{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T18:24:57Z","timestamp":1772475897880,"version":"3.50.1"},"reference-count":61,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2021YFB1714800"],"award-info":[{"award-number":["2021YFB1714800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62002007, and 62073012"],"award-info":[{"award-number":["62002007, and 62073012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"S&T Program of Hebei","award":["21340301D"],"award-info":[{"award-number":["21340301D"]}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"crossref","award":["1R01AI130460, 1R01AG073435, 1R56AG074604, 1R01LM013519, and 1R56AG069880"],"award-info":[{"award-number":["1R01AI130460, 1R01AG073435, 1R56AG074604, 1R01LM013519, and 1R56AG069880"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Lehigh\u2019s Accelerator","award":["S00010293"],"award-info":[{"award-number":["S00010293"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2022,8,31]]},"abstract":"<jats:p>Along with the rapid expansion of information technology and digitalization of health data, there is an increasing concern on maintaining data privacy while garnering the benefits in the medical field. Two critical challenges are identified: First, medical data is naturally distributed across multiple local sites, making it difficult to collectively train machine learning models without data leakage. Second, in medical applications, data are often collected from different sources and views, resulting in heterogeneity and complexity that requires reconciliation. In this article, we present a generic Federated Multi-view Learning (FedMV) framework for multi-view data leakage prevention. Specifically, we apply this framework to two types of problems based on local data availability: Vertical Federated Multi-view Learning (V-FedMV) and Horizontal Federated Multi-view Learning (H-FedMV). We experimented with real-world keyboard data collected from BiAffect study. Our results demonstrated that the proposed approach can make full use of multi-view data in a privacy-preserving way, and both V-FedMV and H-FedMV perform better than their single-view and pairwise counterparts. Besides, the framework can be easily adapted to deal with multi-view sequential data. We have developed a sequential model (S-FedMV) that takes sequence of multi-view data as input and demonstrated it experimentally. To the best of our knowledge, this framework is the first to consider both vertical and horizontal diversification in the multi-view setting, as well as their sequential federated learning.<\/jats:p>","DOI":"10.1145\/3501816","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T12:49:42Z","timestamp":1652878182000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Federated Multi-view Learning for Private Medical Data Integration and Analysis"],"prefix":"10.1145","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5011-3797","authenticated-orcid":false,"given":"Sicong","family":"Che","sequence":"first","affiliation":[{"name":"China Agricultural University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9252-911X","authenticated-orcid":false,"given":"Zhaoming","family":"Kong","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7422-630X","authenticated-orcid":false,"given":"Hao","family":"Peng","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1539-7939","authenticated-orcid":false,"given":"Lichao","family":"Sun","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5660-8651","authenticated-orcid":false,"given":"Alex","family":"Leow","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0835-0788","authenticated-orcid":false,"given":"Yong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7810-9071","authenticated-orcid":false,"given":"Lifang","family":"He","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,28]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2015.04.001"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.320.7237.759"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1136\/jamia.1996.96236282"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_7_2","unstructured":"Sabri Boughorbel Fethi Jarray Neethu Venugopal Shabir Moosa Haithum Elhadi and Michel Makhlouf. 2019. Federated uncertainty-aware learning for distributed hospital ehr data. Retrieved from https:\/\/arXiv:1910.12191."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2018.01.007"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098086"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2988604"},{"key":"e_1_3_2_11_2","unstructured":"Kyunghyun Cho Bart Van Merri\u00ebnboer Caglar Gulcehre Dzmitry Bahdanau Fethi Bougares Holger Schwenk and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. Retrieved from https:\/\/arXiv:1406.1078."},{"key":"e_1_3_2_12_2","unstructured":"Corinna Cortes Mehryar Mohri and Afshin Rostamizadeh. 2009. Learning non-linear combinations of kernels. In Advances in Neural Information Processing Systems Vol. 22."