{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:00:54Z","timestamp":1773270054637,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_3","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:26:10Z","timestamp":1767320770000},"page":"45-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MSFS: Maliciously Secure 3-Party Feature Selection via\u00a0Mutual Information"],"prefix":"10.1007","author":[{"given":"Peijun","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Lin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"287","DOI":"10.21552\/EDPL\/2016\/3\/4","volume":"2","author":"JP Albrecht","year":"2016","unstructured":"Albrecht, J.P.: How the gdpr will change the world. Eur. Data Prot. L. Rev. 2, 287 (2016)","journal-title":"Eur. Data Prot. L. Rev."},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.neunet.2019.10.001","volume":"121","author":"M Gong","year":"2020","unstructured":"Gong, M., Feng, J., Xie, Yu.: Privacy-enhanced multi-party deep learning. Neural Netw. 121, 484\u2013496 (2020)","journal-title":"Neural Netw."},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"112","DOI":"10.3389\/fnbot.2019.00112","volume":"13","author":"C Zhang","year":"2020","unstructured":"Zhang, C., Xiongwei, H., Xie, Yu., Gong, M., Bin, Yu.: A privacy-preserving multi-task learning framework for face detection, landmark localization, pose estimation, and gender recognition. Front. Neurorobot. 13, 112 (2020)","journal-title":"Front. Neurorobot."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Xie, Yu., Wang, H., Bin, Yu., Zhang, C.: Secure collaborative few-shot learning. Knowl.-Based Syst. 203, 106157 (2020)","DOI":"10.1016\/j.knosys.2020.106157"},{"key":"3_CR5","unstructured":"Li, X., Dowsley, R., De\u00a0Cock, M.: Privacy-preserving feature selection with secure multiparty computation. In: International Conference on Machine Learning, pp. 6326\u20136336. PMLR (2021)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Jafer, Y., Matwin, S., Sokolova, M.: A framework for a privacy-aware feature selection evaluation measure. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 62\u201369. IEEE (2015)","DOI":"10.1109\/PST.2015.7232955"},{"key":"3_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102934","volume":"123","author":"M Alishahi","year":"2022","unstructured":"Alishahi, M., Moghtadaiee, V., Navidan, H.: Add noise to remove noise: Local differential privacy for feature selection. Comput. Secur. 123, 102934 (2022)","journal-title":"Comput. Secur."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Alishahi, M., Moghtadaiee, V.: Feature selection on anonymized datasets. In: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 0852\u20130859. IEEE (2023)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361521"},{"key":"3_CR9","unstructured":"Rao, V., Long, Y., Eldardiry, H., Rane, S., Rossi, R., Torres, F.: Secure two-party feature selection. arXiv preprint arXiv:1901.00832, 2019"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Wu, N., Li, H., Chen, H., Zhang, X., Wang, Y.: Privacy-preserving feature selection based on mutual information. In: GLOBECOM 2023-2023 IEEE Global Communications Conference, pp. 1789\u20131794. IEEE (2023)","DOI":"10.1109\/GLOBECOM54140.2023.10436744"},{"issue":"7","key":"3_CR11","doi-asserted-by":"publisher","first-page":"229","DOI":"10.3390\/a15070229","volume":"15","author":"S Ono","year":"2022","unstructured":"Ono, S., Takata, J., Kataoka, M., Tomohiro, I., Shin, K., Sakamoto, H.: Privacy-preserving feature selection with fully homomorphic encryption. Algorithms 15(7), 229 (2022)","journal-title":"Algorithms"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Eklund, D., Iacovazzi, A., Wang, H., Pyrgelis, A., Raza, S.: Bmi: bounded mutual information for efficient privacy-preserving feature selection. In: European Symposium on Research in Computer Security, pp. 353\u2013373. Springer (2024)","DOI":"10.1007\/978-3-031-70890-9_18"},{"key":"3_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3546843","volume-title":"Efficient and privacy-preserving feature selection based on multiparty computation","author":"L Wang","year":"2025","unstructured":"Wang, L., Guo, H., Wu, W., Zhou, L.: Efficient and privacy-preserving feature selection based on multiparty computation. IEEE Trans. Inform. Forens, Secur (2025)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 805\u2013817 (2016)","DOI":"10.1145\/2976749.2978331"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Wagh, S., Tople, S., Benhamouda, F., Kushilevitz, E., Mittal, P., Rabin, T.: Falcon: Honest-majority maliciously secure framework for private deep learning. arXiv preprint arXiv:2004.02229, 2020","DOI":"10.2478\/popets-2021-0011"},{"issue":"1\/2","key":"3_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.aci.2019.12.003","volume":"20","author":"H Zhou","year":"2024","unstructured":"Zhou, H., Wang, X., Zhang, Y.: Feature selection based on weighted conditional mutual information. Applied computing and informatics 20(1\/2), 55\u201368 (2024)","journal-title":"Applied computing and informatics"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Graves-Morris, P.R., Saff, E.B., Varga, R.S.: Rational Approximation and Interpolation: Proceedings of the United Kingdom-United States Conference, Held at Tampa, Florida, December 12-16, 1983, vol. 1105. Springer (2006)","DOI":"10.1007\/BFb0072395"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:36:51Z","timestamp":1773214611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}