{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:24:56Z","timestamp":1775420696209,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3457241","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:39Z","timestamp":1624036959000},"page":"563-576","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["VF\n            <sup>2<\/sup>\n            Boost: Very Fast Vertical Federated Gradient Boosting for Cross-Enterprise Learning"],"prefix":"10.1145","author":[{"given":"Fangcheng","family":"Fu","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yingxia","family":"Shao","sequence":"additional","affiliation":[{"name":"BUPT, Beijing, China"}]},{"given":"Lele","family":"Yu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Jiawei","family":"Jiang","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Huanran","family":"Xue","sequence":"additional","affiliation":[{"name":"Tencent Inc., Beijing, China"}]},{"given":"Yangyu","family":"Tao","sequence":"additional","affiliation":[{"name":"Tencent Inc., Beijing, China"}]},{"given":"Bin","family":"Cui","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","volume-title":"Yggdrasil: An optimized system for training deep decision trees at scale. In Advances in Neural Information Processing Systems. 3817--3825.","author":"Abuzaid Firas","year":"2016","unstructured":"Firas Abuzaid , Joseph K Bradley , Feynman T Liang , Andrew Feng , Lee Yang , Matei Zaharia , and Ameet S Talwalkar . 2016 . Yggdrasil: An optimized system for training deep decision trees at scale. In Advances in Neural Information Processing Systems. 3817--3825. Firas Abuzaid, Joseph K Bradley, Feynman T Liang, Andrew Feng, Lee Yang, Matei Zaharia, and Ameet S Talwalkar. 2016. Yggdrasil: An optimized system for training deep decision trees at scale. In Advances in Neural Information Processing Systems. 3817--3825."},{"key":"e_1_3_2_2_3_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Alistarh Dan","year":"2017","unstructured":"Dan Alistarh , Demjan Grubic , Jerry Li , Ryota Tomioka , and Milan Vojnovic . 2017 . QSGD: Communication-Efficient SGD via Gradient Quantization and Encoding . In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017 , December 4 --9 , 2017, Long Beach, CA, USA , , Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 1709--1720. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/6c340f25839e6acdc73414517203f5f0-Abstract.html Dan Alistarh, Demjan Grubic, Jerry Li, Ryota Tomioka, and Milan Vojnovic. 2017. QSGD: Communication-Efficient SGD via Gradient Quantization and Encoding. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA , , Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 1709--1720. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/6c340f25839e6acdc73414517203f5f0-Abstract.html"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"e_1_3_2_2_5_1","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Aono Yoshinori","year":"2017","unstructured":"Yoshinori Aono , Takuya Hayashi , Lihua Wang , Shiho Moriai , 2017 . Privacy-preserving deep learning via additively homomorphic encryption . IEEE Transactions on Information Forensics and Security , Vol. 13 , 5 (2017), 1333 -- 1345 . Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai, et almbox. 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security , Vol. 13, 5 (2017), 1333--1345.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_2_6_1","first-page":"1192","article-title":"A Guide to Fully Homomorphic Encryption","volume":"2015","author":"Armknecht Frederik","year":"2015","unstructured":"Frederik Armknecht , Colin Boyd , Christopher Carr , Kristian Gj\u00f8steen , Angela J\"aschke, Christian A Reuter , and Martin Strand . 2015 . A Guide to Fully Homomorphic Encryption . IACR Cryptol. ePrint Arch. , Vol. 2015 (2015), 1192 . Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gj\u00f8steen, Angela J\"aschke, Christian A Reuter, and Martin Strand. 2015. A Guide to Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. , Vol. 2015 (2015), 1192.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_7_1","volume-title":"Random forests. Machine learning","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman . 2001. Random forests. Machine learning , Vol. 45 , 1 ( 2001 ), 5--32. Leo Breiman. 2001. Random forests. Machine learning , Vol. 45, 1 (2001), 5--32."