{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T19:41:00Z","timestamp":1758397260563,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T00:00:00Z","timestamp":1714003200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T00:00:00Z","timestamp":1714003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.011.212"],"award-info":[{"award-number":["628.011.212"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Federated learning makes it possible to train a machine learning model on decentralized data. Bayesian networks are widely used probabilistic graphical models. While some research has been published on the federated learning of Bayesian networks, publications on Bayesian networks in a vertically partitioned data setting are limited, with important omissions, such as handling missing data. We propose a novel method called VertiBayes to train Bayesian networks (structure and parameters) on vertically partitioned data, which can handle missing values as well as an arbitrary number of parties. For structure learning we adapted the K2 algorithm with a privacy-preserving scalar product protocol. For parameter learning, we use a two-step approach: first, we learn an intermediate model using maximum likelihood, treating missing values as a special value, then we train a model on synthetic data generated by the intermediate model using the EM algorithm. The privacy guarantees of VertiBayes are equivalent to those provided by the privacy preserving scalar product protocol used. We experimentally show VertiBayes produces models comparable to those learnt using traditional algorithms. Finally, we propose two alternative approaches to estimate the performance of the model using vertically partitioned data and we show in experiments that these give accurate estimates.<\/jats:p>","DOI":"10.1007\/s40747-024-01424-0","type":"journal-article","created":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T03:37:06Z","timestamp":1714016226000},"page":"5317-5329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["VertiBayes: learning Bayesian network parameters from vertically partitioned data with missing values"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2229-8587","authenticated-orcid":false,"given":"Florian","family":"van Daalen","sequence":"first","affiliation":[]},{"given":"Lianne","family":"Ippel","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Dekker","sequence":"additional","affiliation":[]},{"given":"Inigo","family":"Bermejo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"1424_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854","volume":"149","author":"L Li","year":"2020","unstructured":"Li L, Fan Y, Tse M, Lin K-Y (2020) A review of applications in federated learning. Comput Indus Eng 149:106854. https:\/\/doi.org\/10.1016\/j.cie.2020.106854","journal-title":"Comput Indus Eng"},{"key":"1424_CR2","doi-asserted-by":"publisher","unstructured":"Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R, D\u2019Oliveira RGL, Eichner H, Rouayheb SE, Evans D, Gardner J, Garrett Z, Gasc\u00f3n A, Ghazi B, Gibbons PB, Gruteser M, Harchaoui Z, He C, He L, Huo Z, Hutchinson B, Hsu J, Jaggi M, Javidi T, Joshi G, Khodak M, Konecn\u00fd J, Korolova A, Koushanfar F, Koyejo S, Lepoint T, Liu Y, Mittal P, Mohri M, Nock R, \u00d6zg\u00fcr A, Pagh R, Qi H, Ramage D, Raskar R, Raykova M, Song D, Song W, Stich SU, Sun Z, Suresh AT, Tram\u00e8r F, Vepakomma P, Wang J, Xiong L, Xu Z, Yang Q, Yu FX, Yu H, Zhao S (2021) Advances and open problems in federated learning. Found Trends(R) Mach Learn (Now Publishers, Inc.) 14(1\u20132):1\u2013210. https:\/\/doi.org\/10.1561\/2200000083","DOI":"10.1561\/2200000083"},{"key":"1424_CR3","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J Pearl","year":"1988","unstructured":"Pearl J (1988) Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann Publishers Inc., San Francisco"},{"issue":"10","key":"1424_CR4","doi-asserted-by":"publisher","first-page":"4037","DOI":"10.1109\/TITS.2019.2934346","volume":"21","author":"H