{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:43:46Z","timestamp":1775263426747,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3474369.3486872","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T11:13:28Z","timestamp":1635419608000},"page":"181-192","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["FedV"],"prefix":"10.1145","author":[{"given":"Runhua","family":"Xu","sequence":"first","affiliation":[{"name":"IBM Research, San Jose, CA, USA"}]},{"given":"Nathalie","family":"Baracaldo","sequence":"additional","affiliation":[{"name":"IBM Research, San Jose, CA, USA"}]},{"given":"Yi","family":"Zhou","sequence":"additional","affiliation":[{"name":"IBM Research, San Jose, CA, USA"}]},{"given":"Ali","family":"Anwar","sequence":"additional","affiliation":[{"name":"IBM Research, San Jose, CA, USA"}]},{"given":"James","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Heiko","family":"Ludwig","sequence":"additional","affiliation":[{"name":"IBM Research, San Jose, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Decentralizing inner-product functional encryption","author":"Abdalla Michel","unstructured":"Michel Abdalla , Fabrice Benhamouda , Markulf Kohlweiss , and Hendrik Waldner . 2019. Decentralizing inner-product functional encryption . In PKC. Springer , Springer , 128--157. Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, and Hendrik Waldner. 2019. Decentralizing inner-product functional encryption. In PKC. Springer, Springer, 128--157."},{"key":"e_1_3_2_2_2_1","volume-title":"Angelo De Caro, and David Pointcheval","author":"Abdalla Michel","year":"2015","unstructured":"Michel Abdalla , Florian Bourse , Angelo De Caro, and David Pointcheval . 2015 . Simple functional encryption schemes for inner products. In PKC. Springer , 733--751. Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval. 2015. Simple functional encryption schemes for inner products. In PKC. Springer, 733--751."},{"key":"e_1_3_2_2_3_1","volume-title":"Crypto","author":"Abdalla Michel","unstructured":"Michel Abdalla , Dario Catalano , Dario Fiore , Romain Gay , and Bogdan Ursu . 2018. Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings . In Crypto . Springer , 597--627. Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, and Bogdan Ursu. 2018. Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings. In Crypto. Springer, 597--627."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Toshinori Araki Assi Barak Jun Furukawa Marcel Keller Kazuma Ohara and Hikaru Tsuchida. 2018. How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ. In CCS. ACM 2198--2200.  Toshinori Araki Assi Barak Jun Furukawa Marcel Keller Kazuma Ohara and Hikaru Tsuchida. 2018. How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ. In CCS. ACM 2198--2200.","DOI":"10.1145\/3243734.3278510"},{"key":"e_1_3_2_2_5_1","volume-title":"How to backdoor federated learning. arXiv preprint arXiv:1807.00459","author":"Bagdasaryan Eugene","year":"2018","unstructured":"Eugene Bagdasaryan , Andreas Veit , Yiqing Hua , Deborah Estrin , and Vitaly Shmatikov . 2018. How to backdoor federated learning. arXiv preprint arXiv:1807.00459 ( 2018 ). Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2018. How to backdoor federated learning. arXiv preprint arXiv:1807.00459 (2018)."},{"key":"e_1_3_2_2_6_1","volume-title":"Better preprocessing for secure multiparty computation","author":"Baum Carsten","unstructured":"Carsten Baum , Ivan Damg\u00e5rd , Tomas Toft , and Rasmus Zakarias . 2016. Better preprocessing for secure multiparty computation . In ACNS. Springer , 327--345. Carsten Baum, Ivan Damg\u00e5rd, Tomas Toft, and Rasmus Zakarias. 2016. Better preprocessing for secure multiparty computation. In ACNS. Springer, 327--345."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Keith Bonawitz Vladimir Ivanov Ben Kreuter Antonio Marcedone H Brendan McMahan Sarvar Patel Daniel Ramage Aaron Segal and Karn Seth. 2017. Practical secure aggregation for privacy-preserving machine learning. In CSS. ACM ACM 1175--1191.  