{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:27:22Z","timestamp":1743136042991,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785452"},{"type":"electronic","value":"9789819785469"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_6","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"109-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Utility in\u00a0Differential Privacy Models Through Feature Extraction and\u00a0Knowledge Distillation"],"prefix":"10.1007","author":[{"given":"Shuyao","family":"He","sequence":"first","affiliation":[]},{"given":"Ting","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fangzhou","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"He","sequence":"additional","affiliation":[]},{"given":"Haowei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Delving deep into rectifiers: surpassing human-level performance on imagenet classification. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1026\u20131034 (2015)","DOI":"10.1109\/ICCV.2015.123"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Yuan, J., Wu, L., Gong, Y., Yu, Z., Liu, Z., He, S.: Research on intelligent aided diagnosis system of medical image based on computer deep learning. arXiv preprint arXiv:2404.18419 (2024)","DOI":"10.1109\/ICIPCA61593.2024.10709115"},{"issue":"5","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1002\/int.22365","volume":"36","author":"S Ai","year":"2021","unstructured":"Ai, S., Hong, S., Zheng, X., Wang, Y., Liu, X.: CSRT rumor spreading model based on complex network. Int. J. Intell. Syst. 36(5), 1903\u20131913 (2021)","journal-title":"Int. J. Intell. Syst."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Liu, H., Shen, Y., Zhou, W., Zou, Y., Zhou, C., He, S.: Adaptive speed planning for unmanned vehicle based on deep reinforcement learning. arXiv preprint arXiv:2404.17379 (2024)","DOI":"10.1109\/ICMTIM62047.2024.10629559"},{"issue":"3","key":"6_CR5","first-page":"6","volume":"3","author":"T Liu","year":"2024","unstructured":"Liu, T., Li, S., Dong, Y., Mo, Y., He, S.: Spam detection and classification based on DistilBERT deep learning algorithm. Appl. Sci. Eng. J. Adv. Res. 3(3), 6\u201310 (2024)","journal-title":"Appl. Sci. Eng. J. Adv. Res."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Deng, L., Hinton, G., Kingsbury, B.: New types of deep neural network learning for speech recognition and related applications: an overview. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8599\u20138603. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6639344"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Dang, B., Zhao, W., Li, Y., Ma, D., Yu, Q., Zhu, E.Y.: Real-time pill identification for the visually impaired using deep learning (2024)","DOI":"10.1109\/CISCE62493.2024.10653353"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Song, X., et al.: ZeroPrompt: streaming acoustic encoders are zero-shot masked LMs. In: Proceedings of INTERSPEECH 2023, pp. 1648\u20131652 (2023)","DOI":"10.21437\/Interspeech.2023-1497"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Salem, A., Zhang, Y., Humbert, M., Berrang, P., Fritz, M., Backes, M.: ML-Leaks: model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)","DOI":"10.14722\/ndss.2019.23119"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Li, S., Dong, X., Ma, D., Dang, B., Zang, H., Gong, Y.: Utilizing the LightGBM algorithm for operator user credit assessment research. arXiv preprint arXiv:2403.14483 (2024)","DOI":"10.54254\/2755-2721\/75\/20240503"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Ma, D., Li, S., Dang, B., Zang, H., Dong, X.: Fostc3net: a lightweight YOLOv5 based on the network structure optimization. arXiv preprint arXiv:2403.13703 (2024)","DOI":"10.1088\/1742-6596\/2824\/1\/012004"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhu, M., Gui, K., Yu, J., Hao, Y., Sun, H.: Development and application of a Monte Carlo tree search algorithm for simulating Da Vinci code game strategies. arXiv preprint arXiv:2403.10720 (2024)","DOI":"10.3390\/a17080334"},{"key":"6_CR15","unstructured":"Pichapati, V., Suresh, A.T., Yu, F.X., Reddi, S.J., Kumar, S.: AdaCliP: adaptive clipping for private SGD. arXiv preprint arXiv:1908.07643 (2019)"},{"key":"6_CR16","unstructured":"Andrew, G., Thakkar, O., McMahan, B., Ramaswamy, S.: Differentially private learning with adaptive clipping. In: Advances in Neural Information Processing Systems, vol.\u00a034, pp. 17455\u201317466 (2021)"},{"key":"6_CR17","unstructured":"Yu, D., Zhang, H., Chen, W.: Improve the gradient perturbation approach for differentially private optimization. In: NeurIPS 2018 Workshop (2018)"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-030-88428-4_27","volume-title":"Computer Security \u2013 ESORICS 2021","author":"L Gondara","year":"2021","unstructured":"Gondara, L., Carvalho, R.S., Wang, K.: Training differentially private neural networks with lottery tickets. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021, Part II. LNCS, vol. 12973, pp. 543\u2013562. