{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:50:10Z","timestamp":1775069410534,"version":"3.50.1"},"reference-count":111,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100013114","name":"Broad Institute","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013114","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179350","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"1908-1925","source":"Crossref","is-referenced-by-count":18,"title":["Scalable and Privacy-Preserving Federated Principal Component Analysis"],"prefix":"10.1109","author":[{"given":"David","family":"Froelicher","sequence":"first","affiliation":[{"name":"MIT"}]},{"given":"Hyunghoon","family":"Cho","sequence":"additional","affiliation":[{"name":"Broad Institute of MIT and Harvard"}]},{"given":"Manaswitha","family":"Edupalli","sequence":"additional","affiliation":[{"name":"Broad Institute of MIT and Harvard"}]},{"given":"Joao","family":"Sa Sousa","sequence":"additional","affiliation":[{"name":"EPFL"}]},{"given":"Jean-Philippe","family":"Bossuat","sequence":"additional","affiliation":[{"name":"EPFL"}]},{"given":"Apostolos","family":"Pyrgelis","sequence":"additional","affiliation":[{"name":"EPFL"}]},{"given":"Juan R.","family":"Troncoso-Pastoriza","sequence":"additional","affiliation":[{"name":"EPFL"}]},{"given":"Bonnie","family":"Berger","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"EPFL"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1037\/h0071325"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/14786440109462720"},{"key":"ref3","volume-title":"11 Different Uses of Dim. Reduc","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.08.011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.079"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2015.0202"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2013.01.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.12732\/ijpam.v115i1.12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/ng1847"},{"key":"ref10","article-title":"A Recommender System using Principal Component Analysis","volume-title":"11th panhellenic Conf. in informatics","author":"Vozalis"},{"key":"ref11","volume-title":"Dimensionality Reduction using PCA on Multivariate Timeseries Data","year":"2022"},{"key":"ref12","volume-title":"The PCA [\u2026] with Time-Series","year":"2022"},{"key":"ref13","volume-title":"Large-Scale [\u2026] Detection","year":"2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.03.082"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2323"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2172\/15002155"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/ng1333"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-biodatasci-012220-100601"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2022.100487"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2853589"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tcds.2019.2924648"},{"key":"ref23","volume-title":"The Ambitious Effort to Piece Toghether Americas Fragmented Health Data","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0030"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24119"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-25972-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2196\/25120"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00028"},{"key":"ref33","article-title":"Distributed Dimension Reduction Algorithms for Widely Dispersed Data","volume-title":"IASTED PDCS","author":"Abu-Khzam"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11573937_51"},{"key":"ref35","article-title":"Improved Distributed Principal Component Analysis","author":"Balcan","year":"2014","journal-title":"Tech. Rep."},{"key":"ref36","article-title":"Federated-PCA on Vertical-Partitioned Data","author":"Cheung","year":"2020","journal-title":"Tech. Rep."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1214\/18-AOS1713"},{"key":"ref38","article-title":"Dimensionality Reduction in Decentralized Networks by Gossip Aggregation of Principal Components Analyzers","volume-title":"ESANN","author":"Fellus"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683095"},{"key":"ref40","article-title":"Distributed PCA and K-means Clustering","volume-title":"The Big Learning Workshop at NIPS","author":"Liang"},{"key":"ref41","article-title":"Improved Distributed Principal Component Analysis","volume-title":"NeurIPS","author":"Liang"},{"key":"ref42","article-title":"Global Principal Component Analysis for Dimensionality Reduction in Distributed Data Mining","author":"Qi","year":"2004","journal-title":"Statistical data mining and knowledge discovery"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1501"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2858818"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.4108"},{"key":"ref46","article-title":"PPCA: Privacy-Preserving Principal Component Analysis Using MPC","author":"Fan","year":"2021","journal-title":"arXiv"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1137\/090771806"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0071"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_18"},{"key":"ref52","article-title":"Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption","author":"L\u00f3pez-Alt","year":"2011","journal-title":"ePrint"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09452-8"},{"key":"ref54","volume-title":"MNIST