{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:10:32Z","timestamp":1775913032471,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFF1203001"],"award-info":[{"award-number":["2022YFF1203001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172155"],"award-info":[{"award-number":["62172155"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472434"],"award-info":[{"award-number":["62472434"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102425"],"award-info":[{"award-number":["62102425"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Innovation Program of Hunan Province","award":["2022RC3061"],"award-info":[{"award-number":["2022RC3061"]}]},{"name":"Science and Technology Innovation Program of Hunan Province","award":["2023RC3027"],"award-info":[{"award-number":["2023RC3027"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tbdata.2025.3556639","type":"journal-article","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T19:31:46Z","timestamp":1743449506000},"page":"2749-2763","source":"Crossref","is-referenced-by-count":4,"title":["Split Learning on Segmented Healthcare Data"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4191-0630","authenticated-orcid":false,"given":"Ling","family":"Hu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6620-1898","authenticated-orcid":false,"given":"Tongqing","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7583-5086","authenticated-orcid":false,"given":"Zhihuang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-3878","authenticated-orcid":false,"given":"Fang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Design, Hunan University, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5726-833X","authenticated-orcid":false,"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, Hunan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5427"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102411"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219904"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i13.26847"},{"key":"ref5","article-title":"General data protection regulation","author":"Parliament","year":"2016"},{"issue":"6","key":"ref6","article-title":"Privacy concerns of the Australian my health record: Implications for other large-scale opt-out personal health records","volume":"57","author":"C.","year":"2020","journal-title":"Inf. Process. Manage."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00125-020-05091-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384740"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-05615-y"},{"key":"ref10","article-title":"Statistical bulletin on the development of health care in China 2022","year":"2022"},{"key":"ref11","article-title":"Statistical bulletin on the development of national healthcare security in 2022","year":"2022"},{"issue":"6","key":"ref12","first-page":"404","article-title":"Expert consensus on the application of critical care Big Data in China","volume":"103","year":"2023","journal-title":"Chin. Med. J."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chest.2018.04.037"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12028-014-0041-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2018.178"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2022.852410"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-37545-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403107"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/547"},{"key":"ref20","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref21","article-title":"Split learning for health: Distributed deep learning without sharing raw patient data","author":"Vepakomma","year":"2018"},{"key":"ref22","first-page":"20210","article-title":"Adversarial collaborative learning on Non-IID features","volume-title":"Proc. Mach. Learn. Res.","author":"Li"},{"key":"ref23","first-page":"1321","article-title":"Towards addressing label skews in one-shot federated learning","volume-title":"Proc. 11th Int. Conf. Learn. Representations","author":"Diao"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3354736"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2023.3286274"},{"key":"ref26","article-title":"LSTMSPLIT: Effective split learning based LSTM on sequential time-series data","author":"Jiang","year":"2022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15184-5"},{"issue":"4","key":"ref28","first-page":"488","article-title":"Parallel fast sort algorithm for secure multiparty computation","volume":"24","author":"Marsza\u0142ek","year":"2018","journal-title":"J. Universal Comput. Sci."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2373545"},{"issue":"5","key":"ref30","first-page":"458","article-title":"A practical and efficient secure multi-party sort protocol","volume":"14","author":"Ning","year":"2018","journal-title":"Comput. Appl. Softw."},{"key":"ref31","first-page":"351","article-title":"Completeness theorems for noncryptographic fault-tolerant distributed computations","volume-title":"Proc. 20th Annu. Symp. Theory Comput.","author":"Wigderson"},{"issue":"8","key":"ref32","first-page":"1448","article-title":"Secure multiparty multi-data ranking","volume":"43","author":"Li","year":"2020","journal-title":"Chin. J. Comput."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3605573.3605624"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25960-2_1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403356"},{"key":"ref36","volume-title":"Combinatorial Optimization: Algorithms and Complexity","author":"Papadimitriou","year":"1998"},{"key":"ref37","article-title":"Label leakage and protection in two-party split learning","author":"Li","year":"2021"},{"key":"ref38","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Stevens"},{"key":"ref39","article-title":"Regularizing and optimizing LSTM language models","author":"Merity","year":"2017"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3303232"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC62479.2024.10681942"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300146"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3334673"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2019.8900675"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhydrol.2021.126526"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687317\/11149634\/10946173.pdf?arnumber=10946173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:52:54Z","timestamp":1757011974000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10946173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2025.3556639","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}