{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:38:52Z","timestamp":1770835132042,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,28]]},"DOI":"10.1145\/3445970.3451156","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:53:22Z","timestamp":1618041202000},"page":"25-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting"],"prefix":"10.1145","author":[{"given":"Ismat","family":"Jarin","sequence":"first","affiliation":[{"name":"University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"given":"Birhanu","family":"Eshete","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn, Dearborn, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.qref.2007.04.001"},{"key":"e_1_3_2_1_3_1","volume-title":"Ronald Cramer, and Peter M. A. Sloot.","author":"Attema Thomas","year":"2018"},{"key":"e_1_3_2_1_4_1","unstructured":"Fattaneh Bayatbabolghani and Marina Blanton. 2020. Secure Multi-Party Computation. In PAI@AAAI'2020 .  Fattaneh Bayatbabolghani and Marina Blanton. 2020. Secure Multi-Party Computation. In PAI@AAAI'2020 ."},{"key":"e_1_3_2_1_5_1","volume-title":"Efficient Multiparty Protocols using Circuit Randomisation","author":"Beaver D.","year":"2012"},{"key":"e_1_3_2_1_6_1","volume-title":"Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Annual ACM Symposium on Theory of Computing. ACM, 1--10","author":"Ben-Or Michael","year":"1988"},{"key":"e_1_3_2_1_7_1","volume-title":"Stephen Tu, and Shafi Goldwasser.","author":"Bost Raphael","year":"2015"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021036"},{"key":"e_1_3_2_1_9_1","volume-title":"An Overview of Privacy in Machine Learning. CoRR","author":"Cristofaro Emiliano De","year":"2020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2134090"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_12_1","volume-title":"TCC","volume":"3876","author":"Dwork Cynthia","year":"2006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41389-019-0157-8"},{"key":"e_1_3_2_1_15_1","volume-title":"Privacy-Preserving Collaborative Prediction using Random Forests. CoRR","author":"Giacomelli Irene","year":"2018"},{"key":"e_1_3_2_1_16_1","volume-title":"ICML 2016 (JMLR Workshop and Conference Proceedings)","volume":"48","author":"Gilad-Bachrach Ran","year":"2016"},{"key":"e_1_3_2_1_17_1","volume-title":"ICISC","author":"Graepel Thore","year":"2012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1957-10071-8"},{"key":"e_1_3_2_1_19_1","first-page":"6346","article-title":"Distributed Learning without Distress","volume":"2018","author":"Jayaraman Bargav","year":"2018","journal-title":"Privacy-Preserving Empirical Risk Minimization. In NeurIPS"},{"key":"e_1_3_2_1_20_1","volume-title":"Secure Computation of Surveys. In EU Workshop on Secure Multiparty Protocols","author":"Joan Feigenbaum Raphael Ryger","year":"2004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"key":"e_1_3_2_1_22_1","unstructured":"Kaggle. 2020. Invasive Ductal Carcinoma Dataset. https:\/\/www.kaggle.com\/paultimothymooney\/ breast-histopathology-images .  Kaggle. 2020. Invasive Ductal Carcinoma Dataset. https:\/\/www.kaggle.com\/paultimothymooney\/ breast-histopathology-images ."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_24_1","volume-title":"Burges","author":"LeCun Yan","year":"2020"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_26_1","volume-title":"ACM SIGSAC CCS","author":"Liu Jian","year":"2017"},{"key":"e_1_3_2_1_27_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE SP","author":"Mohassel Payman","year":"2017"},{"key":"e_1_3_2_1_28_1","volume-title":"An Improved E-voting scheme using Secret Sharing based Secure Multi-party Computation. CoRR","author":"Nair Divya G.","year":"2015"},{"key":"e_1_3_2_1_29_1","unstructured":"OpenMined. 2020. PySyft. https:\/\/github.com\/OpenMined\/PySyft\/blob\/master\/syft\/frameworks\/torch\/mpc\/securenn.py .  OpenMined. 2020. PySyft. https:\/\/github.com\/OpenMined\/PySyft\/blob\/master\/syft\/frameworks\/torch\/mpc\/securenn.py ."},{"key":"e_1_3_2_1_30_1","volume-title":"ICLR 2017 .","author":"Papernot Nicolas","year":"2017"},{"key":"e_1_3_2_1_31_1","volume-title":"Wellman","author":"Papernot Nicolas","year":"2018"},{"key":"e_1_3_2_1_32_1","volume-title":"Scalable Private Learning with PATE. In ICLR 2018 .","author":"Papernot Nicolas","year":"2018"},{"key":"e_1_3_2_1_33_1","first-page":"61","article-title":"Membership Inference Attack against Differentially Private Deep Learning","volume":"11","author":"Atiqur Rahman Md.","year":"2018","journal-title":"Model. Trans. Data Priv."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_35_1","volume-title":"Deep Reinforcement Learning framework for Autonomous Driving. CoRR","author":"Sallab Ahmad El","year":"2017"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_37_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE SP","author":"Shokri Reza","year":"2017"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Security","author":"Tram\u00e8r Florian","year":"2016"},{"key":"e_1_3_2_1_39_1","first-page":"442","article-title":"SecureNN: Efficient and Private Neural Network Training","volume":"2018","author":"Wagh Sameer","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_1_41_1","unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms .  Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms ."},{"key":"e_1_3_2_1_42_1","volume-title":"Annual Symposium on Foundations of Computer Science. 162--167","author":"Chi-Chih Yao Andrew","year":"1986"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445970.3451156","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445970.3451156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:25Z","timestamp":1750197805000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445970.3451156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":42,"alternative-id":["10.1145\/3445970.3451156","10.1145\/3445970"],"URL":"https:\/\/doi.org\/10.1145\/3445970.3451156","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}