Keith Bonawitz Vladimir Ivanov Ben Kreuter Antonio Marcedone H Brendan McMahan Sarvar Patel Daniel Ramage Aaron Segal and Karn Seth. 2017. Practical secure aggregation for privacy-preserving machine learning. In CSS. ACM ACM 1175--1191.","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_2_8_1","volume-title":"Functional encryption: Definitions and challenges","author":"Boneh Dan","unstructured":"Dan Boneh , Amit Sahai , and Brent Waters . 2011. Functional encryption: Definitions and challenges . In TCC. Springer , 253--273. Dan Boneh, Amit Sahai, and Brent Waters. 2011. Functional encryption: Definitions and challenges. In TCC. Springer, 253--273."},{"key":"e_1_3_2_2_9_1","volume-title":"Crypto","author":"Chase Melissa","unstructured":"Melissa Chase , Yevgeniy Dodis , Yuval Ishai , Daniel Kraschewski , Tianren Liu , Rafail Ostrovsky , and Vinod Vaikuntanathan . 2019. Reusable non-interactive secure computation . In Crypto . Springer , 462--488. Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, and Vinod Vaikuntanathan. 2019. Reusable non-interactive secure computation. In Crypto. Springer, 462--488."},{"key":"e_1_3_2_2_10_1","volume-title":"Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728","author":"Chen Bryant","year":"2018","unstructured":"Bryant Chen , Wilka Carvalho , Nathalie Baracaldo , Heiko Ludwig , Benjamin Edwards , Taesung Lee , Ian Molloy , and Biplav Srivastava . 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 ( 2018 ). Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, and Biplav Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 (2018)."},{"key":"e_1_3_2_2_11_1","volume-title":"Vafl: a method of vertical asynchronous federated learning. arXiv preprint arXiv:2007.06081","author":"Chen Tianyi","year":"2020","unstructured":"Tianyi Chen , Xiao Jin , Yuejiao Sun , and Wotao Yin . 2020. Vafl: a method of vertical asynchronous federated learning. arXiv preprint arXiv:2007.06081 ( 2020 ). Tianyi Chen, Xiao Jin, Yuejiao Sun, and Wotao Yin. 2020. Vafl: a method of vertical asynchronous federated learning. arXiv preprint arXiv:2007.06081 (2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"SecureBoost: A Lossless Federated Learning Framework. arXiv preprint arXiv:1901.08755","author":"Cheng Kewei","year":"2019","unstructured":"Kewei Cheng , Tao Fan , Yilun Jin , Yang Liu , Tianjian Chen , and Qiang Yang . 2019. SecureBoost: A Lossless Federated Learning Framework. arXiv preprint arXiv:1901.08755 ( 2019 ). Kewei Cheng, Tao Fan, Yilun Jin, Yang Liu, Tianjian Chen, and Qiang Yang. 2019. SecureBoost: A Lossless Federated Learning Framework. arXiv preprint arXiv:1901.08755 (2019)."},{"key":"e_1_3_2_2_13_1","volume-title":"Romain Gay, Duong Hieu Phan, and David Pointcheval.","author":"Chotard J\u00e9r\u00e9my","year":"2018","unstructured":"J\u00e9r\u00e9my Chotard , Edouard Dufour Sans , Romain Gay, Duong Hieu Phan, and David Pointcheval. 2018 . Decentralized multi-client functional encryption for inner product. In Asiacrypt. Springer , 703--732. J\u00e9r\u00e9my Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, and David Pointcheval. 2018. Decentralized multi-client functional encryption for inner product. In Asiacrypt. Springer, 703--732."},{"key":"e_1_3_2_2_14_1","volume-title":"Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection","author":"Christen Peter","unstructured":"Peter Christen . 2012. Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection . Springer Science & Business Media . Peter Christen. 2012. Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection. Springer Science & Business Media."},{"key":"e_1_3_2_2_15_1","volume-title":"Variational Federated Multi-Task Learning. arXiv preprint arXiv:1906.06268","author":"Corinzia Luca","year":"2019","unstructured":"Luca Corinzia and Joachim M Buhmann . 2019. Variational Federated Multi-Task Learning. arXiv preprint arXiv:1906.06268 ( 2019 ). Luca Corinzia and Joachim M Buhmann. 2019. Variational Federated Multi-Task Learning. arXiv preprint arXiv:1906.06268 (2019)."},{"key":"e_1_3_2_2_16_1","volume-title":"A generalisation, a simpli. cation and some applications of paillier's probabilistic public-key system","author":"Damg\u00e5rd Ivan","unstructured":"Ivan Damg\u00e5rd and Mads Jurik . 