{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T09:27:19Z","timestamp":1777714039003,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["LM011028-01"],"award-info":[{"award-number":["LM011028-01"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1223396 and 1408944"],"award-info":[{"award-number":["1223396 and 1408944"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001711","name":"Schweizerische Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813687","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1310-1321","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1366,"title":["Privacy-Preserving Deep Learning"],"prefix":"10.1145","author":[{"given":"Reza","family":"Shokri","sequence":"first","affiliation":[{"name":"University of Texas at Austin, Austin, USA"}]},{"given":"Vitaly","family":"Shmatikov","sequence":"additional","affiliation":[{"name":"Cornell University, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2638571"},{"key":"e_1_3_2_1_2_1","volume-title":"Nonlinear Programming: Analysis and Methods","author":"Avriel M.","year":"2003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108650"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180431"},{"key":"e_1_3_2_1_8_1","volume-title":"NIPS","author":"Chaudhuri K.","year":"2009"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021036"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2567754"},{"key":"e_1_3_2_1_11_1","volume-title":"NIPS Workshop","author":"Collobert R.","year":"2011"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40763-5_50"},{"key":"e_1_3_2_1_14_1","volume-title":"NIPS","author":"Dean J.","year":"2012"},{"key":"e_1_3_2_1_15_1","volume-title":"ICML Workshop","author":"Denas O.","year":"2013"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"A tutorial survey of architectures, algorithms, and applications for deep learning","author":"Deng L.","year":"2014","journal-title":"APSIPA Trans. Signal and Information Processing"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.21"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021068"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_1_22_1","volume-title":"WHEALTH","author":"Fakoor R.","year":"2013"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_1_24_1","volume-title":"et al. Deepspeech: Scaling up end-to-end speech recognition. arXiv:1412.5567","author":"Hannun A.","year":"2014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_1_26_1","volume-title":"Delving deep into rectifiers: Surpassing human-level performance on ImageNet classification. arXiv:1502.01852","author":"He K.","year":"2015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"e_1_3_2_1_29_1","volume-title":"To drop or not to drop: Robustness, consistency and differential privacy properties of dropout. arXiv:1503.02031","author":"Jain P.","year":"2015"},{"key":"e_1_3_2_1_30_1","volume-title":"NIPS","author":"Krizhevsky A.","year":"2012"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2014.2377729"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_34_1","volume-title":"Machine Learning: A Probabilistic Perspective","author":"Murphy K. P.","year":"2012"},{"key":"e_1_3_2_1_35_1","volume-title":"NIPS Workshop","author":"Netzer Y.","year":"2011"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2215602"},{"key":"e_1_3_2_1_37_1","volume-title":"NIPS","author":"Pathak M.","year":"2010"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947696"},{"key":"e_1_3_2_1_39_1","volume-title":"NIPS","author":"Recht B.","year":"2011"},{"key":"e_1_3_2_1_40_1","volume-title":"NSDI","author":"Roy I.","year":"2010"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i1.612"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/65669.104449"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2259911"},{"key":"e_1_3_2_1_44_1","volume-title":"Science, 347(6221)","author":"Shultz D.","year":"2015"},{"key":"e_1_3_2_1_45_1","volume-title":"Document Analysis and Recognition","author":"Simard P.","year":"2013"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/11503415_37"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_3_2_1_49_1","unstructured":"Torch7. A scientific computing framework for LuaJIT (torch.ch).  Torch7. A scientific computing framework for LuaJIT (torch.ch)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0041-y"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"e_1_3_2_1_53_1","volume-title":"NIPS","author":"Wainwright M.","year":"2012"},{"key":"e_1_3_2_1_54_1","volume-title":"OSDI","author":"Wolinsky D.","year":"2012"},{"key":"e_1_3_2_1_55_1","volume-title":"Crypto-nets: Neural networks over encrypted data. arXiv:1412.6181","author":"Xie P.","year":"2014"},{"key":"e_1_3_2_1_56_1","volume-title":"The human splicing code reveals new insights into the genetic determinants of disease. Science, 347(6218)","author":"Xiong H. Y.","year":"2015"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350253"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015332"},{"key":"e_1_3_2_1_59_1","volume-title":"NIPS","author":"Zinkevich M.","year":"2010"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":59,"alternative-id":["10.1145\/2810103.2813687","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813687","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}