},{"key":"e_1_3_2_13_2","first-page":"375","article-title":"PAC generalization bounds for co-training","volume":"1","author":"Dasgupta Sanjoy","year":"2002","unstructured":"Sanjoy Dasgupta, Michael L. Littman, and David McAllester. 2002. PAC generalization bounds for co-training. Adv. Neural Info. Process. Syst. 1 (2002), 375\u2013382.","journal-title":"Adv. Neural Info. Process. Syst."},{"issue":"2","key":"e_1_3_2_14_2","first-page":"62","article-title":"The district health information system (DHIS2): A literature review and meta-synthesis of its strengths and operational challenges based on the experiences of 11 countries","volume":"48","author":"Dehnavieh Reza","year":"2019","unstructured":"Reza Dehnavieh, AliAkbar Haghdoost, Ardeshir Khosravi, Fahime Hoseinabadi, Hamed Rahimi, Atousa Poursheikhali, Nahid Khajehpour, Zahra Khajeh, Nadia Mirshekari, Marziyeh Hasani, et\u00a0al. 2019. The district health information system (DHIS2): A literature review and meta-synthesis of its strengths and operational challenges based on the experiences of 11 countries. Health Info. Manage. J. 48, 2 (2019), 62\u201375.","journal-title":"Health Info. Manage. J."},{"key":"e_1_3_2_15_2","first-page":"230","volume-title":"Proceedings of the International Conference on Database Theory","author":"Deutsch Alin","year":"2005","unstructured":"Alin Deutsch and Yannis Papakonstantinou. 2005. Privacy in database publishing. In Proceedings of the International Conference on Database Theory. Springer, 230\u2013245."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.21"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.84"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M3144"},{"key":"e_1_3_2_19_2","unstructured":"Siwei Feng and Han Yu. 2020. Multi-participant multi-class vertical federated learning. Retrieved from https:\/\/arXiv:2001.11154."},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Adrian Flanagan Were Oyomno Alexander Grigorievskiy Kuan Eeik Tan Suleiman A. Khan and Muhammad Ammad-Ud-Din. 2020. Federated multi-view matrix factorization for personalized recommendations. Retrieved from https:\/\/arXiv:2004.04256.","DOI":"10.1007\/978-3-030-67661-2_20"},{"key":"e_1_3_2_21_2","volume-title":"Proceedings of the International Workshop on Independent Component Analysis and Blind Signal Separation","author":"Fyfe Colin","year":"2000","unstructured":"Colin Fyfe and Pei Ling Lai. 2000. ICA using kernel canonical correlation analysis. In Proceedings of the International Workshop on Independent Component Analysis and Blind Signal Separation. Citeseer."},{"key":"e_1_3_2_22_2","first-page":"892","article-title":"Secure linear regression on vertically partitioned datasets.","volume":"2016","author":"Gasc\u00f3n Adri\u00e0","year":"2016","unstructured":"Adri\u00e0 Gasc\u00f3n, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, and David Evans. 2016. Secure linear regression on vertically partitioned datasets. IACR Cryptol. ePrint Arch. 2016 (2016), 892.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.7.1.e3"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00126"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-1-4612-4380-9_14","volume-title":"Breakthroughs in Statistics","author":"Hotelling Harold","year":"1992","unstructured":"Harold Hotelling. 1992. Relations between two sets of variates. In Breakthroughs in Statistics. Springer, 162\u2013190."},{"issue":"6","key":"e_1_3_2_27_2","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/TCYB.2013.2272642","article-title":"Joint embedding learning and sparse regression: A framework for unsupervised feature selection","volume":"44","author":"Hou Chenping","year":"2013","unstructured":"Chenping Hou, Feiping Nie, Xuelong Li, Dongyun Yi, and Yi Wu. 2013. Joint embedding learning and sparse regression: A framework for unsupervised feature selection. IEEE Trans. Cybernet. 44, 6 (2013), 793\u2013804.","journal-title":"IEEE Trans. Cybernet."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2019.103291"},{"key":"e_1_3_2_29_2","unstructured":"Mingkai Huang Hao Li Bing Bai Chang Wang Kun Bai and Fei Wang. 2020. A federated multi-view deep learning framework for privacy-preserving recommendations. Retrieved from https:\/\/arXiv:2008.10808."},{"key":"e_1_3_2_30_2","first-page":"250","volume-title":"Proceedings of the 18th International Conference on Machine Learning","volume":"1","author":"Joachims Thorsten","year":"2001","unstructured":"Thorsten Joachims, Nello Cristianini, and John Shawe-Taylor. 2001. Composite kernels for hypertext categorisation. In Proceedings of the 18th International Conference on Machine Learning, Vol. 1. 250\u2013257."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8415"},{"issue":"1","key":"e_1_3_2_32_2","first-page":"125","article-title":"Privacy-preserving analysis of vertically partitioned data using secure matrix products","volume":"25","author":"Karr Alan F.","year":"2009","unstructured":"Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, and Jerome P. Reiter. 