2001. A generalisation, a simpli. cation and some applications of paillier's probabilistic public-key system . In PKC. Springer , Springer , 119--136. Ivan Damg\u00e5rd and Mads Jurik. 2001. A generalisation, a simpli. cation and some applications of paillier's probabilistic public-key system. In PKC. Springer, Springer, 119--136."},{"key":"e_1_3_2_2_17_1","volume-title":"Nigel Smart, and Sarah Zakarias","author":"Damg\u00e5rd Ivan","year":"2012","unstructured":"Ivan Damg\u00e5rd , Valerio Pastro , Nigel Smart, and Sarah Zakarias . 2012 . Multiparty computation from somewhat homomorphic encryption. In Crypto. Springer , 643--662. Ivan Damg\u00e5rd, Valerio Pastro, Nigel Smart, and Sarah Zakarias. 2012. Multiparty computation from somewhat homomorphic encryption. In Crypto. Springer, 643--662."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Changyu Dong Liqun Chen and Zikai Wen. 2013. When private set intersection meets big data: an efficient and scalable protocol. In CCS. ACM 789--800.  Changyu Dong Liqun Chen and Zikai Wen. 2013. When private set intersection meets big data: an efficient and scalable protocol. In CCS. ACM 789--800.","DOI":"10.1145\/2508859.2516701"},{"key":"e_1_3_2_2_19_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml  Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Matt Fredrikson Somesh Jha and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In CCS. ACM ACM 1322--1333.  Matt Fredrikson Somesh Jha and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In CCS. ACM ACM 1322--1333.","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_21_1","first-page":"892","article-title":"Secure Linear Regression on Vertically Partitioned Datasets","volume":"2016","author":"Gasc\u00f3n Adri\u00e0","year":"2016","unstructured":"Adri\u00e0 Gasc\u00f3n , Phillipp Schoppmann , Borja Balle , Mariana Raykova , Jack Doerner , Samee Zahur , and David Evans . 2016 . Secure Linear Regression on Vertically Partitioned Datasets . IACR Cryptology ePrint Archive , Vol. 2016 (2016), 892 . Adri\u00e0 Gasc\u00f3n, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, and David Evans. 2016. Secure Linear Regression on Vertically Partitioned Datasets. IACR Cryptology ePrint Archive, Vol. 2016 (2016), 892.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_22_1","volume-title":"Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","author":"Geyer Robin C","year":"2017","unstructured":"Robin C Geyer , Tassilo Klein , and Moin Nabi . 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 ( 2017 ). Robin C Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Bin Gu Zhiyuan Dang Xiang Li and Heng Huang. 2020. Federated doubly stochastic kernel learning for vertically partitioned data. In KDD. 2483--2493.  Bin Gu Zhiyuan Dang Xiang Li and Heng Huang. 2020. Federated doubly stochastic kernel learning for vertically partitioned data. In KDD. 2483--2493.","DOI":"10.1145\/3394486.3403298"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2289"},{"key":"e_1_3_2_2_25_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Richard Nock , Giorgio Patrini , Guillaume Smith , and Brian Thorne . 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 ( 2017 ). Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 (2017)."},{"key":"e_1_3_2_2_26_1","first-page":"331","article-title":"Faster secure two-party computation using garbled circuits","volume":"201","author":"Huang Yan","year":"2011","unstructured":"Yan Huang , David Evans , Jonathan Katz , and Lior Malka . 2011 . Faster secure two-party computation using garbled circuits .. In USENIX Sec , Vol. 201. 331 -- 335 . Yan Huang, David Evans, Jonathan Katz, and Lior Malka. 2011. Faster secure two-party computation using garbled circuits.. In USENIX Sec, Vol. 201. 331--335.","journal-title":"USENIX Sec"},{"key":"e_1_3_2_2_27_1","volume-title":"Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, and Moti Yung.","author":"Ion Mihaela","year":"2019","unstructured":"Mihaela Ion , Ben Kreuter , Ahmet Erhan Nergiz , Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, and Moti Yung. 2019 . On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications. In IACR Cryptology ePrint Archive. IACR. Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, and Moti Yung. 2019. On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications. In IACR Cryptology ePrint Archive. IACR."},{"key":"e_1_3_2_2_28_1","volume-title":"Eurocrypt","author":"Keller Marcel","unstructured":"Marcel Keller , Valerio Pastro , and Dragos Rotaru . 2018. Overdrive: making SPDZ great again . In Eurocrypt . Springer , 158--189. Marcel Keller, Valerio Pastro, and Dragos Rotaru. 2018. Overdrive: making SPDZ great again. In Eurocrypt. Springer, 158--189."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Vladimir Kolesnikov Ranjit Kumaresan Mike Rosulek and Ni Trieu. 2016. Efficient batched oblivious PRF with applications to private set intersection. In CCS. ACM 818--829.  Vladimir Kolesnikov Ranjit Kumaresan Mike Rosulek and Ni Trieu. 2016. Efficient batched oblivious PRF with applications to private set intersection. In CCS. ACM 818--829.","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_2_2_30_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Jakub Konevc","year":"2016","unstructured":"Jakub Konevc n\u1ef3, H Brendan McMahan , Felix X Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh, and Dave Bacon . 2016 . Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016). Jakub Konevc n\u1ef3, H Brendan McMahan, Felix X Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)."},{"key":"e_1_3_2_2_31_1","volume-title":"MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist","author":"LeCun Yann","year":"2010","unstructured":"Yann LeCun , Corinna Cortes , and CJ Burges . 2010. MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist , Vol. 2 ( 2010 ). Yann LeCun, Corinna Cortes, and CJ Burges. 2010. MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist, Vol. 2 (2010)."},{"key":"e_1_3_2_2_32_1","volume-title":"Ameet Talwalkar, and Virginia Smith.","author":"Li Tian","year":"2019","unstructured":"Tian Li , Anit Kumar Sahu , Ameet Talwalkar, and Virginia Smith. 2019 . Federated learning: Challenges , methods, and future directions. arXiv preprint arXiv:1908.07873 (2019). Tian Li, Anit Kumar Sahu, Ameet Talwalkar, and Virginia Smith. 2019. Federated learning: Challenges, methods, and future directions. arXiv preprint arXiv:1908.07873 (2019)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Adriana L\u00f3pez-Alt Eran Tromer and Vinod Vaikuntanathan. 2012. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In STOC. ACM 1219--1234.  Adriana L\u00f3pez-Alt Eran Tromer and Vinod Vaikuntanathan. 2012. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In STOC. ACM 1219--1234.","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_3_2_2_34_1","volume-title":"et almbox","author":"Ludwig Heiko","year":"2020","unstructured":"Heiko Ludwig , Nathalie Baracaldo , Gegi Thomas , Yi Zhou , Ali Anwar , Shashank Rajamoni , Yuya Ong , Jayaram Radhakrishnan , Ashish Verma , Mathieu Sinn , et almbox . 2020 . Ibm federated learning: an enterprise framework white paper v0. 1. arXiv preprint arXiv:2007.10987 (2020). Heiko Ludwig, Nathalie Baracaldo, Gegi Thomas, Yi Zhou, Ali Anwar, Shashank Rajamoni, Yuya Ong, Jayaram Radhakrishnan, Ashish Verma, Mathieu Sinn, et almbox. 2020. Ibm federated learning: an enterprise framework white paper v0. 1. arXiv preprint arXiv:2007.10987 (2020)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Milad Nasr Reza Shokri and Amir Houmansadr. 2018. Machine learning with membership privacy using adversarial regularization. In CCS. ACM ACM 634--646.  Milad Nasr Reza Shokri and Amir Houmansadr. 2018. Machine learning with membership privacy using adversarial regularization. In CCS. ACM ACM 634--646.","DOI":"10.1145\/3243734.3243855"},{"key":"e_1_3_2_2_36_1","unstructured":"Milad Nasr Reza Shokri and Amir Houmansadr. 2019. Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks. In S&P. IEEE.  Milad Nasr Reza Shokri and Amir Houmansadr. 2019. Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks. In S&P. IEEE."