{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T00:03:55Z","timestamp":1756771435789,"version":"3.44.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/globalsip45357.2019.8969086","type":"proceedings-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:51:57Z","timestamp":1580431917000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Preserving Deep Learning with Distributed Encoders"],"prefix":"10.1109","author":[{"given":"Yitian","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Toronto,Department of Electrical &#x0026; Computer Engineering,Toronto,Canada"}]},{"given":"Hojjat","family":"Salehinejad","sequence":"additional","affiliation":[{"name":"University of Toronto,Department of Electrical &#x0026; Computer Engineering,Toronto,Canada"}]},{"given":"Joseph","family":"Barfett","sequence":"additional","affiliation":[{"name":"St. Michael&#x2019;s Hospital,Medical Imaging Department,Toronto,Canada"}]},{"given":"Errol","family":"Colak","sequence":"additional","affiliation":[{"name":"St. Michael&#x2019;s Hospital,Medical Imaging Department,Toronto,Canada"}]},{"given":"Shahrokh","family":"Valaee","sequence":"additional","affiliation":[{"name":"University of Toronto,Department of Electrical &#x0026; Computer Engineering,Toronto,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462241"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682914"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.94"},{"issue":"1","key":"ref4","article-title":"Privacy and security concerns in healthcare big data: An innovative prescriptive","volume":"12","author":"Jain","year":"2017","journal-title":"Journal of Information Assurance & Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2016.2515610"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5421-1_9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417113"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.40"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"article-title":"Communication-efficient learning of deep networks from decentralized data","year":"2016","author":"McMahan","key":"ref10"},{"key":"ref11","first-page":"4424","article-title":"Federated multi-task learning","author":"Smith","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"Differentially private federated learning: A client level perspective","year":"2017","author":"Geyer","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2018.2881415"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461430"},{"article-title":"Survey of dropout methods for deep neural networks","year":"2019","author":"Labach","key":"ref15"},{"article-title":"The mnist database of handwritten digits","year":"1998","author":"LeCun","key":"ref16"},{"article-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","year":"2017","author":"Xiao","key":"ref17"},{"article-title":"Reading digits in natural images with unsupervised feature learning","year":"2011","author":"Netzer","key":"ref18"},{"key":"ref19","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"Citeseer, Tech. Rep."},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref20"}],"event":{"name":"2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","start":{"date-parts":[[2019,11,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2019,11,14]]}},"container-title":["2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961038\/8969075\/08969086.pdf?arnumber=8969086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:22:18Z","timestamp":1756754538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8969086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/globalsip45357.2019.8969086","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}