{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:26:17Z","timestamp":1776205577901,"version":"3.50.1"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2020,11,17]]},"abstract":"<jats:p>Engineering and algorithmic framework to ensure data privacy and user confidentiality.<\/jats:p>","DOI":"10.1145\/3387107","type":"journal-article","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:58:12Z","timestamp":1605743892000},"page":"33-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":147,"title":["Federated learning for privacy-preserving AI"],"prefix":"10.1145","volume":"63","author":[{"given":"Yong","family":"Cheng","sequence":"first","affiliation":[{"name":"WeBank, China"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"WeBank, China"}]},{"given":"Tianjian","family":"Chen","sequence":"additional","affiliation":[{"name":"WeBank, China"}]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[{"name":"WeBank, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,17]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Privacy-preserving machine learning: Threats and solutions","author":"Al-Rubaie M.","year":"2019","unstructured":"Al-Rubaie , M. , and Chang , J.M . Privacy-preserving machine learning: Threats and solutions . IEEE Security and Privacy (Apr . 2019 ). Al-Rubaie, M., and Chang, J.M. Privacy-preserving machine learning: Threats and solutions. IEEE Security and Privacy (Apr. 2019)."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of ACM SIGSAC CCS'17 (Nov.","author":"Bonawitz K.","year":"2017","unstructured":"Bonawitz , K. et al. Practical secure aggregation for privacy-preserving machine learning . In Proceedings of ACM SIGSAC CCS'17 (Nov. 2017 ). Bonawitz, K. et al. Practical secure aggregation for privacy-preserving machine learning. In Proceedings of ACM SIGSAC CCS'17 (Nov. 2017)."},{"key":"e_1_2_1_3_1","series-title":"Jan. 2020","volume-title":"Data protection laws of the world: Full handbook","author":"Piper","unstructured":"DLA Piper . Data protection laws of the world: Full handbook ( Jan. 2020 ); https:\/\/bit.ly\/354nDiC DLA Piper. Data protection laws of the world: Full handbook (Jan. 2020); https:\/\/bit.ly\/354nDiC"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of TAMC'08 (Apr.","author":"Dwork C.","year":"2008","unstructured":"Dwork , C. Differential privacy : A survey of results . In Proceedings of TAMC'08 (Apr. 2008 ). Dwork, C. Differential privacy: A survey of results. In Proceedings of TAMC'08 (Apr. 2008)."},{"key":"e_1_2_1_5_1","series-title":"Dec. 2019","volume-title":"et al. Advances and open problems in federated learning.","author":"Kairouz P.","year":"1912","unstructured":"Kairouz , P. et al. Advances and open problems in federated learning. ( Dec. 2019 ); arXiv preprint arXiv: 1912 .04977 Kairouz, P. et al. Advances and open problems in federated learning. (Dec. 2019); arXiv preprint arXiv:1912.04977"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of IJCAI'19 (Aug.","author":"Liu Y.","year":"2019","unstructured":"Liu , Y. , Chen , T. , and Yang , Q . Secure federated transfer learning . In Proceedings of IJCAI'19 (Aug. 2019 ). Liu, Y., Chen, T., and Yang, Q. Secure federated transfer learning. In Proceedings of IJCAI'19 (Aug. 2019)."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of AISTATS'17 (Apr.","author":"McMahan H.B.","year":"2017","unstructured":"McMahan , H.B. , Moore , E. , Ramage , D. , and y Arcas , B.A. Communication-efficient learning of deep networks from decentralized data . In Proceedings of AISTATS'17 (Apr. 2017 ). McMahan, H.B., Moore, E., Ramage, D., and y Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. In Proceedings of AISTATS'17 (Apr. 2017)."},{"key":"e_1_2_1_8_1","series-title":"Aug. 2019","volume-title":"Rewarding high-quality data via influence functions.","author":"Richardson A.","year":"1908","unstructured":"Richardson , A. , Filos-Ratsikas , A. , and Faltings , B . Rewarding high-quality data via influence functions. ( Aug. 2019 ); arXiv preprint arXiv: 1908 .11598 Richardson, A., Filos-Ratsikas, A., and Faltings, B. Rewarding high-quality data via influence functions. (Aug. 2019); arXiv preprint arXiv:1908.11598"},{"key":"e_1_2_1_9_1","volume":"201","author":"Yang Q.","unstructured":"Yang , Q. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) (Feb. 201 9). Yang, Q. et al. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) (Feb. 2019).","journal-title":"Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) (Feb."},{"key":"e_1_2_1_10_1","volume-title":"Federated Learning. Morgan & Claypool","author":"Yang Q.","year":"2019","unstructured":"Yang , Q. et al . Federated Learning. Morgan & Claypool , Dec. 2019 . Yang, Q. et al. Federated Learning. Morgan & Claypool, Dec. 2019."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:26Z","timestamp":1750199606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,17]]},"references-count":10,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,11,17]]}},"alternative-id":["10.1145\/3387107"],"URL":"https:\/\/doi.org\/10.1145\/3387107","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,17]]},"assertion":[{"value":"2020-11-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}