2009. Privacy-preserving analysis of vertically partitioned data using secure matrix products. J. Offic. Stat. 25, 1 (2009), 125.","journal-title":"J. Offic. Stat."},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.62.6.593"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/58.3.433"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098118"},{"key":"e_1_3_2_36_2","first-page":"393","volume-title":"Proceedings of the 28th International Conference on Machine Learning","author":"Kumar Abhishek","year":"2011","unstructured":"Abhishek Kumar and Hal Daum\u00e9. 2011. A co-training approach for multi-view spectral clustering. In Proceedings of the 28th International Conference on Machine Learning. 393\u2013400."},{"key":"e_1_3_2_37_2","first-page":"27","article-title":"Learning the kernel matrix with semidefinite programming","volume":"5","author":"Lanckriet Gert R. G.","year":"2004","unstructured":"Gert R. G. Lanckriet, Nello Cristianini, Peter Bartlett, Laurent El Ghaoui, and Michael I. Jordan. 2004. Learning the kernel matrix with semidefinite programming. J. Mach. Learn. Res. 5(Jan.2004), 27\u201372.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.7744"},{"key":"e_1_3_2_39_2","first-page":"1","volume-title":"BMC Bioinformatics","author":"Li Fengjun","year":"2011","unstructured":"Fengjun Li, Xukai Zou, Peng Liu, and Jake Y. Chen. 2011. New threats to health data privacy. In BMC Bioinformatics, Vol. 12. BioMed Central, 1\u20137."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2988525"},{"key":"e_1_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Yang Liu Xiong Zhang and Libin Wang. 2020. Asymmetrically vertical federated learning. Retrieved from https:\/\/arXiv:2004.07427.","DOI":"10.1007\/978-3-031-01585-4_5"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.2196\/22555"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_45_2","first-page":"1273","volume-title":"Artificial Intelligence and Statistics","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. PMLR, 1273\u20131282."},{"key":"e_1_3_2_46_2","first-page":"1813","volume-title":"Advances in Neural Information Processing Systems","author":"Nie Feiping","year":"2010","unstructured":"Feiping Nie, Heng Huang, Xiao Cai, and Chris H. Ding. 2010. Efficient and robust feature selection via joint \\( \\ell _{2,1} \\) -norms minimization. In Advances in Neural Information Processing Systems. MIT Press, 1813\u20131821."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014139"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1086\/269391"},{"key":"e_1_3_2_49_2","unstructured":"Virginia Smith Chao-Kai Chiang Maziar Sanjabi and Ameet Talwalkar. 2017. Federated multi-task learning. Retrieved from https:\/\/arXiv:1705.10467."},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1362-6"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"issue":"2","key":"e_1_3_2_52_2","first-page":"26","article-title":"Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude","volume":"4","author":"Tieleman Tijmen","year":"2012","unstructured":"Tijmen Tieleman and Geoffrey Hinton. 2012. Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude. COURSERA: Neural Netw. Mach. Learn. 4, 2 (2012), 26\u201331.","journal-title":"COURSERA: Neural Netw. Mach. Learn."},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_42"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2435"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.1988.01800320058007"},{"key":"e_1_3_2_56_2","first-page":"139","volume-title":"Proceedings of the International Conference on Very Large Data Bases","volume":"6","author":"Xiao Xiaokui","year":"2006","unstructured":"Xiaokui Xiao and Yufei Tao. 2006. Anatomy: Simple and effective privacy preservation. In Proceedings of the International Conference on Very Large Data Bases, Vol. 6. 139\u2013150."},{"key":"e_1_3_2_57_2","unstructured":"Chang Xu Dacheng Tao and Chao Xu. 2013. A survey on multi-view learning. Retrieved from https:\/\/arXiv:1304.5634."},{"key":"e_1_3_2_58_2","unstructured":"Xiaohang Xu Hao Peng Lichao Sun Yan Niu Hongyuan Ma Lianzhong Liu and Lifang He. 2021. FedMood: Federated learning on mobile health data for mood detection. Retrieved from https:\/\/arXiv:2102.09342."},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1192\/bjp.133.5.429"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.02.007"},{"key":"e_1_3_2_62_2","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"24","author":"Zhao Zheng","year":"2010","unstructured":"Zheng Zhao, Lei Wang, and Huan Liu. 2010. Efficient spectral feature selection with minimum redundancy. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 24."}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:48Z","timestamp":1750183788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,28]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8,31]]}},"alternative-id":["10.1145\/3501816"],"URL":"https:\/\/doi.org\/10.1145\/3501816","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,28]]},"assertion":[{"value":"2021-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}