{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:56:51Z","timestamp":1774454211429,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["No.SCU2024D012, No.YJ202429"],"award-info":[{"award-number":["No.SCU2024D012, No.YJ202429"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["No.SCU2024D012, No.YJ202429"],"award-info":[{"award-number":["No.SCU2024D012, No.YJ202429"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science and Engineering Connotation Development Project of Sichuan University","award":["No.2020SCUNG129"],"award-info":[{"award-number":["No.2020SCUNG129"]}]},{"name":"Science and Engineering Connotation Development Project of Sichuan University","award":["No.2020SCUNG129"],"award-info":[{"award-number":["No.2020SCUNG129"]}]},{"name":"Key Laboratory of Data Protection and Intelligent Management (Sichuan University), Ministry of Education."},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.62402331"],"award-info":[{"award-number":["No.62402331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01840-6","type":"journal-article","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T10:25:57Z","timestamp":1733135157000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient privacy-preserving federated logistic regression with poor-quality users"],"prefix":"10.1007","volume":"18","author":[{"given":"Tao","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Xueyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xingshu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Changxiang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"issue":"2","key":"1840_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T et al (2019) Federated machine learning: Concept and applications. ACM Trans Intell Syst Technol 10(2):1\u201319. https:\/\/doi.org\/10.1145\/3298981","journal-title":"ACM Trans Intell Syst Technol"},{"issue":"6","key":"1840_CR2","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","volume":"2","author":"GA Kaissis","year":"2020","unstructured":"Kaissis GA, Makowski MR, R\u00fcckert D et al (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nat Mach Intell 2(6):305\u2013311. https:\/\/doi.org\/10.1038\/s42256-020-0186-1","journal-title":"Nat Mach Intell"},{"issue":"2","key":"1840_CR3","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1109\/COMST.2021.3058573","volume":"23","author":"OA Wahab","year":"2021","unstructured":"Wahab OA, Mourad A, Otrok H et al (2021) Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems. IEEE Commun Surv Tutor 23(2):1342\u20131397. https:\/\/doi.org\/10.1109\/COMST.2021.3058573","journal-title":"IEEE Commun Surv Tutor"},{"key":"1840_CR4","doi-asserted-by":"publisher","unstructured":"Shokri R, Stronati M, Song C, et al. Membership inference attacks against machine learning models. 2017 IEEE symposium on security and privacy (SP). IEEE, 2017: 3\u201318. https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"1840_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3159236","author":"C Chen","year":"2022","unstructured":"Chen C, Lyu L, Yu H et al (2022) Practical attribute reconstruction attack against federated learning. IEEE Trans Big Data. https:\/\/doi.org\/10.1109\/TBDATA.2022.3159236","journal-title":"IEEE Trans Big Data"},{"key":"1840_CR6","doi-asserted-by":"crossref","unstructured":"Mohassel P, Zhang Y (2017) Secureml: A system for scalable privacy-preserving machine learning. 2017 IEEE symposium on security and privacy (SP). IEEE, 19\u201338","DOI":"10.1109\/SP.2017.12"},{"key":"1840_CR7","doi-asserted-by":"publisher","unstructured":"Mohassel P, Rindal P (2018) ABY3: A mixed protocol framework for machine learning. Proceedings of the 2018 ACM SIGSAC conference on computer and communications security.