{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T16:56:24Z","timestamp":1761929784878},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Science Foundation","award":["1245847"],"award-info":[{"award-number":["1245847"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1109\/tcc.2015.2498921","type":"journal-article","created":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T19:34:03Z","timestamp":1447097643000},"page":"584-597","source":"Crossref","is-referenced-by-count":5,"title":["RASP-Boost: Confidential Boosting-Model Learning with Perturbed Data in the Cloud"],"prefix":"10.1109","volume":"6","author":[{"given":"Keke","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shumin","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0362-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11871637_30"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref15","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"ref17","article-title":"Machine learning classification over encrypted data","author":"bost","year":"2014","journal-title":"Proc 22nd Annu Netw Distrib Syst Security Symp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"ref19","first-page":"216","article-title":"Executing SQL over encrypted data in the database-service-provider model","author":"hacigumus","year":"0","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"key":"ref4","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"0","journal-title":"Proc Int Colloq Automata Languages Program"},{"key":"ref27","first-page":"589","article-title":"A random rotation perturbation approach to privacy preserving data classification","author":"chen","year":"0","journal-title":"Proc IEEE Int Conf Data Mining"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.251"},{"key":"ref8","year":"0"},{"key":"ref7","first-page":"35","article-title":"Faster secure two-party computation using garbled circuits","author":"huang","year":"0","journal-title":"Proc 20th USENIX Conf Security"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/335191.335438","author":"agrawal","year":"0","journal-title":"Proc ACM SIGMOD Conf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"ref22","first-page":"1401","article-title":"A short introduction to boosting","author":"freund","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/cpa.20294"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","author":"katz","year":"2007","journal-title":"Introduction to Modern Cryptography"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21606-5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/0471221317"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6245519\/8372844\/7322224-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/8372844\/07322224.pdf?arnumber=7322224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:30Z","timestamp":1649444010000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7322224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2015.2498921","relation":{},"ISSN":["2168-7161"],"issn-type":[{"value":"2168-7161","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}