{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:33:41Z","timestamp":1769924021469,"version":"3.49.0"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Data61 - University Collaboration Agreement"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tdsc.2022.3186672","type":"journal-article","created":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T19:27:34Z","timestamp":1657308454000},"page":"3341-3357","source":"Crossref","is-referenced-by-count":5,"title":["Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5611-3483","authenticated-orcid":false,"given":"Yanjun","family":"Zhang","sequence":"first","affiliation":[{"name":"SIT, Deakin University, Burwood, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6390-9890","authenticated-orcid":false,"given":"Guangdong","family":"Bai","sequence":"additional","affiliation":[{"name":"ITEE, The University of Queensland, Saint Lucia, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4515-6792","authenticated-orcid":false,"given":"Xue","family":"Li","sequence":"additional","affiliation":[{"name":"ITEE, The University of Queensland, Saint Lucia, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6933-0145","authenticated-orcid":false,"given":"Marthie","family":"Grobler","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2104-534X","authenticated-orcid":false,"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Biomedical Sciences, The University of Queensland, Saint Lucia, QLD, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0804-1176","authenticated-orcid":false,"given":"Ryan K L","family":"Ko","sequence":"additional","affiliation":[{"name":"School of Information Technology and Electrical Engineering, University of Queensland, Saint Lucia, QLD, Australia"}]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature15393"},{"key":"ref4","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","volume-title":"Proc. 12th USENIX Symp. Oper. Syst. Des. Implementation","author":"Abadi"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.3300"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15252\/msb.20156651"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005147"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978355"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2587623"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/66.3.429"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsigen.2018.04.004"},{"key":"ref14","first-page":"162","article-title":"Large-scale privacy-preserving mapping of human genomic sequences on hybrid clouds","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Chen"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.037"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/ng.3656"},{"key":"ref18","first-page":"3571","article-title":"Collecting telemetry data privately","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ding"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/ng.3528"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3723"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1126\/science.aau4832"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref24","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Fredrikson"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/nature18642"},{"key":"ref26","article-title":"Secure linear regression on vertically partitioned datasets","volume":"2016","author":"Gasc\u00f3n","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0053"},{"key":"ref28","article-title":"Eigen v3","author":"Guennebaud","year":"2010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1126\/science.1229566"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23064"},{"key":"ref31","volume-title":"ZeroMQ: Messaging for Many Applications","author":"Hintjens","year":"2013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000529"},{"key":"ref33","first-page":"629","article-title":"Gaia: Geo-distributed machine learning approaching $\\lbrace${LAN $\\rbrace$} speeds","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Des. Implementation","author":"Hsieh"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330765"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1126\/science.aam9710"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.34"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btt066"},{"key":"ref39","article-title":"Recurrent deep embedding networks for genotype clustering and ethnicity prediction","author":"Karim","year":"2018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsigen.2015.02.003"},{"key":"ref41","first-page":"19","article-title":"Communication efficient distributed machine learning with the parameter server","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref42","first-page":"2737","article-title":"Asynchronous parallel stochastic gradient for nonconvex optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lian"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3920"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1038\/ng2088"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/mpr.1608"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref49","article-title":"Collecting and analyzing data from smart device users with local differential privacy","author":"Nguy\u00ean","year":"2016"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1038\/ng.139"},{"key":"ref51","first-page":"619","article-title":"Oblivious $\\lbrace${Multi-Party$\\rbrace$} machine learning on trusted processors","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Ohrimenko"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.4324\/9780203793497"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1001555"},{"key":"ref54","article-title":"MIT technology review,","author":"Regalado","year":"2020"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1038\/nature13595"},{"key":"ref56","article-title":"SAFETY: Secure gwAs in federated environment through a hybrid solution with intel SGX and homomorphic encryption","author":"Sadat","year":"2017"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s00285-018-1252-8"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.cels.2016.04.013"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"issue":"9","key":"ref62","first-page":"1655","article-title":"Learning with privacy at scale","volume":"1","author":"Team","year":"2017","journal-title":"Apple Mach. Learn. J."},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1038\/nrg.2017.101"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i1.629"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2017.06.005"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsigen.2013.12.006"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450008"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015289"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btv563"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2658190"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45381-1_10"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/J.ENG.2016.02.008"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2010.11.011"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00019"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.18"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_20"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_20"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3005930"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290983"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00054"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10177761\/09822964.pdf?arnumber=9822964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T05:46:01Z","timestamp":1716443161000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9822964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":80,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3186672","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,1]]}}}