},{"key":"e_1_3_2_2_8_1","volume-title":"Classification and regression trees","author":"Breiman Leo","unstructured":"Leo Breiman . 2017. Classification and regression trees . Routledge . Leo Breiman. 2017. Classification and regression trees .Routledge."},{"key":"e_1_3_2_2_9_1","first-page":"23","article-title":"From ranknet to lambdarank to lambdamart: An overview","volume":"11","author":"Burges Christopher JC","year":"2010","unstructured":"Christopher JC Burges . 2010 . From ranknet to lambdarank to lambdamart: An overview . Learning , Vol. 11 , 23 -- 581 (2010), 81. Christopher JC Burges. 2010. From ranknet to lambdarank to lambdamart: An overview. Learning , Vol. 11, 23--581 (2010), 81.","journal-title":"Learning"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898442.2898444"},{"key":"e_1_3_2_2_11_1","unstructured":"Kamalika Chaudhuri and Claire Monteleoni. 2009. Privacy-preserving logistic regression. In Advances in neural information processing systems. 289--296.  Kamalika Chaudhuri and Claire Monteleoni. 2009. Privacy-preserving logistic regression. In Advances in neural information processing systems. 289--296."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_14_1","volume-title":"Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755","author":"Cheng Kewei","year":"2019","unstructured":"Kewei Cheng , Tao Fan , Yilun Jin , Yang Liu , Tianjian Chen , and Qiang Yang . 2019 . Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755 (2019). Kewei Cheng, Tao Fan, Yilun Jin, Yang Liu, Tianjian Chen, and Qiang Yang. 2019. Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755 (2019)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_2_16_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"},{"key":"e_1_3_2_2_18_1","volume-title":"CatBoost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363","author":"Dorogush Anna Veronika","year":"2018","unstructured":"Anna Veronika Dorogush , Vasily Ershov , and Andrey Gulin . 2018. CatBoost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363 ( 2018 ). Anna Veronika Dorogush, Vasily Ershov, and Andrey Gulin. 2018. CatBoost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363 (2018)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_3_2_2_21_1","first-page":"144","article-title":"Somewhat Practical Fully Homomorphic Encryption","volume":"2012","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012 . Somewhat Practical Fully Homomorphic Encryption . IACR Cryptol. ePrint Arch. , Vol. 2012 (2012), 144 . Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. , Vol. 2012 (2012), 144.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2907333.2907524"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_2_2_24_1","volume-title":"et almbox","author":"Friedman Jerome","year":"2000","unstructured":"Jerome Friedman , Trevor Hastie , Robert Tibshirani , et almbox . 2000 . Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). The annals of statistics , Vol. 28 , 2 (2000), 337--407. Jerome Friedman, Trevor Hastie, Robert Tibshirani, et almbox. 2000. Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). The annals of statistics , Vol. 28, 2 (2000), 337--407."},{"key":"e_1_3_2_2_25_1","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman Jerome H","year":"2001","unstructured":"Jerome H Friedman . 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics ( 2001 ), 1189--1232. Jerome H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics (2001), 1189--1232."},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18","volume":"3314","author":"Fu Fangcheng","year":"2020","unstructured":"Fangcheng Fu , Yuzheng Hu , Yihan He , Jiawei Jiang , Yingxia Shao , Ce Zhang , and Bin Cui . 2020 . Don't Waste Your Bits! Squeeze Activations and Gradients for Deep Neural Networks via TinyScript . In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event (Proceedings of Machine Learning Research , Vol. 119). PMLR , 3304-- 3314 . http:\/\/proceedings.mlr.press\/v119\/fu20c.html Fangcheng Fu, Yuzheng Hu, Yihan He, Jiawei Jiang, Yingxia Shao, Ce Zhang, and Bin Cui. 2020. Don't Waste Your Bits! Squeeze Activations and Gradients for Deep Neural Networks via TinyScript. