{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T06:24:55Z","timestamp":1768803895023,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012456","name":"National Cryptologic Science Fund of China","doi-asserted-by":"publisher","award":["2025NCSF02015"],"award-info":[{"award-number":["2025NCSF02015"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030"],"award-info":[{"award-number":["U22B2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302360"],"award-info":[{"award-number":["62302360"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2024SF2-GJHX-37"],"award-info":[{"award-number":["2024SF2-GJHX-37"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["YJSJ25011"],"award-info":[{"award-number":["YJSJ25011"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3597728","type":"journal-article","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T17:42:27Z","timestamp":1754934147000},"page":"8701-8714","source":"Crossref","is-referenced-by-count":1,"title":["SGBoost<sup>+<\/sup>: Efficient and Privacy-Preserving Vertical Boosting Trees for Federated Outsourced Training and Inference"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8948-9516","authenticated-orcid":false,"given":"Wei","family":"Xu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5853-633X","authenticated-orcid":false,"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1604-1953","authenticated-orcid":false,"given":"Jiaqi","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4534-5670","authenticated-orcid":false,"given":"Yandong","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6886-8258","authenticated-orcid":false,"given":"Fengwei","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0534-5036","authenticated-orcid":false,"given":"Baishun","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0558-4485","authenticated-orcid":false,"given":"Songnian","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8515-7124","authenticated-orcid":false,"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/acsac.2001.991526"},{"key":"ref5","article-title":"Entity resolution and federated learning get a federated resolution","author":"Nock","year":"2018","journal-title":"arXiv:1803.04035"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407811"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482361"},{"key":"ref9","article-title":"SecureBoost+: Large scale and high-performance vertical federated gradient boosting decision tree","author":"Fan","year":"2021","journal-title":"arXiv:2110.10927"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3279839"},{"key":"ref11","first-page":"6435","article-title":"Squirrel: A scalable secure two-party computation framework for training gradient boosting decision tree","volume-title":"Proc. USENIX Secur. Symp.","author":"Lu"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3232955"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48000-6_14"},{"key":"ref14","first-page":"493","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. USENIX","author":"Zhang"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_27"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0026"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977253"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3231785"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref22","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref23","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Juvekar"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3435493"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3394706"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3396384"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1112\/S1461157016000218"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974331.ch2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511721656"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23166"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517413"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11122453.pdf?arnumber=11122453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:51:27Z","timestamp":1755910287000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11122453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3597728","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}