Wang","year":"2019","unstructured":"Wang H, N\u00fa\u00f1ez A, Liu Z, Zhang D, Dollevoet R (2019) A Bayesian network approach for condition monitoring of high-speed railway catenaries. IEEE Trans Intell Transport Syst 21(10):4037\u20134051","journal-title":"IEEE Trans Intell Transport Syst"},{"issue":"3","key":"1424_CR5","doi-asserted-by":"publisher","first-page":"6032","DOI":"10.1109\/LRA.2021.3090020","volume":"6","author":"R Chen","year":"2021","unstructured":"Chen R, Lu Y, Witherell P, Simpson TW, Kumara S, Yang H (2021) Ontology-driven learning of Bayesian network for causal inference and quality assurance in additive manufacturing. IEEE Robot Autom Lett 6(3):6032\u20136038","journal-title":"IEEE Robot Autom Lett"},{"key":"1424_CR6","doi-asserted-by":"publisher","first-page":"101912","DOI":"10.1016\/j.artmed.2020.101912","volume":"107","author":"S McLachlan","year":"2020","unstructured":"McLachlan S, Dube K, Hitman GA, Fenton NE, Kyrimi E (2020) Bayesian networks in healthcare: distribution by medical condition. Artif Intell Med 107:101912","journal-title":"Artif Intell Med"},{"issue":"9","key":"1424_CR7","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2006.147","volume":"18","author":"Z Yang","year":"2006","unstructured":"Yang Z, Wright RN (2006) Privacy-preserving computation of Bayesian networks on vertically partitioned data. IEEE Trans Knowl Data Eng 18(9):1253\u20131264. https:\/\/doi.org\/10.1109\/TKDE.2006.147","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1424_CR8","doi-asserted-by":"publisher","unstructured":"Wright R, Yang Z (2004) Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201904, pp 713\u2013718, New York. https:\/\/doi.org\/10.1145\/1014052.1014145 (2004)","DOI":"10.1145\/1014052.1014145"},{"key":"1424_CR9","doi-asserted-by":"publisher","unstructured":"Yang Z, Wright RN (2005) Improved privacy-preserving Bayesian network parameter learning on vertically partitioned data. In: 21st international conference on data engineering workshops (ICDEW\u201905), Tokyo, pp 1196\u20131196. https:\/\/doi.org\/10.1109\/ICDE.2005.230","DOI":"10.1109\/ICDE.2005.230"},{"key":"1424_CR10","unstructured":"Ng I, Zhang K (2022) Towards federated Bayesian network structure learning with continuous optimization. In: Proceedings of The 25th international conference on artificial intelligence and statistics, pp 8095\u20138111. ISSN: 2640-3498. https:\/\/proceedings.mlr.press\/v151\/ng22a.html. Accessed 26 Jan 2023"},{"issue":"4","key":"1424_CR11","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/BF00994110","volume":"9","author":"GF Cooper","year":"1992","unstructured":"Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309\u2013347. https:\/\/doi.org\/10.1007\/BF00994110","journal-title":"Mach Learn"},{"key":"1424_CR12","unstructured":"Koller D, Friedman N (2009) Probabilistic graphical models: principles and techniques\u2014adaptive computation and machine learning"},{"key":"1424_CR13","doi-asserted-by":"crossref","unstructured":"Dempster AP, Laird NM, Rubin DB (1977) Maximum likelihood from incomplete data via the EM algorithm. J R Stat Soc Ser B (Methodol) 39(1):1\u201338 (Royal Statistical Society, Wiley)","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"issue":"2","key":"1424_CR14","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0167-9473(93)E0056-A","volume":"19","author":"SL Lauritzen","year":"1995","unstructured":"Lauritzen SL (1995) The EM algorithm for graphical association models with missing data. Comput Stat Data Anal 19(2):191\u2013201. https:\/\/doi.org\/10.1016\/0167-9473(93)E0056-A","journal-title":"Comput Stat Data Anal"},{"key":"1424_CR15","doi-asserted-by":"publisher","unstructured":"Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends(R) Theor Comput Sci 9(3):211\u2013407. https:\/\/doi.org\/10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"issue":"8","key":"1424_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.5120\/15902-5081","volume":"91","author":"PV