{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:37:08Z","timestamp":1768257428109,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3412771","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T05:31:06Z","timestamp":1603085466000},"page":"3085-3092","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["PrivacyFL"],"prefix":"10.1145","author":[{"given":"Vaikkunth","family":"Mugunthan","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Anton","family":"Peraire-Bueno","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Lalana","family":"Kagal","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The UCI KDD archive of large data sets for data mining research and experimentation. ACM SIGKDD explorations newsletter","author":"Bay Stephen D","year":"2000","unstructured":"Stephen D Bay , Dennis Kibler , Michael J Pazzani , and Padhraic Smyth . 2000. The UCI KDD archive of large data sets for data mining research and experimentation. ACM SIGKDD explorations newsletter , Vol. 2 , 2 ( 2000 ), 81--85. Stephen D Bay, Dennis Kibler, Michael J Pazzani, and Padhraic Smyth. 2000. The UCI KDD archive of large data sets for data mining research and experimentation. ACM SIGKDD explorations newsletter , Vol. 2, 2 (2000), 81--85."},{"key":"e_1_3_2_2_2_1","volume-title":"Protection against reconstruction and its applications in private federated learning. arXiv preprint arXiv:1812.00984","author":"Bhowmick Abhishek","year":"2018","unstructured":"Abhishek Bhowmick , John Duchi , Julien Freudiger , Gaurav Kapoor , and Ryan Rogers . 2018. Protection against reconstruction and its applications in private federated learning. arXiv preprint arXiv:1812.00984 ( 2018 ). Abhishek Bhowmick, John Duchi, Julien Freudiger, Gaurav Kapoor, and Ryan Rogers. 2018. Protection against reconstruction and its applications in private federated learning. arXiv preprint arXiv:1812.00984 (2018)."},{"key":"e_1_3_2_2_3_1","volume-title":"et almbox","author":"Bonawitz Keith","year":"2019","unstructured":"Keith Bonawitz , Hubert Eichner , Wolfgang Grieskamp , Dzmitry Huba , Alex Ingerman , Vladimir Ivanov , Chloe Kiddon , Jakub Konecny , Stefano Mazzocchi , H Brendan McMahan , et almbox . 2019 . Towards federated learning at scale: System de sign. arXiv preprint arXiv:1902.01046 (2019). Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Dzmitry Huba, Alex Ingerman, Vladimir Ivanov, Chloe Kiddon, Jakub Konecny, Stefano Mazzocchi, H Brendan McMahan, et almbox. 2019. Towards federated learning at scale: System design. arXiv preprint arXiv:1902.01046 (2019)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_2_5_1","volume-title":"Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16--20, 1987, Proceedings. 462","author":"Chaum David","year":"1987","unstructured":"David Chaum , Claude Cr\u00e9 peau, and Ivan Damg\u00e5rd . 1987 . Multiparty Unconditionally Secure Protocols (Abstract) . In Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16--20, 1987, Proceedings. 462 . https:\/\/doi.org\/10.1007\/3--540--48184--2_43 10.1007\/3--540--48184--2_43 David Chaum, Claude Cr\u00e9 peau, and Ivan Damg\u00e5rd. 1987. Multiparty Unconditionally Secure Protocols (Abstract). In Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16--20, 1987, Proceedings. 462. https:\/\/doi.org\/10.1007\/3--540--48184--2_43"},{"key":"e_1_3_2_2_6_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2425831"},{"key":"e_1_3_2_2_8_1","volume-title":"Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","author":"Geyer Robin C","year":"2017","unstructured":"Robin C Geyer , Tassilo Klein , and Moin Nabi . 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 ( 2017 ). Robin C Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)."},{"key":"e_1_3_2_2_9_1","volume-title":"Secure multi-party computation. Manuscript. Preliminary version","author":"Goldreich Oded","year":"1998","unstructured":"Oded Goldreich . 1998. Secure multi-party computation. Manuscript. Preliminary version , Vol. 78 ( 1998 ). Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary version , Vol. 78 (1998)."},{"key":"e_1_3_2_2_10_1","unstructured":"Bargav Jayaraman Lingxiao Wang David Evans and Quanquan Gu. 2018. Distributed learning without distress: Privacy-preserving empirical risk minimization. In Advances in Neural Information Processing Systems. 6343--6354.  