},{"key":"e_1_3_2_2_37_1","volume-title":"Introductory lectures on convex programming","author":"Nesterov Yurii","year":"1998","unstructured":"Yurii Nesterov . 1998. Introductory lectures on convex programming volume i: Basic course. Lecture notes, Vol. 3 , 4 ( 1998 ), 5. Yurii Nesterov. 1998. Introductory lectures on convex programming volume i: Basic course. Lecture notes, Vol. 3, 4 (1998), 5."},{"key":"e_1_3_2_2_38_1","volume-title":"Entity resolution and federated learning get a federated resolution. arXiv preprint arXiv:1803.04035","author":"Nock Richard","year":"2018","unstructured":"Richard Nock , Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Giorgio Patrini , Guillaume Smith , and Brian Thorne . 2018. Entity resolution and federated learning get a federated resolution. arXiv preprint arXiv:1803.04035 ( 2018 ). Richard Nock, Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2018. Entity resolution and federated learning get a federated resolution. arXiv preprint arXiv:1803.04035 (2018)."},{"key":"e_1_3_2_2_39_1","volume-title":"A novel error-tolerant anonymous linking code. GRLC","author":"Schnell Rainer","year":"2011","unstructured":"Rainer Schnell , Tobias Bachteler , and J\u00f6rg Reiher . 2011. A novel error-tolerant anonymous linking code. GRLC ( 2011 ). Rainer Schnell, Tobias Bachteler, and J\u00f6rg Reiher. 2011. A novel error-tolerant anonymous linking code. GRLC (2011)."},{"key":"e_1_3_2_2_40_1","volume-title":"Linear algebra and geometry","author":"Shafarevich Igor R","unstructured":"Igor R Shafarevich and Alexey O Remizov . 2012. Linear algebra and geometry . Springer Science & Business Media . Igor R Shafarevich and Alexey O Remizov. 2012. Linear algebra and geometry. Springer Science & Business Media."},{"key":"e_1_3_2_2_41_1","volume-title":"S&P","author":"Shokri Reza","unstructured":"Reza Shokri , Marco Stronati , Congzheng Song , and Vitaly Shmatikov . 2017. Membership inference attacks against machine learning models . In S&P . IEEE , 3--18. Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In S&P. IEEE, 3--18."},{"key":"e_1_3_2_2_42_1","volume-title":"Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases","author":"Slavkovic Aleksandra B","unstructured":"Aleksandra B Slavkovic , Yuval Nardi , and Matthew M Tibbits . 2007. Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases . In ICDMW. IEEE , 723--728. Aleksandra B Slavkovic, Yuval Nardi, and Matthew M Tibbits. 2007. Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases. In ICDMW. IEEE, 723--728."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Stacey Truex Nathalie Baracaldo Ali Anwar Thomas Steinke Heiko Ludwig and Rui Zhang. 2019. A Hybrid Approach to Privacy-Preserving Federated Learning. In AISec. ACM.  Stacey Truex Nathalie Baracaldo Ali Anwar Thomas Steinke Heiko Ludwig and Rui Zhang. 2019. A Hybrid Approach to Privacy-Preserving Federated Learning. In AISec. ACM.","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_2_44_1","volume-title":"Privacy-preserving data mining","author":"Vaidya Jaideep","unstructured":"Jaideep Vaidya . 2008. A survey of privacy-preserving methods across vertically partitioned data . In Privacy-preserving data mining . Springer , 337--358. Jaideep Vaidya. 2008. A survey of privacy-preserving methods across vertically partitioned data. In Privacy-preserving data mining. Springer, 337--358."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409620.1409624"},{"key":"e_1_3_2_2_46_1","volume-title":"Split learning for health: Distributed deep learning without sharing raw patient data. arXiv preprint arXiv:1812.00564","author":"Vepakomma Praneeth","year":"2018","unstructured":"Praneeth Vepakomma , Otkrist Gupta , Tristan Swedish , and Ramesh Raskar . 2018. Split learning for health: Distributed deep learning without sharing raw patient data. arXiv preprint arXiv:1812.00564 ( 2018 ). Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. 2018. Split learning for health: Distributed deep learning without sharing raw patient data. arXiv preprint arXiv:1812.00564 (2018)."