{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:53:10Z","timestamp":1772041990812,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61532001"],"award-info":[{"award-number":["61532001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330920","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"1299-1307","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["PrivPy"],"prefix":"10.1145","author":[{"given":"Yi","family":"Li","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Wei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Mart\u00edn Abadi Paul Barham Jianmin Chen Zhifeng Chen Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Geoffrey Irving and Michael Isard. 2016. TensorFlow: a system for large-scale machine learning. (2016).  Mart\u00edn Abadi Paul Barham Jianmin Chen Zhifeng Chen Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Geoffrey Irving and Michael Isard. 2016. TensorFlow: a system for large-scale machine learning. (2016)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243854"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800173"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637113.2637119"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_2_8_1","unstructured":"Boost. 2018. Boost C  Boost. 2018. Boost C"},{"key":"e_1_3_2_2_9_1","unstructured":"Libraries . http:\/\/www.boost.org\/.  Libraries . http:\/\/www.boost.org\/."},{"key":"e_1_3_2_2_10_1","volume-title":"Stephen Tu, and Shafi Goldwasser.","author":"Bost Raphael","year":"2015"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1885535.1885555"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"e_1_3_2_2_13_1","volume-title":"International Conference on Image Processing, Computer Vision, & Pattern Recognition, Ipcv 2009","author":"Chen Zong","year":"2000"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813678"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2015b. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS .  Daniel Demmler Thomas Schneider and Michael Zohner. 2015b. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS .","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 19th USENIX Conference on Security (USENIX Security'10)","author":"Canny Yitao","year":"2010"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"e_1_3_2_2_22_1","volume-title":"International Conference on Machine Learning . 448--456","author":"Ioffe Sergey","year":"2015"},{"key":"e_1_3_2_2_23_1","unstructured":"Eric Jones Travis Oliphant Pearu Peterson et almbox. 2011-- a. numpy.ndarray. https:\/\/docs.scipy.org\/doc\/numpy\/user\/basics.broadcasting.html .  Eric Jones Travis Oliphant Pearu Peterson et almbox. 2011-- a. numpy.ndarray. https:\/\/docs.scipy.org\/doc\/numpy\/user\/basics.broadcasting.html ."},{"key":"e_1_3_2_2_24_1","unstructured":"Eric Jones Travis Oliphant Pearu Peterson et almbox. 2011-- b. numpy.ndarray. https:\/\/docs.scipy.org\/doc\/numpy\/reference\/generated\/numpy.ndarray.html .  Eric Jones Travis Oliphant Pearu Peterson et almbox. 2011-- b. numpy.ndarray. https:\/\/docs.scipy.org\/doc\/numpy\/reference\/generated\/numpy.ndarray.html ."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0271-8"},{"key":"e_1_3_2_2_26_1","volume-title":"USENIX Security Symposium","volume":"12","author":"Kreuter Benjamin","year":"2012"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_11"},{"key":"e_1_3_2_2_28_1","volume-title":"mbox","author":"LeCun Yann","year":"2015"},{"key":"e_1_3_2_2_29_1","unstructured":"Yann Lecun and Corinna Cortes. 2010. The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist .  Yann Lecun and Corinna Cortes. 2010. The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist ."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71246-8_6"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_2_33_1","first-page":"1163","article-title":"Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data","volume":"2016","author":"Lu Wenjie","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813705"},{"key":"e_1_3_2_2_36_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy (SP). 19--38","author":"Mohassel P."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083143"},{"key":"e_1_3_2_2_38_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. (2017).  Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. (2017)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818027"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.46"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_2_44_1","first-page":"749","article-title":"Introduction to numerical analysis","volume":"24","author":"Stoer Josef","year":"1980","journal-title":"Math. Comp."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2011.37"},{"key":"e_1_3_2_2_46_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit . https:\/\/github.com\/emp-toolkit .  Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit . https:\/\/github.com\/emp-toolkit ."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/43.908452"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72588-6_125"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1137\/1037125"},{"key":"e_1_3_2_2_51_1","first-page":"1153","article-title":"Obliv-C: A Language for Extensible Data-Oblivious Computation","volume":"2015","author":"Zahur Samee","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516752"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:03Z","timestamp":1750206363000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330920"}},"subtitle":["General and Scalable Privacy-Preserving Data Mining"],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":51,"alternative-id":["10.1145\/3292500.3330920","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330920","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}