{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:38:18Z","timestamp":1773376698900,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,25]]},"DOI":"10.1109\/isit54713.2023.10206617","type":"proceedings-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T13:31:15Z","timestamp":1692711075000},"page":"921-926","source":"Crossref","is-referenced-by-count":3,"title":["Breaking the Quadratic Communication Overhead of Secure Multi-Party Neural Network Training"],"prefix":"10.1109","author":[{"given":"Xingyu","family":"Lu","sequence":"first","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Riverside"}]},{"given":"Ba\u015fak","family":"G\u00fcler","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Riverside"}]}],"member":"263","reference":[{"key":"ref13","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory of Cryptography Conference"},{"key":"ref35","article-title":"On the expressive power of deep polynomial neural networks","volume":"32","author":"kileel","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3053220"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019466"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3058891"},{"key":"ref14","first-page":"289","article-title":"Privacy-preserving logistic regression","author":"chaudhuri","year":"2009","journal-title":"Adv in Neural Inf Proc Sys"},{"key":"ref36","article-title":"Dres-fl: Dropout-resilient secure federated learning for non-iid clients via secret data sharing","author":"shao","year":"2022","journal-title":"Advances in Neural Information Processing Systems Annual Conference on Neural Information Processing Systems NeurIPS"},{"key":"ref31","first-page":"1","article-title":"Privacy-preserving outsourced classification in cloud computing","author":"li","year":"2017","journal-title":"Cluster Computing"},{"key":"ref30","first-page":"35","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"chabanne","year":"2017","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref11","article-title":"A scalable approach for privacy-preserving collaborative machine learning","author":"so","year":"2020","journal-title":"Advances in Neural Information Processing Systems Annual Conference on Neural Information Processing Systems NeurIPS"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2819673"},{"key":"ref10","first-page":"1215","article-title":"Lagrange coded computing: Optimal design for resiliency, security, and privacy","author":"yu","year":"2019","journal-title":"The 22nd International Conference on Artificial Intelligence and Statistics AISTATS 2019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0401-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref17","first-page":"1876","article-title":"Multiparty differential privacy via aggregation of locally trained classifiers","author":"pathak","year":"2010","journal-title":"Adv in Neural Info Proc Syst"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref19","first-page":"933","article-title":"A differentially private stochastic gradient descent algorithm for multiparty classification","volume":"22","author":"rajkumar","year":"2012","journal-title":"Int Conf on Artificial Intelligence and Statistics"},{"key":"ref18","article-title":"Learning differentially private recurrent language models","author":"mcmahan","year":"2018","journal-title":"Int Conf on Learning Representations"},{"key":"ref24","volume":"20","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref23","first-page":"5201","article-title":"The distributed discrete gaussian mechanism for federated learning with secure aggregation","author":"kairouz","year":"2021","journal-title":"International Conference on Machine Learning"},{"key":"ref26","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"Int Conf on Machine Learning"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref20","first-page":"6346","article-title":"Distributed learning without distress: Privacy-preserving empirical risk minimization","author":"jayaraman","year":"2018","journal-title":"Advances in in Neural Information Processing Systems"},{"key":"ref22","first-page":"3056","article-title":"The fundamental price of secure aggregation in differentially private federated learning","author":"chen","year":"2022","journal-title":"International Conference on Machine Learning"},{"key":"ref21","first-page":"3490","article-title":"The poisson binomial mechanism for unbiased federated learning with secure aggregation","author":"chen","year":"2022","journal-title":"International Conference on Machine Learning"},{"key":"ref28","first-page":"1","article-title":"ML confidential: Machine learning on encrypted data","author":"graepel","year":"2012","journal-title":"Int Conf on Information Security and Cryptology"},{"key":"ref27","author":"hesamifard","year":"2017","journal-title":"CryptoDL Deep neural networks over encrypted data"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1515\/popets-2017-0053","article-title":"Privacy-preserving distributed linear regression on high-dimensional data","volume":"2017","author":"gasc\u00f3n","year":"2017","journal-title":"Proceedings on Privacy Enhancing Tech"},{"key":"ref9","article-title":"SecureNN: Efficient and private neural network training","author":"wagh","year":"2018","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_13"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_32"}],"event":{"name":"2023 IEEE International Symposium on Information Theory (ISIT)","location":"Taipei, Taiwan","start":{"date-parts":[[2023,6,25]]},"end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206429\/10206441\/10206617.pdf?arnumber=10206617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:27:45Z","timestamp":1773347265000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10206617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,25]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/isit54713.2023.10206617","relation":{},"subject":[],"published":{"date-parts":[[2023,6,25]]}}}