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event (Proceedings of Machine Learning Research, Vol. 119). PMLR , 3304--3314. http:\/\/proceedings.mlr.press\/v119\/fu20c.html"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342273"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236212"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_30_1","volume-title":"International Conference on Machine Learning . 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy . In International Conference on Machine Learning . 201--210 . Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning . 201--210."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-020-00124-2"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/376284.375670"},{"key":"e_1_3_2_2_33_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Richard Nock , Giorgio Patrini , Guillaume Smith , and Brian Thorne . 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 ( 2017 ). Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 (2017)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648584.2648589"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330765"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196892"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.87"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9929-x"},{"key":"e_1_3_2_2_40_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. White paper ( 2016 ). David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_3_2_2_41_1","volume-title":"Optimal quantile approximation in streams. In 2016 ieee 57th annual symposium on foundations of computer science (focs)","author":"Karnin Zohar","unstructured":"Zohar Karnin , Kevin Lang , and Edo Liberty . 2016. Optimal quantile approximation in streams. In 2016 ieee 57th annual symposium on foundations of computer science (focs) . IEEE , 71--78. Zohar Karnin, Kevin Lang, and Edo Liberty. 2016. Optimal quantile approximation in streams. In 2016 ieee 57th annual symposium on foundations of computer science (focs). IEEE, 71--78."},{"key":"e_1_3_2_2_42_1","volume-title":"Lightgbm: A highly efficient gradient boosting decision tree. In Advances in neural information processing systems. 3146--3154.","author":"Ke Guolin","year":"2017","unstructured":"Guolin Ke , Qi Meng , Thomas Finley , Taifeng Wang , Wei Chen , Weidong Ma , Qiwei Ye , and Tie-Yan Liu . 2017 . Lightgbm: A highly efficient gradient boosting decision tree. In Advances in neural information processing systems. 3146--3154. Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. Lightgbm: A highly efficient gradient boosting decision tree. In Advances in neural information processing systems. 3146--3154."},{"key":"e_1_3_2_2_43_1","volume-title":"Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527","author":"Jakub Konevc","year":"2016","unstructured":"Jakub Konevc n\u1ef3 , H Brendan McMahan , Daniel Ramage , and Peter Richt\u00e1rik . 2016a. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527 ( 2016 ). Jakub Konevc n\u1ef3 , H Brendan McMahan, Daniel Ramage, and Peter Richt\u00e1rik. 2016a. Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527 (2016)."},{"key":"e_1_3_2_2_44_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Jakub Konevc","year":"2016","unstructured":"Jakub Konevc n\u1ef3 , H Brendan McMahan , Felix X Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh, and Dave Bacon . 2016 b. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016). Jakub Konevc n\u1ef3 , H Brendan McMahan, Felix X Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016b. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/319566.319567"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Qinbin Li Zeyi Wen and Bingsheng He. 2020 b. Practical Federated Gradient Boosting Decision Trees.. In AAAI. 4642--4649.  Qinbin Li Zeyi Wen and Bingsheng He. 2020 b. Practical Federated Gradient Boosting Decision Trees.. In AAAI. 4642--4649.","DOI":"10.1609\/aaai.v34i04.5895"},{"key":"e_1_3_2_2_47_1","volume-title":"Privacy-Preserving Gradient Boosting Decision Trees. In Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Li Qinbin","year":"2020","unstructured":"Qinbin Li , Zhaomin Wu , Zeyi Wen , and Bingsheng He . 2020 c . Privacy-Preserving Gradient Boosting Decision Trees. In Proceedings of the AAAI Conference on Artificial Intelligence , Vol. 34 . 784--791. Qinbin Li, Zhaomin Wu, Zeyi Wen, and Bingsheng He. 2020 c. Privacy-Preserving Gradient Boosting Decision Trees. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 784--791."