{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:48:58Z","timestamp":1775746138077,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338501.3357371","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"13-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":259,"title":["HybridAlpha"],"prefix":"10.1145","author":[{"given":"Runhua","family":"Xu","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Nathalie","family":"Baracaldo","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]},{"given":"Yi","family":"Zhou","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]},{"given":"Ali","family":"Anwar","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]},{"given":"Heiko","family":"Ludwig","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center, San Jose, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_20"},{"key":"e_1_3_2_1_3_1","volume-title":"Health insurance portability and accountability act of","author":"Act Accountability","year":"1996","unstructured":"Accountability Act . 1996. Health insurance portability and accountability act of 1996 . Public law, Vol. 104 (1996), 191. Accountability Act. 1996. Health insurance portability and accountability act of 1996. Public law, Vol. 104 (1996), 191."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_7_1","volume-title":"Annual international cryptology conference","author":"Boneh Dan","unstructured":"Dan Boneh and Matt Franklin . 2001. Identity-based encryption from the Weil pairing . In Annual international cryptology conference . Springer , 213--229. Dan Boneh and Matt Franklin. 2001. Identity-based encryption from the Weil pairing. In Annual international cryptology conference. Springer, 213--229."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"e_1_3_2_1_9_1","volume-title":"SecureBoost: A Lossless Federated Learning Framework. arXiv preprint arXiv:1901.08755","author":"Cheng Kewei","year":"2019","unstructured":"Kewei Cheng , Tao Fan , Yilun Jin , Yang Liu , Tianjian Chen , and Qiang Yang . 2019. SecureBoost: A Lossless Federated Learning Framework. arXiv preprint arXiv:1901.08755 ( 2019 ). Kewei Cheng, Tao Fan, Yilun Jin, Yang Liu, Tianjian Chen, and Qiang Yang. 2019. SecureBoost: A Lossless Federated Learning Framework. arXiv preprint arXiv:1901.08755 (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Ivan Bjerre Damg\u00e5rd, and Jesper Buus Nielsen","author":"Cramer Ronald","year":"2015","unstructured":"Ronald Cramer , Ivan Bjerre Damg\u00e5rd, and Jesper Buus Nielsen . 2015 . Secure multiparty computation.Cambridge University Press . Ronald Cramer, Ivan Bjerre Damg\u00e5rd, and Jesper Buus Nielsen. 2015. Secure multiparty computation.Cambridge University Press."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_14_1","volume-title":"Privacy-preserving entity resolution and logistic regression on encrypted data. Private and Secure Machine Learning (PSML)","author":"Djatmiko Mentari","year":"2017","unstructured":"Mentari Djatmiko , Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Maximilian Ott , Giorgio Patrini , Guillaume Smith , Brian Thorne , and Dongyao Wu. 2017. Privacy-preserving entity resolution and logistic regression on encrypted data. Private and Secure Machine Learning (PSML) ( 2017 ). Mentari Djatmiko, Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Maximilian Ott, Giorgio Patrini, Guillaume Smith, Brian Thorne, and Dongyao Wu. 2017. Privacy-preserving entity resolution and logistic regression on encrypted data. Private and Secure Machine Learning (PSML) (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_1_16_1","volume-title":"et almbox","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , et almbox . 2014 . The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science , Vol. 9 , 3--4 (2014), 211--407. Cynthia Dwork, Aaron Roth, et almbox. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9220-6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_32"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_22_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Richard Nock , Giorgio Patrini , Guillaume Smith , and Brian Thorne . 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 ( 2017 ). Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 (2017)."},{"key":"e_1_3_2_1_23_1","volume-title":"Science","volume":"349","author":"Jordan Michael I","year":"2015","unstructured":"Michael I Jordan and Tom M Mitchell . 2015 . Machine learning: Trends, perspectives, and prospects . Science , Vol. 349 , 6245 (2015), 255--260. Michael I Jordan and Tom M Mitchell. 2015. Machine learning: Trends, perspectives, and prospects. Science, Vol. 349, 6245 (2015), 255--260."},{"key":"e_1_3_2_1_24_1","unstructured":"Peter Kairouz Sewoong Oh and Pramod Viswanath. 2014. Extremal mechanisms for local differential privacy. In Advances in neural information processing systems. 