{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:59:30Z","timestamp":1773269970420,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_10","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:27:10Z","timestamp":1767320830000},"page":"174-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PP-MTAD: Privacy-Preserving and\u00a0Efficient Multivariate Time Series Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Minhua","family":"Su","sequence":"first","affiliation":[]},{"given":"Jia-Nan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kai","family":"He","sequence":"additional","affiliation":[]},{"given":"Jiasi","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Anjia","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xueqiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. 51(4), 79:1\u201379:35 (2018). https:\/\/doi.org\/10.1145\/3214303","DOI":"10.1145\/3214303"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Atallah, M.J., Bykova, M., Li, J., Frikken, K.B., Topkara, M.: Private collaborative forecasting and benchmarking. In: Atluri, V., Syverson, P.F., di\u00a0Vimercati, S.D.C. (eds.) Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, 28 October 2004, pp. 103\u2013114. ACM (2004). https:\/\/doi.org\/10.1145\/1029179.1029204","DOI":"10.1145\/1029179.1029204"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Audibert, J., Michiardi, P., Guyard, F., Marti, S., Zuluaga, M.A.: USAD: unsupervised anomaly detection on multivariate time series. In: Gupta, R., Liu, Y., Tang, J., Prakash, B.A. (eds.) KDD 2020: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Virtual Event, CA, USA, 23\u201327 August 2020, pp. 3395\u20133404. ACM (2020). https:\/\/doi.org\/10.1145\/3394486.3403392","DOI":"10.1145\/3394486.3403392"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, Las Vegas, Nevada, USA, 14\u201317 October 2001, pp. 136\u2013145. IEEE Computer Society (2001). https:\/\/doi.org\/10.1109\/SFCS.2001.959888","DOI":"10.1109\/SFCS.2001.959888"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Disken, G., Ibrikci, T.: Recognition of non-speech sounds using mel-frequency cepstrum coefficients and dynamic time warping method. In: 2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, 16\u201319 May 2015, pp. 144\u2013147. IEEE (2015). https:\/\/doi.org\/10.1109\/SIU.2015.7130277","DOI":"10.1109\/SIU.2015.7130277"},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/TDSC.2022.3152498","volume":"20","author":"C Dong","year":"2023","unstructured":"Dong, C., et al.: Maliciously secure and efficient large-scale genome-wide association study with multi-party computation. IEEE Trans. Dependable Secur. Comput. 20(2), 1243\u20131257 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3152498","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or A completeness theorem for protocols with honest majority. In: Aho, A.V. (ed.) Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, New York, New York, USA, pp. 218\u2013229. ACM (1987). https:\/\/doi.org\/10.1145\/28395.28420","DOI":"10.1145\/28395.28420"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 307\u2013328 (2019). https:\/\/doi.org\/10.1145\/3335741.3335755","DOI":"10.1145\/3335741.3335755"},{"key":"10_CR9","unstructured":"Huang, Z., Lu, W., Hong, C., Ding, J.: Cheetah: lean and fast secure two-party deep neural network inference. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, 10\u201312 August 2022, pp. 809\u2013826. USENIX Association (2022)"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., S\u00f6derstr\u00f6m, T.: Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding. In: Guo, Y., Farooq, F. (eds.) Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2018, London, UK, 19\u201323 August 2018, pp. 387\u2013395. ACM (2018). https:\/\/doi.org\/10.1145\/3219819.3219845","DOI":"10.1145\/3219819.3219845"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Li, J., Di, S., Shen, Y., Chen, L.: Fluxev: a fast and effective unsupervised framework for time-series anomaly detection. In: Proceedings of the 14th ACM International Conference on Web Search and Data Mining, WSDM 2021, pp. 824\u2013832. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3437963.3441823","DOI":"10.1145\/3437963.3441823"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"1440","DOI":"10.1109\/TIFS.2023.3336512","volume":"19","author":"X Li","year":"2024","unstructured":"Li, X., Huang, Z., Zhao, B., Yang, G., Xiang, T., Deng, R.H.: STDA: secure time series data analytics with practical efficiency in wide-area network. IEEE Trans. Inf. Forensics Secur. 