Handwritten Digit Database","author":"LeCun","year":"2010"},{"key":"ref55","volume-title":"GWAS of Lung Cancer Susceptibility in Never-Smoking Women in Asia","year":"2022"},{"key":"ref56","article-title":"GAZELLE: A low latency frameworkfor secure neural network inference","volume-title":"USENIX","author":"Juvekar"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_4"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1836288"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref62","article-title":"Somewhat Practical Fully Homomorphic Encryption","author":"Fan","year":"2012","journal-title":"IACR Cryptology"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050407"},{"key":"ref64","article-title":"Practical MPC+FHE with Applications in Secure Multi-Party Neural Network Evaluation","author":"Zhu","year":"2020","journal-title":"ePrint"},{"key":"ref65","article-title":"Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition","author":"Kim","year":"2022","journal-title":"ePrint"},{"key":"ref66","article-title":"A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup","author":"Kwak","year":"2021","journal-title":"ePrint"},{"key":"ref67","doi-asserted-by":"crossref","DOI":"10.5753\/sbseg.2015.20110","article-title":"Principal Component Analysis over Encrypted Data using Homomorphic Encryption","volume-title":"WAHC","author":"Pereira"},{"key":"ref68","article-title":"Accelerated Stochastic Power Iteration","volume-title":"PMLR","author":"De Sa"},{"key":"ref69","article-title":"Communication-Efficient Algorithms for Distributed Stochastic Principal Component Analysis","author":"Garber","year":"2017","journal-title":"arXiv"},{"key":"ref70","article-title":"Federated Singular Value Decomposition for High Dimensional Data","author":"Hartebrodt","year":"2022","journal-title":"arXiv"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2846568"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref74","article-title":"Privacy Preserving PCA for Multiparty Modeling","author":"Liu","year":"2020","journal-title":"arXiv"},{"key":"ref75","article-title":"Federated Principal Component Analysis","volume-title":"NeurIPS","author":"Grammenos"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462519"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.12.019"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/S0024-3795(00)00171-3"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref81","article-title":"On the Precision Loss in Approximate HE","author":"Costache","year":"2022","journal-title":"ePrint"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06944-4_19"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95312-6_6"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_23"},{"key":"ref85","article-title":"Remark on the Security of CKKS Scheme in Practice","volume-title":"IACR Cryptol.","author":"Cheon"},{"key":"ref86","doi-asserted-by":"crossref","DOI":"10.1145\/3474366.3486928","article-title":"Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors","volume-title":"IACR Cryptol.","author":"de Castro"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1090\/pspum\/020\/0316385"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/320941.320947"},{"key":"ref89","volume-title":"Theorie des mecanismes connus sous le nom de parallelogrammes","author":"Chebyshev","year":"1853"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/6.1.99"},{"key":"ref92","volume-title":"Go Programming Language","year":"2022"},{"key":"ref93","volume-title":"Lattigo","year":"2022"},{"key":"ref94","volume-title":"Cothority network library","year":"2022"},{"key":"ref95","volume-title":"Mininet","year":"2022"},{"key":"ref96","volume-title":"The Inter. Genome Sample Resource","year":"2022"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"key":"ref98","volume-title":"Wine Quality","year":"2022"},{"key":"ref99","volume-title":"Pima Indians Diabetes Dataset","year":"2022"},{"key":"ref100","volume-title":"Statlog Vehicle Silhouettes","year":"2022"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref102","volume-title":"Client Software for an End-to-End MPC Protocol for PCA","year":"2022"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2976612"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_21"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_13"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"ref109","article-title":"Software Division and Square Root using Goldschmidts Algorithms","volume-title":"RNC\u20196","author":"Markstein"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_23"},{"key":"ref111","volume-title":"Anomaly Detection in Time Series Sensor Data","year":"2022"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179350.pdf?arnumber=10179350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:18:28Z","timestamp":1721452708000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":111,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179350","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}