2879--2887.  Peter Kairouz Sewoong Oh and Pramod Viswanath. 2014. Extremal mechanisms for local differential privacy. In Advances in neural information processing systems. 2879--2887."},{"key":"e_1_3_2_1_25_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Jakub Konevc","year":"2016","unstructured":"Jakub Konevc n\u1ef3, H Brendan McMahan , Felix X Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh, and Dave Bacon . 2016 . Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016). Jakub Konevc n\u1ef3, H Brendan McMahan, Felix X Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"Deep learning. nature","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep learning. nature , Vol. 521 , 7553 ( 2015 ), 436. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature, Vol. 521, 7553 (2015), 436."},{"key":"e_1_3_2_1_27_1","unstructured":"Yann LeCun Corinna Cortes and Burges Christopher J.C. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/  Yann LeCun Corinna Cortes and Burges Christopher J.C. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_1_28_1","volume-title":"et almbox","author":"McMahan H Brendan","year":"2016","unstructured":"H Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , et almbox . 2016 . Communication-efficient learning of deep networks from decentralized data. arXiv preprint arXiv:1602.05629 (2016). H Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, et almbox. 2016. Communication-efficient learning of deep networks from decentralized data. arXiv preprint arXiv:1602.05629 (2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 2018 Sixth International Conference on Learning Representations. arXiv preprint arXiv:1802","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot , Shuang Song , Ilya Mironov , Ananth Raghunathan , Kunal Talwar , and \u00dalfar Erlingsson . 2018 . Scalable private learning with PATE , In Proceedings of the 2018 Sixth International Conference on Learning Representations. arXiv preprint arXiv:1802 .08908. Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and \u00dalfar Erlingsson. 2018. Scalable private learning with PATE, In Proceedings of the 2018 Sixth International Conference on Learning Representations. arXiv preprint arXiv:1802.08908."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818027"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of Privacy Preserving Machine Learning Workshop with NeurIPS","author":"Ryffel Theo","year":"2018","unstructured":"Theo Ryffel , Andrew Trask , Morten Dahl , Bobby Wagner , Jason Mancuso , Daniel Rueckert , and Jonathan Passerat-Palmbach . 2018 . A generic framework for privacy preserving deep learning . In Proceedings of Privacy Preserving Machine Learning Workshop with NeurIPS 2018. Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. In Proceedings of Privacy Preserving Machine Learning Workshop with NeurIPS 2018."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1090\/pspum\/020\/0316385"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, ACM, 1310--1321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov . 2015 . Privacy-preserving deep learning . In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, ACM, 1310--1321 . Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, ACM, 1310--1321."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_38_1","volume-title":"A Hybrid Approach to Privacy-Preserving Federated Learning. arXiv preprint arXiv:1812.03224","author":"Truex Stacey","year":"2018","unstructured":"Stacey Truex , Nathalie Baracaldo , Ali Anwar , Thomas Steinke , Heiko Ludwig , and Rui Zhang . 2018. A Hybrid Approach to Privacy-Preserving Federated Learning. arXiv preprint arXiv:1812.03224 ( 2018 ). Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, and Rui Zhang. 2018. A Hybrid Approach to Privacy-Preserving Federated Learning. arXiv preprint arXiv:1812.03224 (2018)."},{"key":"e_1_3_2_1_39_1","volume-title":"The EU General Data Protection Regulation (GDPR): A Practical Guide","author":"Voigt Paul","unstructured":"Paul Voigt and Axel von dem Bussche . 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide 1 st ed.). Springer Publishing Company, Inc orporated. Paul Voigt and Axel von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide 1st ed.). Springer Publishing Company, Incorporated.","edition":"1"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357371","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338501.3357371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357371"}},"subtitle":["An Efficient Approach for Privacy-Preserving Federated Learning"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":39,"alternative-id":["10.1145\/3338501.3357371","10.1145\/3338501"],"URL":"https:\/\/doi.org\/10.1145\/3338501.3357371","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}