\u00a0New York, pp 35\u201352. https:\/\/doi.org\/10.1145\/3243734.3243760","DOI":"10.1145\/3243734.3243760"},{"key":"1840_CR8","doi-asserted-by":"crossref","unstructured":"Chaudhari H, Rachuri R, Suresh A (2019) Trident: Efficient 4pc framework for privacy preserving machine learning[J]. arXiv preprint arXiv:1912.02631","DOI":"10.14722\/ndss.2020.23005"},{"key":"1840_CR9","unstructured":"Wu S, Teruya T, Kawamoto J, et al (2013) Privacy-preservation for stochastic gradient descent application to secure logistic regression. The 27th Annual Conference of the Japanese Society for Artificial Intelligence, 27: 1\u20134"},{"key":"1840_CR10","doi-asserted-by":"publisher","unstructured":"Han K, Hong S, Cheon J H, et al (2019) Logistic regression on homomorphic encrypted data at scale. Proceedings of the AAAI conference on artificial intelligence, 33(01): 9466\u20139471. https:\/\/doi.org\/10.1609\/aaai.v33i01.33019466","DOI":"10.1609\/aaai.v33i01.33019466"},{"key":"1840_CR11","doi-asserted-by":"publisher","first-page":"102769","DOI":"10.1016\/j.jnca.2020.102769","volume":"171","author":"Y Fan","year":"2020","unstructured":"Fan Y, Bai J, Lei X et al (2020) Privacy preserving based logistic regression on big data. J Netw Comput Appl 171:102769. https:\/\/doi.org\/10.1016\/j.jnca.2020.102769","journal-title":"J Netw Comput Appl"},{"issue":"17","key":"1840_CR12","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.3390\/electronics10172049","volume":"10","author":"K Edemacu","year":"2021","unstructured":"Edemacu K, Kim JW (2021) Multi-Party Privacy-Preserving Logistic Regression with Poor Quality Data Filtering for IoT Contributors. Electronics 10(17):2049. https:\/\/doi.org\/10.3390\/electronics10172049","journal-title":"Electronics"},{"key":"1840_CR13","doi-asserted-by":"publisher","unstructured":"Le H, Wang D, Ahmadi H, et al (2011) Distilling likely truth from noisy streaming data with apollo. Proceedings of the 9th acm conference on embedded networked sensor systems, 417\u2013418. https:\/\/doi.org\/10.1145\/2070942.2071018","DOI":"10.1145\/2070942.2071018"},{"key":"1840_CR14","unstructured":"Yu D, Huang H, Cassidy T, Ji H, Wang C, Zhi S, Han J, Voss C, Magdon-Ismail M (2014) The wisdom of minority: unsupervised slot filling validation based on multi-dimensional truth-finding. In: Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers, pp 1567\u20131578. https:\/\/aclanthology.org\/C14-1149.pdf"},{"issue":"11","key":"1840_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun ACM"},{"key":"1840_CR16","doi-asserted-by":"publisher","unstructured":"Wang D, Kaplan L, Le H, et al (2012) On truth discovery in social sensing: A maximum likelihood estimation approach. Proceedings of the 11th international conference on Information Processing in Sensor Networks, 233\u2013244. https:\/\/doi.org\/10.1145\/2185677.2185737","DOI":"10.1145\/2185677.2185737"},{"key":"1840_CR17","doi-asserted-by":"publisher","unstructured":"Diffie W, Hellman ME (2022) New directions in cryptography. Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 365\u2013390. https:\/\/doi.org\/10.1145\/3549993.3550007","DOI":"10.1145\/3549993.3550007"},{"key":"1840_CR18","doi-asserted-by":"publisher","unstructured":"Blum M, Micali S (2019) How to generate cryptographically strong sequences of pseudo random bits. Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 227\u2013240. https:\/\/doi.org\/10.1145\/3335741.3335751","DOI":"10.1145\/3335741.3335751"},{"key":"1840_CR19","doi-asserted-by":"publisher","unstructured":"Miao C, Jiang W, Su L, et al (2015) Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 183\u2013196. https:\/\/doi.org\/10.1145\/2809695.2809719","DOI":"10.1145\/2809695.2809719"},{"key":"1840_CR20","doi-asserted-by":"publisher","unstructured":"Bonawitz K, Ivanov V, Kreuter B, et al (2017) Practical secure aggregation for privacy-preserving machine learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 1175-1191. https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01840-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01840-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01840-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:49Z","timestamp":1747474369000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01840-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1840"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01840-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"17 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"25"}}