19, 1440\u20131454 (2024). https:\/\/doi.org\/10.1109\/TIFS.2023.3336512","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Liu, F., et al.: Fedtadbench: federated time-series anomaly detection benchmark. In: 24th IEEE International Conference on High Performance Computing & Communications; 8th International Conference on Data Science & Systems; 20th International Conference on Smart City; 8th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application, HPCC\/DSS\/SmartCity\/DependSys 2022, Hainan, China, 18\u201320 December 2022, pp. 303\u2013310 (2022). https:\/\/doi.org\/10.1109\/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00071","DOI":"10.1109\/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00071"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Liu, J., Lu, X., Yin, H., Tao, X., Zhang, C., Quigley, A.: A constraints-based dynamic time warping method for gesture recognition with kinect. In: Song, A., Habib, M. (eds.) Proceedings of the 2023 3rd International Conference on Robotics and Control Engineering, RobCE 2023, Nanjing, China, 12\u201314 May 2023, pp. 178\u2013183. ACM (2023). https:\/\/doi.org\/10.1145\/3598151.3598181","DOI":"10.1145\/3598151.3598181"},{"issue":"3","key":"10_CR15","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1109\/TDSC.2020.3035592","volume":"19","author":"X Liu","year":"2022","unstructured":"Liu, X., Zheng, Y., Yi, X., Nepal, S.: Privacy-preserving collaborative analytics on medical time series data. IEEE Trans. Dependable Secur. Comput. 19(3), 1687\u20131702 (2022). https:\/\/doi.org\/10.1109\/TDSC.2020.3035592","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10_CR16","unstructured":"Ma, M., et al.: Jump-starting multivariate time series anomaly detection for online service systems. In: 2021 USENIX Annual Technical Conference (USENIX ATC 2021), pp. 413\u2013426. USENIX Association (2021)"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Okawa, M.: Time-series averaging and local stability-weighted dynamic time warping for online signature verification. Pattern Recogn. 112, 107699 (2021). https:\/\/doi.org\/10.1016\/J.PATCOG.2020.107699","DOI":"10.1016\/J.PATCOG.2020.107699"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Okawa, M.: Online signature verification using locally weighted dynamic time warping via multiple fusion strategies. IEEE Access 10, 40806\u201340817 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3167413","DOI":"10.1109\/ACCESS.2022.3167413"},{"issue":"2","key":"10_CR19","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1109\/TSG.2023.3316730","volume":"15","author":"H Pang","year":"2024","unstructured":"Pang, H., He, K., Fu, Y., Liu, J., Liu, X., Tan, W.: Enabling efficient and malicious secure data aggregation in smart grid with false data detection. IEEE Trans. Smart Grid 15(2), 2203\u20132213 (2024). https:\/\/doi.org\/10.1109\/TSG.2023.3316730","journal-title":"IEEE Trans. Smart Grid"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Park, D., Kim, H., Hoshi, Y., Erickson, Z., Kapusta, A., Kemp, C.C.: A multimodal execution monitor with anomaly classification for robot-assisted feeding. In: 2017 IEEE\/RSJ International Conference on Intelligent Robots and Systems, IROS 2017, Vancouver, BC, Canada, 24\u201328 September 2017, pp. 5406\u20135413. IEEE (2017). https:\/\/doi.org\/10.1109\/IROS.2017.8206437","DOI":"10.1109\/IROS.2017.8206437"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Permanasari, Y., Harahap, E.H., Ali, E.P.: Speech recognition using dynamic time warping (DTW). In: Journal of Physics: Conference Series, vol.\u00a01366, p. 012091. IOP Publishing (2019)","DOI":"10.1088\/1742-6596\/1366\/1\/012091"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Rathee, D., et al.: Cryptflow2: practical 2-party secure inference. In: CCS 2020: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, 9\u201313 November 2020, pp. 325\u2013342 (2020).https:\/\/doi.org\/10.1145\/3372297.3417274","DOI":"10.1145\/3372297.3417274"},{"key":"10_CR23","unstructured":"Sakoe, H.: Dynamic-programming approach to continuous speech recognition. In: 1971 Proceedings of the International Congress of Acoustics, Budapest (1971)"},{"issue":"11","key":"10_CR24","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Su, Y., Zhao, Y., Niu, C., Liu, R., Sun, W., Pei, D.: Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Teredesai, A., Kumar, V., Li, Y., Rosales, R., Terzi, E., Karypis, G. (eds.) Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2019, Anchorage, AK, USA, 4\u20138 August 2019, pp. 2828\u20132837. ACM (2019). https:\/\/doi.org\/10.1145\/3292500.3330672","DOI":"10.1145\/3292500.3330672"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Tang, J., Cheng, H., Zhao, Y., Guo, H.: Structured dynamic time warping for continuous hand trajectory gesture recognition. Pattern Recogn. 80, 21\u201331 (2018). https:\/\/doi.org\/10.1016\/J.PATCOG.2018.02.011","DOI":"10.1016\/J.PATCOG.2018.02.011"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Tuli, S., Casale, G., Jennings, N.R.: Tranad: deep transformer networks for anomaly detection in multivariate time series data. Proc. VLDB Endow. 15(6), 1201\u20131214 (2022). https:\/\/doi.org\/10.14778\/3514061.3514067","DOI":"10.14778\/3514061.3514067"},{"key":"10_CR28","doi-asserted-by":"publisher","unstructured":"Xu, R., Miao, H., Wang, S., Yu, P.S., Wang, J.: Pefad: a parameter-efficient federated framework for time series anomaly detection. In: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2024, Barcelona, Spain, 25\u201329 August 2024, pp. 3621\u20133632 (2024). https:\/\/doi.org\/10.1145\/3637528.3671753","DOI":"10.1145\/3637528.3671753"},{"issue":"2","key":"10_CR29","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/TDSC.2023.3266292","volume":"21","author":"Y Yang","year":"2024","unstructured":"Yang, Y., et al.: Prigenx: privacy-preserving query with anonymous access control for genomic data. IEEE Trans. Dependable Secur. Comput. 21(2), 961\u2013974 (2024). https:\/\/doi.org\/10.1109\/TDSC.2023.3266292","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10_CR30","doi-asserted-by":"publisher","unstructured":"Yao, A.C.: How to generate and exchange secrets (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27\u201329 October 1986, pp. 162\u2013167. IEEE Computer Society (1986). https:\/\/doi.org\/10.1109\/SFCS.1986.25","DOI":"10.1109\/SFCS.1986.25"},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1186\/1471-2105-12-347","volume":"12","author":"Y Yuan","year":"2011","unstructured":"Yuan, Y., et al.: Development and application of a modified dynamic time warping algorithm (DTW-S) to analyses of primate brain expression time series. BMC Bioinform. 12, 347 (2011). https:\/\/doi.org\/10.1186\/1471-2105-12-347","journal-title":"BMC Bioinform."},{"key":"10_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/J.INS.2024.121590","volume":"690","author":"S Zhang","year":"2025","unstructured":"Zhang, S., et al.: Privacy-preserving MTS anomaly detection for network devices through federated learning. Inf. Sci. 690, 121590 (2025). https:\/\/doi.org\/10.1016\/J.INS.2024.121590","journal-title":"Inf. Sci."},{"key":"10_CR33","doi-asserted-by":"publisher","unstructured":"Zhao, C., et al.: Secure multi-party computation: theory, practice and applications. Inf. Sci. 476, 357\u2013372 (2019). https:\/\/doi.org\/10.1016\/J.INS.2018.10.024","DOI":"10.1016\/J.INS.2018.10.024"},{"issue":"4","key":"10_CR34","doi-asserted-by":"publisher","first-page":"2501","DOI":"10.1109\/TDSC.2021.3061611","volume":"19","author":"Y Zheng","year":"2022","unstructured":"Zheng, Y., Lu, R., Guan, Y., Shao, J., Zhu, H.: Efficient and privacy-preserving similarity range query over encrypted time series data. IEEE Trans. Dependable Secur. Comput. 19(4), 2501\u20132516 (2022). https:\/\/doi.org\/10.1109\/TDSC.2021.3061611","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10_CR35","doi-asserted-by":"publisher","unstructured":"Zhu, H., Meng, X., Kollios, G.: Privacy preserving similarity evaluation of time series data. In: Amer-Yahia, S., Christophides, V., Kementsietsidis, A., Garofalakis, M.N., Idreos, S., Leroy, V. (eds.) Proceedings of the 17th International Conference on Extending Database Technology, EDBT 2014, Athens, Greece, 24\u201328 March 2014, pp. 499\u2013510. OpenProceedings.org (2014). https:\/\/doi.org\/10.5441\/002\/EDBT.2014.45","DOI":"10.5441\/002\/EDBT.2014.45"},{"key":"10_CR36","unstructured":"Zong, B., et al.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, 30 April\u20133 May 2018, Conference Track Proceedings (2018)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:20Z","timestamp":1773214640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}