Parmar","year":"2014","unstructured":"Parmar PV, Padhar SB, Patel SN, Bhatt NI, Jhaveri RH (2014) Survey of various homomorphic encryption algorithms and schemes. Int J Comput Appl 91(8):26\u201332. https:\/\/doi.org\/10.5120\/15902-5081","journal-title":"Int J Comput Appl"},{"key":"1424_CR17","doi-asserted-by":"publisher","unstructured":"Yao AC (1982) Protocols for secure computations. In: 23rd annual symposium on foundations of computer science (SFCS 1982), pp 160\u2013164 (1982). https:\/\/doi.org\/10.1109\/SFCS.1982.38 . ISSN: 0272-5428","DOI":"10.1109\/SFCS.1982.38"},{"key":"1424_CR18","unstructured":"Du W, Zhan Z (2002) Building decision tree classifier on private data. In: Proceedings of the IEEE international conference on privacy, security and data mining, CRPIT \u201914, vol 14, pp 1\u20138, AUS (2002)"},{"key":"1424_CR19","doi-asserted-by":"publisher","unstructured":"Du W, Atallah MJ (2001) Privacy-preserving cooperative statistical analysis. In: Seventeenth annual computer security applications conference, New Orleans, pp 102\u2013110. https:\/\/doi.org\/10.1109\/ACSAC.2001.991526","DOI":"10.1109\/ACSAC.2001.991526"},{"key":"1424_CR20","doi-asserted-by":"publisher","unstructured":"Atallah MJ, Du W (2001) Secure multi-party computational geometry. In: Goos G, Hartmanis J, Leeuwen J, Dehne F, Sack J-R, Tamassia R (eds) Algorithms and data structures, vol 2125, pp 165\u2013179. Springer, Berlin. https:\/\/doi.org\/10.1007\/3-540-44634-6_16 (series title: lecture notes in computer science)","DOI":"10.1007\/3-540-44634-6_16"},{"key":"1424_CR21","doi-asserted-by":"publisher","unstructured":"Goethals B, Laur S, Lipmaa H, Mielik\u00e4inen T (2005) On private scalar product computation for privacy-preserving data mining. In: Hutchison D, Kanade T, Kittler J, Kleinberg JM, Mattern F, Mitchell JC, Naor M, Nierstrasz O, Pandu\u00a0Rangan C, Steffen B, Sudan M, Terzopoulos D, Tygar D, Vardi MY, Weikum G, Park C-S, Chee S (eds) Information security and cryptology\u2014ICISC 2004, vol 3506, pp 104\u2013120. Springer, Berlin. https:\/\/doi.org\/10.1007\/11496618_9 (series title: lecture notes in computer science)","DOI":"10.1007\/11496618_9"},{"key":"1424_CR22","doi-asserted-by":"publisher","unstructured":"Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining. KDD \u201902, pp 639\u2013644, New York (2002). https:\/\/doi.org\/10.1145\/775047.775142","DOI":"10.1145\/775047.775142"},{"key":"1424_CR23","doi-asserted-by":"publisher","unstructured":"Daalen F, Ippel L, Dekker A, Bermejo I (2023) Privacy preserving n-party scalar product protocol. IEEE Trans Parallel Distrib Syst 34(4):1060\u20131066 (2023) https:\/\/doi.org\/10.1109\/TPDS.2023.3238768 (conference name: IEEE Transactions on Parallel and Distributed Systems)","DOI":"10.1109\/TPDS.2023.3238768"},{"key":"1424_CR24","doi-asserted-by":"publisher","unstructured":"Abay NC, Zhou Y, Kantarcioglu M, Thuraisingham B, Sweeney L (2019) Privacy preserving synthetic data release using deep learning. In: Berlingerio M, Bonchi F, G\u00e4rtner T, Hurley N, Ifrim G (eds) Machine learning and knowledge discovery in databases, vol 11051, pp 510\u2013526. https:\/\/doi.org\/10.1007\/978-3-030-10925-7_31 (series title: lecture notes in computer Science)","DOI":"10.1007\/978-3-030-10925-7_31"},{"key":"1424_CR25","unstructured":"Moncada-Torres A, Martin F, Sieswerda M, Van\u00a0Soest J, Geleijnse G (2020) VANTAGE6: an open source priVAcy preserviNg federaTed leArninG infrastructurE for secure insight eXchange. AMIA. Annual symposium proceedings. AMIA symposium 2020, pp 870\u2013877 (2020)"},{"key":"1424_CR26","unstructured":"Frank E, Witten IH, Hall MA (2016) Data mining, 4th edn. Practical machine learning tools and techniques|guide books"},{"key":"1424_CR27","doi-asserted-by":"publisher","unstructured":"De Marsico M, Nappi M, Riccio D, Wechsler H (2015) Mobile iris challenge evaluation (MICHE)-I, biometric iris dataset and protocols. Pattern Recognit Lett 