Bargav Jayaraman Lingxiao Wang David Evans and Quanquan Gu. 2018. Distributed learning without distress: Privacy-preserving empirical risk minimization. In Advances in Neural Information Processing Systems. 6343--6354."},{"key":"e_1_3_2_2_11_1","volume-title":"The MNIST database of handwritten digits","author":"LeCun Yann","year":"1998","unstructured":"Yann LeCun , Corinna Cortes , and Christopher JC Burges . 1998. The MNIST database of handwritten digits , 1998 . URL http:\/\/yann. lecun. com\/exdb\/mnist , Vol. 10 (1998), 34. Yann LeCun, Corinna Cortes, and Christopher JC Burges. 1998. The MNIST database of handwritten digits, 1998. URL http:\/\/yann. lecun. com\/exdb\/mnist , Vol. 10 (1998), 34."},{"key":"e_1_3_2_2_12_1","volume-title":"Google Research Blog","volume":"3","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan and Daniel Ramage . 2017 . Federated learning: Collaborative machine learning without centralized training data . Google Research Blog , Vol. 3 (2017). Brendan McMahan and Daniel Ramage. 2017. Federated learning: Collaborative machine learning without centralized training data. Google Research Blog, Vol. 3 (2017)."},{"key":"e_1_3_2_2_13_1","volume-title":"Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963","author":"McMahan H Brendan","year":"2017","unstructured":"H Brendan McMahan , Daniel Ramage , Kunal Talwar , and Li Zhang . 2017. Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963 ( 2017 ). H Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2017. Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963 (2017)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_3_2_2_15_1","volume-title":"Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. arXiv preprint arXiv:1812.00910","author":"Nasr Milad","year":"2018","unstructured":"Milad Nasr , Reza Shokri , and Amir Houmansadr . 2018. Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. arXiv preprint arXiv:1812.00910 ( 2018 ). Milad Nasr, Reza Shokri, and Amir Houmansadr. 2018. Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. arXiv preprint arXiv:1812.00910 (2018)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_2_17_1","volume-title":"UCI repository of machine learning databases. Dept. Information and Computer Sciences","author":"Newman DJ","unstructured":"DJ Newman , S Hettich , CL Blake , and CJ Merz . 1998. UCI repository of machine learning databases. Dept. Information and Computer Sciences , Univ. California , Irvine . DJ Newman, S Hettich, CL Blake, and CJ Merz. 1998. UCI repository of machine learning databases. Dept. Information and Computer Sciences, Univ. California, Irvine."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_19_1","volume-title":"Differentially Private Learning with Adaptive Clipping. arXiv preprint arXiv:1905.03871","author":"Thakkar Om","year":"2019","unstructured":"Om Thakkar , Galen Andrew , and H Brendan McMahan . 2019. Differentially Private Learning with Adaptive Clipping. arXiv preprint arXiv:1905.03871 ( 2019 ). Om Thakkar, Galen Andrew, and H Brendan McMahan. 2019. Differentially Private Learning with Adaptive Clipping. arXiv preprint arXiv:1905.03871 (2019)."},{"key":"e_1_3_2_2_20_1","volume-title":"27th Annual Symposium on Foundations of Computer Science","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao . 1986 . How to Generate and Exchange Secrets (Extended Abstract) . In 27th Annual Symposium on Foundations of Computer Science , Toronto, Canada, 27- -29 October 1986. 162--167. https:\/\/doi.org\/10.1109\/SFCS.1986.25 10.1109\/SFCS.1986.25 Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets (Extended Abstract). In 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27--29 October 1986. 162--167. https:\/\/doi.org\/10.1109\/SFCS.1986.25"}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","location":"Virtual Event Ireland","acronym":"CIKM '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412771","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3412771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:56Z","timestamp":1750197776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3412771"}},"subtitle":["A Simulator for Privacy-Preserving and Secure Federated Learning"],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":20,"alternative-id":["10.1145\/3340531.3412771","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3412771","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}