{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T07:52:33Z","timestamp":1773906753552,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636219"],"award-info":[{"award-number":["U1636219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373167"],"award-info":[{"award-number":["61373167"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Youth Foundation of Hubei Province","award":["2017CFA047"],"award-info":[{"award-number":["2017CFA047"]}]},{"name":"Key Program of Natural Science Foundation of Hubei Province","award":["2017CFA007"],"award-info":[{"award-number":["2017CFA007"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science of China","doi-asserted-by":"crossref","award":["61702380"],"award-info":[{"award-number":["61702380"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hubei Provincial Natural Science Foundation of China","award":["2017CFB134"],"award-info":[{"award-number":["2017CFB134"]}]},{"name":"Technological Innovation Projects of Hubei Province","award":["2017AAA125"],"award-info":[{"award-number":["2017AAA125"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572382"],"award-info":[{"award-number":["61572382"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Basic Research Plan in Shannxi Province of China","award":["2016JZ021"],"award-info":[{"award-number":["2016JZ021"]}]},{"name":"Distinguished Young Scholars Fund of Fujian, China","award":["2016J06013"],"award-info":[{"award-number":["2016J06013"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1109\/tkde.2018.2819673","type":"journal-article","created":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T18:05:32Z","timestamp":1522087532000},"page":"2381-2393","source":"Crossref","is-referenced-by-count":61,"title":["Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-8525","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6620-6923","authenticated-orcid":false,"given":"Minxin","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1382-0679","authenticated-orcid":false,"given":"Xiuying","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5858-5070","authenticated-orcid":false,"given":"Yanjiao","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8629-4622","authenticated-orcid":false,"given":"Pan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0070-1707","authenticated-orcid":false,"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Efficient privacy-preserving biometric identification","author":"evans","year":"2011","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref31","first-page":"307","article-title":"Noise-contrastive estimation of unnormalized statistical models, with applications to natural image statistics","volume":"13","author":"gutmann","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947611"},{"key":"ref10","first-page":"2905","article-title":"A near-optimal algorithm for differentially-private principal components","volume":"14","author":"chaudhuri","year":"2013","journal-title":"J Mach Learn Res"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350253"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1145\/2810103.2813687","article-title":"Privacy-preserving deep learning","author":"shokri","year":"2015","journal-title":"Proc 22nd ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"ref15","author":"goldreich","year":"2009","journal-title":"Foundations of Cryptography Volume 2 Basic Applications"},{"key":"ref16","article-title":"Distributed representations","author":"hinton","year":"1986","journal-title":"Parallel Distributed Processing Explorations in the Microstructure of Cognition"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390177"},{"key":"ref18","first-page":"384","article-title":"Word representations: A simple and general method for semi-supervised learning","author":"turian","year":"2010","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"key":"ref19","first-page":"746","article-title":"Linguistic regularities in continuous space word representations","volume":"13","author":"mikolov","year":"2013","journal-title":"Proc Conf North Amer Chapter Assoc Comput Linguistics Human Lang Technol"},{"key":"ref28","first-page":"246","article-title":"Hierarchical probabilistic neural network language model","volume":"5","author":"morin","year":"2005","journal-title":"Proc AISTATS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24768-5_41"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897875"},{"key":"ref29","first-page":"1081","article-title":"A scalable hierarchical distributed language model","author":"mnih","year":"2009","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"ref8","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume":"48","author":"dowlin","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"ref2","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"},{"key":"ref9","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Int Colloq Automata Lang Program"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref20","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"bengio","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref22","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Proc NIPS 13"},{"key":"ref21","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","author":"katz","year":"2014","journal-title":"Introduction to Modern Cryptography"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref26","volume":"55","author":"abramowitz","year":"1964","journal-title":"Handbook of Mathematical Functions with Formulas Graphs and Mathematical Tables"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808774"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/8525379\/08325493.pdf?arnumber=8325493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T01:17:24Z","timestamp":1660699044000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8325493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,1]]},"references-count":32,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2018.2819673","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,1]]}}}