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_3_2_2_49_1","volume-title":"Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith.","author":"Li Tian","year":"2018","unstructured":"Tian Li , Anit Kumar Sahu , Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith. 2018 . Federated optimization in heterogeneous networks. arXiv preprint arXiv:1812.06127 (2018). Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith. 2018. Federated optimization in heterogeneous networks. arXiv preprint arXiv:1812.06127 (2018)."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25952-7_6"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2020.2992755"},{"key":"e_1_3_2_2_52_1","volume-title":"Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing. arXiv preprint arXiv:1907.10218","author":"Liu Yang","year":"2019","unstructured":"Yang Liu , Zhuo Ma , Ximeng Liu , Siqi Ma , Surya Nepal , and Robert Deng . 2019. Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing. arXiv preprint arXiv:1907.10218 ( 2019 ). Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, and Robert Deng. 2019. Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing. arXiv preprint arXiv:1907.10218 (2019)."},{"key":"e_1_3_2_2_53_1","volume-title":"Innovative instructions and software model for isolated execution. Hasp@ isca","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R Savagaonkar . 2013. Innovative instructions and software model for isolated execution. Hasp@ isca , Vol. 10 , 1 ( 2013 ). Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R Savagaonkar. 2013. Innovative instructions and software model for isolated execution. Hasp@ isca , Vol. 10, 1 (2013)."},{"key":"e_1_3_2_2_54_1","volume-title":"Learning Differentially Private Recurrent Language Models. In International Conference on Learning Representations . https:\/\/openreview.net\/forum?id=BJ0hF1Z0b","author":"McMahan H. Brendan","year":"2018","unstructured":"H. Brendan McMahan , Daniel Ramage , Kunal Talwar , and Li Zhang . 2018 . Learning Differentially Private Recurrent Language Models. In International Conference on Learning Representations . https:\/\/openreview.net\/forum?id=BJ0hF1Z0b H. Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2018. Learning Differentially Private Recurrent Language Models. In International Conference on Learning Representations . https:\/\/openreview.net\/forum?id=BJ0hF1Z0b"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946679"},{"key":"#cr-split#-e_1_3_2_2_56_1.1","doi-asserted-by":"crossref","unstructured":"X. Miao L. Ma Z. Yang Y. Shao B. Cui L. Yu and J. Jiang. 2020. CuWide: Towards Efficient Flow-based Training for Sparse Wide Models on GPUs. IEEE Transactions on Knowledge and Data Engineering (2020). https:\/\/doi.org\/10.1109\/TKDE.2020.3038109 10.1109\/TKDE.2020.3038109","DOI":"10.1109\/TKDE.2020.3038109"},{"key":"#cr-split#-e_1_3_2_2_56_1.2","doi-asserted-by":"crossref","unstructured":"X. Miao L. Ma Z. Yang Y. Shao B. Cui L. Yu and J. Jiang. 2020. CuWide: Towards Efficient Flow-based Training for Sparse Wide Models on GPUs. IEEE Transactions on Knowledge and Data Engineering (2020). https:\/\/doi.org\/10.1109\/TKDE.2020.3038109","DOI":"10.1109\/ICDE51399.2021.00251"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_2_59_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium, USENIX Security 16","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , C\u00e9 dric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA, August 10--12 , 2016 . USENIX Association, 619--636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/ohrimenko Olga Ohrimenko, Felix Schuster, C\u00e9 dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016 . USENIX Association, 619--636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/ohrimenko"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687569"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_2_63_1","volume-title":"Induction of decision trees. Machine learning","author":"Quinlan J. Ross","year":"1986","unstructured":"J. Ross Quinlan . 1986. Induction of decision trees. Machine learning , Vol. 1 , 1 ( 1986 ), 81--106. J. Ross Quinlan. 1986. Induction of decision trees. Machine learning , Vol. 1, 1 (1986), 81--106."},{"key":"e_1_3_2_2_64_1","first-page":"2007","article-title":"Generalized Boosted Models: A guide to the gbm package","volume":"1","author":"Ridgeway Greg","year":"2007","unstructured":"Greg Ridgeway . 