},{"key":"e_1_3_2_2_47_1","volume-title":"Hybrid Differentially Private Federated Learning on Vertically Partitioned Data. arXiv preprint arXiv:2009.02763","author":"Wang Chang","year":"2020","unstructured":"Chang Wang , Jian Liang , Mingkai Huang , Bing Bai , Kun Bai , and Hao Li. 2020. Hybrid Differentially Private Federated Learning on Vertically Partitioned Data. arXiv preprint arXiv:2009.02763 ( 2020 ). Chang Wang, Jian Liang, Mingkai Huang, Bing Bai, Kun Bai, and Hao Li. 2020. Hybrid Differentially Private Federated Learning on Vertically Partitioned Data. arXiv preprint arXiv:2009.02763 (2020)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Xiao Wang Samuel Ranellucci and Jonathan Katz. 2017a. Authenticated garbling and efficient maliciously secure two-party computation. In CCS. ACM 21--37.  Xiao Wang Samuel Ranellucci and Jonathan Katz. 2017a. Authenticated garbling and efficient maliciously secure two-party computation. In CCS. ACM 21--37.","DOI":"10.1145\/3133956.3134053"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133979"},{"key":"e_1_3_2_2_50_1","unstructured":"Runhua Xu Nathalie Baracaldo Yi Zhou Ali Anwar and Heiko Ludwig. 2019. HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning. In AISec. ACM.  Runhua Xu Nathalie Baracaldo Yi Zhou Ali Anwar and Heiko Ludwig. 2019. HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning. In AISec. ACM."},{"key":"e_1_3_2_2_51_1","volume-title":"A quasi-newton method based vertical federated learning framework for logistic regression. arXiv preprint arXiv:1912.00513","author":"Yang Kai","year":"2019","unstructured":"Kai Yang , Tao Fan , Tianjian Chen , Yuanming Shi , and Qiang Yang . 2019. A quasi-newton method based vertical federated learning framework for logistic regression. arXiv preprint arXiv:1912.00513 ( 2019 ). Kai Yang, Tao Fan, Tianjian Chen, Yuanming Shi, and Qiang Yang. 2019. A quasi-newton method based vertical federated learning framework for logistic regression. arXiv preprint arXiv:1912.00513 (2019)."},{"key":"e_1_3_2_2_52_1","volume-title":"Privacy-preserving svm classification on vertically partitioned data","author":"Yu Hwanjo","unstructured":"Hwanjo Yu , Jaideep Vaidya , and Xiaoqian Jiang . 2006. Privacy-preserving svm classification on vertically partitioned data . In PAKDD. Springer , 647--656. Hwanjo Yu, Jaideep Vaidya, and Xiaoqian Jiang. 2006. Privacy-preserving svm classification on vertically partitioned data. In PAKDD. Springer, 647--656."},{"key":"e_1_3_2_2_53_1","volume-title":"Secure bilevel asynchronous vertical federated learning with backward updating. arXiv preprint arXiv:2103.00958","author":"Zhang Qingsong","year":"2021","unstructured":"Qingsong Zhang , Bin Gu , Cheng Deng , and Heng Huang . 2021. Secure bilevel asynchronous vertical federated learning with backward updating. arXiv preprint arXiv:2103.00958 ( 2021 ). Qingsong Zhang, Bin Gu, Cheng Deng, and Heng Huang. 2021. Secure bilevel asynchronous vertical federated learning with backward updating. arXiv preprint arXiv:2103.00958 (2021)."},{"key":"e_1_3_2_2_54_1","volume-title":"Federated learning with non-iid data. arXiv preprint arXiv:1806.00582","author":"Zhao Yue","year":"2018","unstructured":"Yue Zhao , Meng Li , Liangzhen Lai , Naveen Suda , Damon Civin , and Vikas Chandra . 2018. Federated learning with non-iid data. arXiv preprint arXiv:1806.00582 ( 2018 ). Yue Zhao, Meng Li, Liangzhen Lai, Naveen Suda, Damon Civin, and Vikas Chandra. 2018. Federated learning with non-iid data. arXiv preprint arXiv:1806.00582 (2018)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474369.3486872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474369.3486872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:26Z","timestamp":1750188626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474369.3486872"}},"subtitle":["Privacy-Preserving Federated Learning over Vertically Partitioned Data"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":54,"alternative-id":["10.1145\/3474369.3486872","10.1145\/3474369"],"URL":"https:\/\/doi.org\/10.1145\/3474369.3486872","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}