57:17\u201323. https:\/\/doi.org\/10.1016\/j.patrec.2015.02.009","DOI":"10.1016\/j.patrec.2015.02.009"},{"issue":"2","key":"1424_CR28","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1111\/j.2517-6161.1988.tb01721.x","volume":"50","author":"SL Lauritzen","year":"1988","unstructured":"Lauritzen SL, Spiegelhalter DJ (1988) Local computations with probabilities on graphical structures and their application to expert systems. J R Stat Soc Ser B (Methodol) 50(2):157\u2013194. https:\/\/doi.org\/10.1111\/j.2517-6161.1988.tb01721.x","journal-title":"J R Stat Soc Ser B (Methodol)"},{"key":"1424_CR29","doi-asserted-by":"publisher","unstructured":"Beinlich IA, Suermondt HJ, Chavez RM, Cooper GF (1989) The ALARM monitoring system: a case study with two probabilistic inference techniques for belief networks. In: AIME 89, pp 247\u2013256. : Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-93437-7_28","DOI":"10.1007\/978-3-642-93437-7_28"},{"key":"1424_CR30","unstructured":"Smith JW, Everhart JE, Dickson WC, Knowler WC, Johannes RS (1988) Using the ADAP learning algorithm to forecast the onset of diabetes mellitus. In: Proceedings of the annual symposium on computer application in medical care, pp 261\u2013265"},{"key":"1424_CR31","unstructured":"Fayyad UM, Irani KB (1993) Multi-interval discretization of continuous-valued attributes for classification learning. In: IJCAI, pp 1022\u20131029"},{"key":"1424_CR32","doi-asserted-by":"publisher","unstructured":"Akaike H (1974) A new look at the statistical model identification. IEEE Trans Autom Control 19(6):716\u2013723. https:\/\/doi.org\/10.1109\/TAC.1974.1100705 (conference name: IEEE transactions on automatic control)","DOI":"10.1109\/TAC.1974.1100705"},{"key":"1424_CR33","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1177\/089443939100900106","volume":"9","author":"P Spirtes","year":"1991","unstructured":"Spirtes P, Glymour CN, Spirtes P, Glymour C (1991) An algorithm for fast recovery of sparse causal graphs. Soc Sci Comput Rev 9:62\u201372","journal-title":"Soc Sci Comput Rev"},{"key":"1424_CR34","doi-asserted-by":"publisher","unstructured":"Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzzin Knowl-Based Syst 10(05):557\u2013570. https:\/\/doi.org\/10.1142\/S0218488502001648 (publisher: World Scientific Publishing Co)","DOI":"10.1142\/S0218488502001648"},{"key":"1424_CR35","doi-asserted-by":"publisher","first-page":"104811","DOI":"10.1016\/j.chemolab.2023.104811","volume":"237","author":"P Ramirez-Hereza","year":"2023","unstructured":"Ramirez-Hereza P, Ramos D, Toledano DT, Gonzalez-Rodriguez J, Ariza-Velazquez A, Doncel N (2023) Score-based Bayesian network structure learning algorithms for modeling radioisotope levels in nuclear power plant reactors. Chemomet Intell Lab Syst 237:104811","journal-title":"Chemomet Intell Lab Syst"},{"key":"1424_CR36","doi-asserted-by":"crossref","unstructured":"Gonzales C, Journe A, Mabrouk A (2021) Constraint-based Bayesian network structure learning using uncertain experts\u2019 knowledge. In: Thirty-fourth international Florida Artificial Intelligence Research Society conference, vol 34 (2021)","DOI":"10.32473\/flairs.v34i1.128453"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01424-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01424-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01424-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T17:23:15Z","timestamp":1721236995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01424-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,25]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1424"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01424-0","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2024,4,25]]},"assertion":[{"value":"28 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publication"}},{"value":"The code is available and can be found here: Main algorithm code: , Vantage6 wrapper code: .","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}