{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:11:00Z","timestamp":1730200260599,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T00:00:00Z","timestamp":1670284800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,6]]},"DOI":"10.1109\/bibm55620.2022.9995700","type":"proceedings-article","created":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T19:09:24Z","timestamp":1672686564000},"page":"1919-1926","source":"Crossref","is-referenced-by-count":0,"title":["Private Federated Framework for Health Data"],"prefix":"10.1109","author":[{"given":"Tanzir Ul","family":"Islam","sequence":"first","affiliation":[{"name":"University of Manitoba,Department of Computer Science,Canada"}]},{"given":"Noman","family":"Mohammed","sequence":"additional","affiliation":[{"name":"University of Manitoba,Department of Computer Science,Canada"}]},{"given":"Dima","family":"Alhadidi","sequence":"additional","affiliation":[{"name":"University of Windsor,School of Computer Science,Canada"}]}],"member":"263","reference":[{"key":"ref1","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Bagdasaryan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2018.01.007"},{"volume-title":"Anonymizing data for preserving privacy during use for federated machine learning","year":"2021","author":"Choudhury","key":"ref3"},{"article-title":"Differential privacy-enabled federated learning for sensitive health data","year":"2020","author":"Choudhury","key":"ref4"},{"key":"ref5","first-page":"313","article-title":"Predicting Adverse Drug Reactions on Distributed Health Data using Federated Learning","volume-title":"AMIA Annu Symp Proc","volume":"20","author":"Choudhury"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref8","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017","journal-title":"arXiv preprint arXiv:1712.07557"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-019-0103-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"key":"ref11","article-title":"Federated Optimization: Distributed Machine Learning for On-Device Intelligence","author":"Kone\u010dn\u00fd","year":"2016","journal-title":"arXiv:1610.02527 [cs]"},{"key":"ref12","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume-title":"Proceedings of the20th International Conference on Artificial Intelligence and Statistics, volume 54 of Proceedings of Machine Learning Research","author":"McMahan"},{"key":"ref13","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics","author":"McMahan","year":"2017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020487"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-001027"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2259911"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000372"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref23","first-page":"543","article-title":"Minimality attack in privacy preserving data publishing","volume-title":"Proceedings of the 33rd international conference on Very large data bases","author":"Wong"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2016.09.014"}],"event":{"name":"2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","start":{"date-parts":[[2022,12,6]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2022,12,8]]}},"container-title":["2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994793\/9994847\/09995700.pdf?arnumber=9995700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:33:54Z","timestamp":1706790834000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/bibm55620.2022.9995700","relation":{},"subject":[],"published":{"date-parts":[[2022,12,6]]}}}