2007 . Generalized Boosted Models: A guide to the gbm package . Update , Vol. 1 , 1 (2007), 2007 . Greg Ridgeway. 2007. Generalized Boosted Models: A guide to the gbm package. Update , Vol. 1, 1 (2007), 2007.","journal-title":"Update"},{"key":"e_1_3_2_2_65_1","volume-title":"et almbox. 1978 a. On data banks and privacy homomorphisms. Foundations of secure computation","author":"Rivest Ronald L","year":"1978","unstructured":"Ronald L Rivest , Len Adleman , Michael L Dertouzos , et almbox. 1978 a. On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4 , 11 ( 1978 ), 169--180. Ronald L Rivest, Len Adleman, Michael L Dertouzos, et almbox. 1978 a. On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4, 11 (1978), 169--180."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-019-00100-5"},{"key":"e_1_3_2_2_68_1","volume-title":"Ijcai","volume":"99","author":"Schapire Robert E","year":"1999","unstructured":"Robert E Schapire . 1999 . A brief introduction to boosting . In Ijcai , Vol. 99 . Citeseer, 1401--1406. Robert E Schapire. 1999. A brief introduction to boosting. In Ijcai, Vol. 99. Citeseer, 1401--1406."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.. In NDSS .  Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.. In NDSS .","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2004.1380102"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342005051521"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963461"},{"key":"e_1_3_2_2_74_1","volume-title":"Privacy-preserving decision trees over vertically partitioned data. ACM Transactions on Knowledge Discovery from Data (TKDD)","author":"Vaidya Jaideep","year":"2008","unstructured":"Jaideep Vaidya , Chris Clifton , Murat Kantarcioglu , and A Scott Patterson . 2008. Privacy-preserving decision trees over vertically partitioned data. ACM Transactions on Knowledge Discovery from Data (TKDD) , Vol. 2 , 3 ( 2008 ), 1--27. Jaideep Vaidya, Chris Clifton, Murat Kantarcioglu, and A Scott Patterson. 2008. Privacy-preserving decision trees over vertically partitioned data. ACM Transactions on Knowledge Discovery from Data (TKDD) , Vol. 2, 3 (2008), 1--27."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523633"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/3152676"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281275"},{"key":"e_1_3_2_2_78_1","volume-title":"Tony QS Quek, and H Vincent Poor","author":"Wei Kang","year":"2020","unstructured":"Kang Wei , Jun Li , Ming Ding , Chuan Ma , Howard H Yang , Farhad Farokhi , Shi Jin , Tony QS Quek, and H Vincent Poor . 2020 . Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security ( 2020). Kang Wei, Jun Li, Ming Ding, Chuan Ma, Howard H Yang, Farhad Farokhi, Shi Jin, Tony QS Quek, and H Vincent Poor. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security (2020)."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407811"},{"key":"e_1_3_2_2_80_1","volume-title":"Explore User Neighborhood for Real-time E-commerce Recommendation. arXiv preprint arXiv:2103.00442","author":"Xie Xu","year":"2021","unstructured":"Xu Xie , Fei Sun , Xiaoyong Yang , Zhao Yang , Jinyang Gao , Wenwu Ou , and Bin Cui . 2021. Explore User Neighborhood for Real-time E-commerce Recommendation. arXiv preprint arXiv:2103.00442 ( 2021 ). Xu Xie, Fei Sun, Xiaoyong Yang, Zhao Yang, Jinyang Gao, Wenwu Ou, and Bin Cui. 2021. Explore User Neighborhood for Real-time E-commerce Recommendation. arXiv preprint arXiv:2103.00442 (2021)."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_2_2_83_1","volume-title":"2019 b. Parallel distributed logistic regression for vertical federated learning without third-party coordinator. arXiv preprint arXiv:1911.09824","author":"Yang Shengwen","year":"2019","unstructured":"Shengwen Yang , Bing Ren , Xuhui Zhou , and Liping Liu . 2019 b. Parallel distributed logistic regression for vertical federated learning without third-party coordinator. arXiv preprint arXiv:1911.09824 ( 2019 ). Shengwen Yang, Bing Ren, Xuhui Zhou, and Liping Liu. 2019 b. Parallel distributed logistic regression for vertical federated learning without third-party coordinator. arXiv preprint arXiv:1911.09824 (2019)."