{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:37:08Z","timestamp":1729676228509,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icassp.2017.7953387","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:35:36Z","timestamp":1497980136000},"page":"6394-6398","source":"Crossref","is-referenced-by-count":0,"title":["Crowd-ML: A library for privacy-preserving machine learning on smart devices"],"prefix":"10.1109","author":[{"given":"Jihun","family":"Hamm","sequence":"first","affiliation":[]},{"given":"Jackson","family":"Luken","sequence":"additional","affiliation":[]},{"given":"Yani","family":"Xie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"555","article-title":"Learning privately from multiparty data","author":"hamm","year":"2016","journal-title":"Proc 33rd Int Conf Mach Learn"},{"key":"ref11","first-page":"528","author":"dwork","year":"2004","journal-title":"Advances in Cryptology"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","author":"dwork","year":"2006","journal-title":"Theory of Cryptography"},{"key":"ref13","first-page":"1","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref14","first-page":"1069","article-title":"Dif-ferentially private empirical risk minimization","volume":"12","author":"chaudhuri","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"duchi","year":"2011","journal-title":"Journal of Machine Learning Research"},{"journal-title":"Coursera Neural networks for machine learning lecture 6 5","year":"2012","author":"tieleman","key":"ref16"},{"key":"ref17","first-page":"703","article-title":"Differential privacy for functions and functional data","volume":"14","author":"hall","year":"2013","journal-title":"Journal of Machine Learning Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"journal-title":"Feder-ated learning of deep networks using model averaging","year":"2016","author":"mcmahan","key":"ref4"},{"key":"ref3","article-title":"Optimal distributed online prediction","author":"dekel","year":"2011","journal-title":"Proc International Conference on Machine Learning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2684464.2684480"},{"key":"ref7","first-page":"933","article-title":"A differentially private stochastic gradient descent algorithm for multiparty classification","author":"rajkumar","year":"2012","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref2","first-page":"873","article-title":"Distributed delayed stochastic optimization","author":"agarwal","year":"2011","journal-title":"Proc Neural Information Processing Systems"},{"key":"ref1","first-page":"484","article-title":"Dis-tributed asynchronous deterministic and stochastic gradient optimization algorithms","author":"tsitsiklis","year":"1984","journal-title":"American Control Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.10"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends in Theoretical Computer Science"}],"event":{"name":"2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2017,3,5]]},"location":"New Orleans, LA","end":{"date-parts":[[2017,3,9]]}},"container-title":["2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7943262\/7951776\/07953387.pdf?arnumber=7953387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T07:25:57Z","timestamp":1569482757000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7953387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icassp.2017.7953387","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}