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88428-4_27"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, M., Zhang, Y., Gong, Y., Xing, K., Yan, X., Song, J.: Ensemble methodology: innovations in credit default prediction using LightGBM, XGBoost, and LocalEnsemble. arXiv preprint arXiv:2402.17979 (2024)","DOI":"10.1109\/ICETCI61221.2024.10594630"},{"key":"6_CR20","unstructured":"Zhang, Y., Gong, Y., Cui, D., Li, X., Shen, X.: DeepGI: an automated approach for gastrointestinal tract segmentation in MRI scans. arXiv preprint arXiv:2401.15354 (2024)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Liu, R., et al.: Enhanced detection classification via clustering SVM for various robot collaboration task. arXiv preprint arXiv:2405.03026 (2024)","DOI":"10.1109\/CISCE62493.2024.10653146"},{"key":"6_CR22","unstructured":"Leino, K., Fredrikson, M.: Stolen memories: leveraging model memorization for calibrated white-box membership inference. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 1605\u20131622 (2020)"},{"key":"6_CR23","unstructured":"Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1895\u20131912 (2019)"},{"issue":"1","key":"6_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.62836\/iaet.vli1.002","volume":"1","author":"S Li","year":"2022","unstructured":"Li, S., Mo, Y., Li, Z.: Automated pneumonia detection in chest X-ray images using deep learning model. Innov. Appl. Eng. Technol. 1(1), 1\u20136 (2022)","journal-title":"Innov. Appl. Eng. Technol."},{"key":"6_CR25","unstructured":"van\u00a0der Veen, K.L., Seggers, R., Bloem, P., Patrini, G.: Three tools for practical differential privacy. arXiv preprint arXiv:1812.02890 (2018)"},{"key":"6_CR26","unstructured":"Du, J., Li, S., Chen, X., Chen, S., Hong, M.: Dynamic differential-privacy preserving SGD. arXiv preprint arXiv:2111.00173 (2021)"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ding, J., Wu, M., Wong, S.T., Van\u00a0Nguyen, H., Pan, M.: Adaptive privacy preserving deep learning algorithms for medical data. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1169\u20131178 (2021)","DOI":"10.1109\/WACV48630.2021.00121"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Z., Li, C., Wang, X.: Convolutional neural network pruning with structural redundancy reduction. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14913\u201314922 (2021)","DOI":"10.1109\/CVPR46437.2021.01467"},{"issue":"1","key":"6_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.62836\/iaet.v2i1.162","volume":"2","author":"Z Li","year":"2023","unstructured":"Li, Z., Yu, H., Xu, J., Liu, J., Mo, Y.: Stock market analysis and prediction using LSTM: a case study on technology stocks. Innov. Appl. Eng. Technol. 2(1), 1\u20136 (2023)","journal-title":"Innov. Appl. Eng. Technol."},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"3434","DOI":"10.1109\/TIP.2021.3061908","volume":"30","author":"L Chen","year":"2021","unstructured":"Chen, L., Jiang, X., Liu, X., Zhou, Z.: Logarithmic norm regularized low-rank factorization for matrix and tensor completion. IEEE Trans. Image Process. 30, 3434\u20133449 (2021)","journal-title":"IEEE Trans. Image Process."},{"key":"6_CR31","unstructured":"Chen, X., Wu, S.Z., Hong, M.: Understanding gradient clipping in private SGD: a geometric perspective. In: Advances in Neural Information Processing Systems, vol.\u00a033, pp. 13773\u201313782 (2020)"},{"key":"6_CR32","unstructured":"Song, S., Thakkar, O., Thakurta, A.: Characterizing private clipped gradient descent on convex generalized linear problems. arXiv preprint arXiv:2006.06783 (2020)"},{"key":"6_CR33","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.R.: Improving neural networks by preventing co-adaptation of feature detectors. arXiv preprint arXiv:1207.0580 (2012)"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Bucilu\u01ce, C., Caruana, R., Niculescu-Mizil, A.: Model compression. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 535\u2013541 (2006)","DOI":"10.1145\/1150402.1150464"},{"key":"6_CR35","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Papernot, N., Thakurta, A., Song, S., Chien, S., Erlingsson, \u00da.: Tempered sigmoid activations for deep learning with differential privacy. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 10, pp. 9312\u20139321 (2021)","DOI":"10.1609\/aaai.v35i10.17123"},{"key":"6_CR37","unstructured":"Wang, Z., et al.: DPAdapter: improving differentially private deep learning through noise tolerance pre-training. arXiv preprint arXiv:2403.02571 (2024)"},{"issue":"3","key":"6_CR38","first-page":"1","volume":"3","author":"Y Mo","year":"2024","unstructured":"Mo, Y., Li, S., Dong, Y., Zhu, Z., Li, Z.: Password complexity prediction based on RoBERTa algorithm. Appl. Sci. Eng. J. Adv. Res. 3(3), 1\u20135 (2024)","journal-title":"Appl. Sci. Eng. J. Adv. Res."},{"key":"6_CR39","unstructured":"Mo, Y., Qin, H., Dong, Y., Zhu, Z., Li, Z.: Large language model (LLM) AI text generation detection based on transformer deep learning algorithm. arXiv preprint arXiv:2405.06652 (2024)"},{"key":"6_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:11:26Z","timestamp":1729156286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}