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_2_85_1","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012","author":"Zaharia Matei","year":"2012","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Tathagata Das , Ankur Dave , Justin Ma , Murphy McCauly , Michael J. Franklin , Scott Shenker , and Ion Stoica . 2012 . Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing . In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012 , San Jose, CA, USA, April 25--27 , 2012. USENIX Association, 15--28. https:\/\/www.usenix.org\/conference\/nsdi12\/technical-sessions\/presentation\/zaharia Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauly, Michael J. Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2012, San Jose, CA, USA, April 25--27, 2012. USENIX Association, 15--28. https:\/\/www.usenix.org\/conference\/nsdi12\/technical-sessions\/presentation\/zaharia"},{"key":"e_1_3_2_2_86_1","first-page":"10","article-title":"Spark: Cluster computing with working sets","volume":"10","author":"Zaharia Matei","year":"2010","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Michael J Franklin , Scott Shenker , Ion Stoica , 2010 . Spark: Cluster computing with working sets . HotCloud , Vol. 10 , 10 -- 10 (2010), 95. Matei Zaharia, Mosharaf Chowdhury, Michael J Franklin, Scott Shenker, Ion Stoica, et almbox. 2010. Spark: Cluster computing with working sets. HotCloud , Vol. 10, 10--10 (2010), 95.","journal-title":"HotCloud"},{"key":"e_1_3_2_2_87_1","volume-title":"BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In 2020 USENIX Annual Technical Conference, USENIX ATC 2020","author":"Zhang Chengliang","year":"2020","unstructured":"Chengliang Zhang , Suyi Li , Junzhe Xia , Wei Wang , Feng Yan , and Yang Liu . 2020 b . BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In 2020 USENIX Annual Technical Conference, USENIX ATC 2020 , July 15 --17 , 2020 . USENIX Association, 493--506. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/zhang-chengliang Chengliang Zhang, Suyi Li, Junzhe Xia, Wei Wang, Feng Yan, and Yang Liu. 2020 b. BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In 2020 USENIX Annual Technical Conference, USENIX ATC 2020, July 15--17, 2020 . USENIX Association, 493--506. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/zhang-chengliang"},{"key":"e_1_3_2_2_88_1","first-page":"1","article-title":"a. Snapshot boosting: a fast ensemble framework for deep neural networks","volume":"63","author":"Zhang Wentao","year":"2020","unstructured":"Wentao Zhang , Jiawei Jiang , Yingxia Shao , and Bin Cui . 2020 a. Snapshot boosting: a fast ensemble framework for deep neural networks . Science China Information Sciences , Vol. 63 , 1 (2020), 1 -- 12 . Wentao Zhang, Jiawei Jiang, Yingxia Shao, and Bin Cui. 2020 a. Snapshot boosting: a fast ensemble framework for deep neural networks. Science China Information Sciences , Vol. 63, 1 (2020), 1--12.","journal-title":"Science China Information Sciences"},{"key":"e_1_3_2_2_89_1","volume-title":"Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning. arXiv preprint arXiv:2007.06849","author":"Zhang Yifei","year":"2020","unstructured":"Yifei Zhang and Hao Zhu . 2020. Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning. arXiv preprint arXiv:2007.06849 ( 2020 ). Yifei Zhang and Hao Zhu. 2020. Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning. arXiv preprint arXiv:2007.06849 (2020)."},{"key":"e_1_3_2_2_90_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng , Ankur Dave , Jethro G. Beekman , Raluca Ada Popa , Joseph E. Gonzalez , and Ion Stoica . 2017 . Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017 , Boston, MA, USA, March 27--29 , 2017. USENIX Association, 283--298. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/zheng Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27--29, 2017. USENIX Association, 283--298. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/zheng"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457241","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3457241","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:06Z","timestamp":1750195686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3457241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":92,"alternative-id":["10.1145\/3448016.3457241","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3457241","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}