-by":"publisher","unstructured":"Arnold, D., Saniie, J., Heifetz, A.: Homomorphic encryption for machine learning and artificial intelligence applications. https:\/\/doi.org\/10.2172\/1886256. https:\/\/www.osti.gov\/servlets\/purl\/1886256\/","DOI":"10.2172\/1886256"},{"key":"33_CR3","doi-asserted-by":"publisher","unstructured":"Chen, H., et al.: Logistic regression over encrypted data from fully homomorphic encryption 11,\u00a081. https:\/\/doi.org\/10.1186\/s12920-018-0397-z. https:\/\/bmcmedgenomics.biomedcentral.com\/articles\/10.1186\/s12920-018-0397-z","DOI":"10.1186\/s12920-018-0397-z"},{"key":"33_CR4","doi-asserted-by":"publisher","unstructured":"Chiang, J.: A simple solution for homomorphic evaluation on large intervals. https:\/\/doi.org\/10.48550\/ARXIV.2405.15201. https:\/\/arxiv.org\/abs\/2405.15201, version Number: 1","DOI":"10.48550\/ARXIV.2405.15201"},{"key":"33_CR5","doi-asserted-by":"publisher","unstructured":"Deniz, E., \u00c7\u00f6keko\u011flu, S.: Predicting customer purchase behavior using machine learning models. Int. J. Data Sci. Adv. Analyt. 6(2), 45\u201356 (2024). https:\/\/doi.org\/10.69882\/adba.iteb.2024071. https:\/\/www.researchgate.net\/publication\/382768389_Predicting_Customer_Purchase_Behavior_Using_Machine_Learning_Models","DOI":"10.69882\/adba.iteb.2024071"},{"key":"33_CR6","doi-asserted-by":"publisher","unstructured":"Harb, M.R.A., Celiktas, B.: Efficient estimation of sigmoid and tanh activation functions for homomorphically encrypted data using artificial neural networks. In: 2024 8th International Symposium on Innovative Approaches in Smart Technologies (ISAS), pp.\u00a01\u20137. IEEE. https:\/\/doi.org\/10.1109\/ISAS64331.2024.10845450. https:\/\/ieeexplore.ieee.org\/document\/10845450\/","DOI":"10.1109\/ISAS64331.2024.10845450"},{"key":"33_CR7","doi-asserted-by":"publisher","unstructured":"Issaoui, H., ElAdel, A., Zaied, M.: Intelligent beta-based polynomial approximation of activation functions for a robust data encryption system 12(3), 259\u2013268. https:\/\/doi.org\/10.18178\/joig.12.3.259-268. https:\/\/www.joig.net\/show-90-404-1.html","DOI":"10.18178\/joig.12.3.259-268"},{"key":"33_CR8","doi-asserted-by":"publisher","unstructured":"Khan, T., Michalas, A.: Learning in the dark: privacy-preserving machine learning using function approximation. https:\/\/doi.org\/10.48550\/ARXIV.2309.08190. https:\/\/arxiv.org\/abs\/2309.08190, version Number: 1","DOI":"10.48550\/ARXIV.2309.08190"},{"key":"33_CR9","doi-asserted-by":"publisher","unstructured":"Lee, J., et al.: Optimized layerwise approximation for efficient private inference on fully homomorphic encryption. https:\/\/doi.org\/10.48550\/ARXIV.2310.10349. https:\/\/arxiv.org\/abs\/2310.10349, version Number: 3","DOI":"10.48550\/ARXIV.2310.10349"},{"key":"33_CR10","doi-asserted-by":"publisher","unstructured":"Lee, J., Lee, E., Lee, J.W., Kim, Y., Kim, Y.S., No, J.S.: Precise approximation of convolutional neural networks for homomorphically encrypted data. https:\/\/doi.org\/10.48550\/ARXIV.2105.10879. https:\/\/arxiv.org\/abs\/2105.10879, version Number: 4","DOI":"10.48550\/ARXIV.2105.10879"},{"key":"33_CR11","doi-asserted-by":"publisher","unstructured":"Qu, X., Hu, Q., Wang, S.: Privacy-preserving model training architecture for intelligent edge computing 162, 94\u2013101. https:\/\/doi.org\/10.1016\/j.comcom.2020.07.045. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366420318582","DOI":"10.1016\/j.comcom.2020.07.045"},{"key":"33_CR12","doi-asserted-by":"publisher","unstructured":"Tong, J., Dang, J., Golder, A., Hao, C., Raychowdhury, A., Krishna, T.: Accurate low-degree polynomial approximation of non-polynomial operators for fast private inference in homomorphic encryption. https:\/\/doi.org\/10.48550\/ARXIV.2404.03216. https:\/\/arxiv.org\/abs\/2404.03216, version Number: 3","DOI":"10.48550\/ARXIV.2404.03216"},{"key":"33_CR13","doi-asserted-by":"publisher","unstructured":"Uemura, S., Fukushima, K., Kiyomoto, S.: Approximations of the sigmoid function beyond the approximation domains for privacy-preserving neural networks:. In: Proceedings of the 11th International Conference on Information Systems Security and Privacy, pp. 445\u2013454. SCITEPRESS - Science and Technology Publications. https:\/\/doi.org\/10.5220\/0013100700003899. https:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0013100700003899","DOI":"10.5220\/0013100700003899"},{"key":"33_CR14","doi-asserted-by":"publisher","unstructured":"Yuan, J., Liu, W., Shi, J., Li, Q.: Approximate homomorphic encryption based privacy-preserving machine learning: a survey 58(3),\u00a082. https:\/\/doi.org\/10.1007\/s10462-024-11076-8. https:\/\/link.springer.com\/10.1007\/s10462-024-11076-8","DOI":"10.1007\/s10462-024-11076-8"}],"container-title":["Lecture Notes in Computer Science","Multi-disciplinary Trends in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-4957-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T04:24:28Z","timestamp":1764563068000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-4957-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,2]]},"ISBN":["9789819549566","9789819549573"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-4957-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,12,2]]},"assertion":[{"value":"2 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIWAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multi-disciplinary Trends in Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"miwai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/miwai25.miwai.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}