{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T14:40:13Z","timestamp":1743432013346,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819646050","type":"print"},{"value":"9789819646067","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4606-7_7","type":"book-chapter","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T14:25:27Z","timestamp":1743431127000},"page":"76-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SMC-PATE: A Secure Enhanced Private Aggregation of\u00a0Teacher Ensembles with\u00a0Secure Multiparty Computation"],"prefix":"10.1007","author":[{"given":"Anh-Tu","family":"Tran","sequence":"first","affiliation":[]},{"given":"The-Dung","family":"Luong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,24]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, S.F., et al.: Deep learning modelling techniques: current progress, applications, advantages, and challenges. Artif. Intell. Rev. 56(11), 13521\u201313617 (2023)","DOI":"10.1007\/s10462-023-10466-8"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Boenisch, F., M\u00fchl, C., Rinberg, R., Ihrig, J., Dziedzic, A.: Individualized pate: differentially private machine learning with individual privacy guarantees. arXiv preprint arXiv:2202.10517 (2022)","DOI":"10.56553\/popets-2023-0010"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10\u201312, 2005. Proceedings 2, pp. 325\u2013341. Springer (2005)","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Han, K., Kim, A., Kim, M., Song, Y.: A full RNS variant of approximate homomorphic encryption. In: Selected Areas in Cryptography\u2013SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15\u201317, 2018, Revised Selected Papers 25, pp. 347\u2013368. Springer (2019)","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, 2017, Proceedings, Part I 23, pp. 409\u2013437. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"7_CR6","unstructured":"Choquette-Choo, C.A., et al.: Capc learning: Confidential and private collaborative learning. arXiv preprint arXiv:2102.05188 (2021)"},{"key":"7_CR7","unstructured":"Ferrara, M., Tortora, A., Tota, M.: An overview of torus fully homomorphic encryption. Int. J. Group Theory (2023)"},{"key":"7_CR8","unstructured":"Goluch, S.: The development of homomorphic cryptography: from RSA to Gentry\u2019s privacy homomorphism. Ph.D. thesis (2011)"},{"key":"7_CR9","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1007\/s10994-021-05970-3","volume":"110","author":"A Grivet S\u00e9bert","year":"2021","unstructured":"Grivet S\u00e9bert, A., Pinot, R., Zuber, M., Gouy-Pailler, C., Sirdey, R.: Speed: secure, private, and efficient deep learning. Mach. Learn. 110, 675\u2013694 (2021)","journal-title":"Mach. Learn."},{"key":"7_CR10","unstructured":"Hamm, J., Cao, Y., Belkin, M.: Learning privately from multiparty data. In: International Conference on Machine Learning, pp. 555\u2013563 (2016)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Hu, J., et al.: Does differential privacy really protect federated learning from gradient leakage attacks? IEEE Trans. Mobile Comput. (2024)","DOI":"10.1109\/TMC.2024.3417930"},{"key":"7_CR12","unstructured":"Jordon, J., Yoon, J., Van Der\u00a0Schaar, M.: Pate-GAN: generating synthetic data with differential privacy guarantees. In: International Conference on Learning Representations (2018)"},{"key":"7_CR13","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.ins.2020.03.041","volume":"526","author":"J Li","year":"2020","unstructured":"Li, J., Kuang, X., Lin, S., Ma, X., Tang, Y.: Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf. Sci. 526, 166\u2013179 (2020)","journal-title":"Inf. Sci."},{"key":"7_CR14","unstructured":"Long, Y., et al.: G-pate: scalable differentially private data generator via private aggregation of teacher discriminators. In: Advances in Neural Information Processing Systems, vol. 34, pp. 2965\u20132977 (2021)"},{"issue":"12","key":"7_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3578938","volume":"55","author":"G Menghani","year":"2023","unstructured":"Menghani, G.: Efficient deep learning: a survey on making deep learning models smaller, faster, and better. ACM Comput. Surv. 55(12), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Mert, A.C., \u00d6zt\u00fcrk, E., Sava\u015f, E.: Design and implementation of encryption\/decryption architectures for BFV homomorphic encryption scheme. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 28(2), 353\u2013362 (2019)","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"7_CR17","unstructured":"Papernot, N., Abadi, M., Erlingsson, U., Goodfellow, I., Talwar, K.: Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755 (2016)"},{"key":"7_CR18","unstructured":"Papernot, N., Song, S., Mironov, I., Raghunathan, A., Talwar, K., Erlingsson, U.: Scalable private learning with PATE. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 \u2013 May 3, 2018, Conference Track Proceedings. OpenReview.net (2018). https:\/\/openreview.net\/forum?id=rkZB1XbRZ"},{"issue":"4","key":"7_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3624010","volume":"56","author":"M Rigaki","year":"2023","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM Comput. Surv. 56(4), 1\u201334 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"31","key":"7_CR20","doi-asserted-by":"crossref","first-page":"23103","DOI":"10.1007\/s00521-023-08957-4","volume":"35","author":"T Talaei Khoei","year":"2023","unstructured":"Talaei Khoei, T., Ould Slimane, H., Kaabouch, N.: Deep learning: systematic review, models, challenges, and research directions. Neural Comput. Appl. 35(31), 23103\u201323124 (2023)","journal-title":"Neural Comput. Appl."},{"key":"7_CR21","doi-asserted-by":"crossref","first-page":"167425","DOI":"10.1109\/ACCESS.2020.3023084","volume":"8","author":"HC Tanuwidjaja","year":"2020","unstructured":"Tanuwidjaja, H.C., Choi, R., Baek, S., Kim, K.: Privacy-preserving deep learning on machine learning as a service-a comprehensive survey. IEEE Access 8, 167425\u2013167447 (2020)","journal-title":"IEEE Access"},{"key":"7_CR22","unstructured":"Tian, Z., Zhao, Y., Huang, Z., Wang, Y.X., Zhang, N.L., He, H.: Seqpate: differentially private text generation via knowledge distillation. In: Advances in Neural Information Processing Systems, vol. 35, pp. 11117\u201311130 (2022)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Tran, A.T., Luong, T.D., Huynh, V.N.: A comprehensive survey and taxonomy on privacy-preserving deep learning. Neurocomputing 127345 (2024)","DOI":"10.1016\/j.neucom.2024.127345"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Yang, C.H.H., Siniscalchi, S.M., Lee, C.H.: PATE-AAE: incorporating adversarial autoencoder into private aggregation of teacher ensembles for spoken command classification. arXiv preprint arXiv:2104.01271 (2021)","DOI":"10.21437\/Interspeech.2021-640"},{"key":"7_CR25","doi-asserted-by":"crossref","first-page":"103672","DOI":"10.1016\/j.csi.2022.103672","volume":"83","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Chen, C., Xie, Y., Chen, X., Zhang, J., Xiang, Y.: A survey on privacy inference attacks and defenses in cloud-based deep neural network. Comput. Stand. Interfaces 83, 103672 (2023)","journal-title":"Comput. Stand. Interfaces"}],"container-title":["Lecture Notes in Computer Science","Integrated Uncertainty in Knowledge Modelling and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4606-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T14:25:48Z","timestamp":1743431148000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4606-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819646050","9789819646067"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4606-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"IUKM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 March 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iukm2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.jaist.ac.jp\/IUKM\/IUKM2025\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}