{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T07:09:54Z","timestamp":1769065794531,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006280","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T06:05:34Z","timestamp":1582610734000},"page":"2569-2576","source":"Crossref","is-referenced-by-count":92,"title":["Secure and Efficient Federated Transfer Learning"],"prefix":"10.1109","author":[{"given":"Shreya","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Chaoping","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"},{"key":"ref11","author":"chen","year":"2019","journal-title":"Secure Computation for Machine Learning With SPDZ"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref14","year":"0","journal-title":"MP-SPDZ - Versatile framework for multi-party computation"},{"key":"ref15","first-page":"535","article-title":"More efficient oblivious transfer and extensions for faster secure computation","author":"asharov","year":"2013","journal-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer &#38 Communications Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806216"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-319-78372-7_6","article-title":"Overdrive: Making SPDZ Great Again","author":"keller","year":"2018","journal-title":"Advances in Cryptology - EUROCRYPT 2018"},{"key":"ref18","first-page":"1","article-title":"Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits","author":"damg\u00e5rd","year":"2013","journal-title":"Computer Security - ESORICS 2013"},{"key":"ref19","year":"0","journal-title":"ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation"},{"key":"ref4","article-title":"Federated learning of deep networks using model averaging","volume":"abs 1602 5629","author":"mcmahan","year":"2016","journal-title":"ArXiv"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1038\/nature16961","article-title":"Mastering the game of go with deep neural networks and tree search","volume":"529","author":"silver","year":"2016","journal-title":"Nature"},{"key":"ref6","article-title":"Entity resolution and federated learning get a federated resolution","volume":"abs 1803 4035","author":"nock","year":"2018","journal-title":"CoRR"},{"key":"ref5","first-page":"892","article-title":"Secure linear regression on vertically partitioned datasets","volume":"2016","author":"gascon","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref8","first-page":"201","article-title":"CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy","author":"gilad-bachrach","year":"2016","journal-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/978-3-642-32009-5_38","article-title":"Multiparty Computation from Somewhat Homomorphic Encryption","author":"damg\u00e5rd","year":"2012","journal-title":"Advances in Cryptology - CRYPTO 2012"},{"key":"ref2","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems 25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref1","article-title":"Secure federated transfer learning","volume":"abs 1812 3337","author":"liu","year":"2018","journal-title":"CoRR"},{"key":"ref20","year":"0","journal-title":"FATE - Federated AI Technology Enabler"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"},{"key":"ref21","year":"0","journal-title":"(2019) Default of credit card clients dataset"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_26"},{"key":"ref26","first-page":"933","article-title":"A differentially private stochastic gradient descent algorithm for multiparty classification","volume":"22","author":"rajkumar","year":"2012","journal-title":"Proceedings of the Fifteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref25","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"segal","year":"2017","journal-title":"CCS"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2019,12,9]]},"end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006280.pdf?arnumber=9006280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:47:55Z","timestamp":1658094475000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006280","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}