{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T08:25:14Z","timestamp":1769070314281,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,10]]},"DOI":"10.1145\/3514221.3526127","type":"proceedings-article","created":{"date-parts":[[2022,6,12]],"date-time":"2022-06-12T02:33:49Z","timestamp":1655001229000},"page":"1316-1330","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["BlindFL: Vertical Federated Machine Learning without Peeking into Your Data"],"prefix":"10.1145","author":[{"given":"Fangcheng","family":"Fu","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Huanran","family":"Xue","sequence":"additional","affiliation":[{"name":"Tencent Inc., Beijing, China"}]},{"given":"Yong","family":"Cheng","sequence":"additional","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]},{"given":"Yangyu","family":"Tao","sequence":"additional","affiliation":[{"name":"Tencent Inc., Beijing, China"}]},{"given":"Bin","family":"Cui","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Virginia Consumer Data Protection Act (CDPA). https:\/\/lis.virginia.gov\/cgi-SBbin\/legp604.exe?212+sum+HB2307."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_4_1","first-page":"111","article-title":"Scalable and Secure Logistic Regression via Homomorphic Encryption","volume":"2016","author":"Aono Yoshinori","year":"2016","unstructured":"Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, and Lihua Wang. 2016. Scalable and Secure Logistic Regression via Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016 (2016), 111.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_5_1","volume-title":"Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference","volume":"576","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Vol. 576. Springer, 420--432."},{"key":"e_1_3_2_1_6_1","volume-title":"Sharemind: A Framework for Fast Privacy-Preserving Computations. In 13th European Symposium on Research in Computer Security, ESORICS","volume":"5283","author":"Bogdanov Dan","year":"2008","unstructured":"Dan Bogdanov, Sven Laur, and Jan Willemson. 2008. Sharemind: A Framework for Fast Privacy-Preserving Computations. In 13th European Symposium on Research in Computer Security, ESORICS 2008, Vol. 5283. Springer, 192--206."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of Machine Learning and Systems 2019","author":"Bonawitz Keith","year":"2019","unstructured":"Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Dzmitry Huba, Alex Ingerman, Vladimir Ivanov, Chlo\u00e9 Kiddon, Jakub Konecn\u00fd, Stefano Mazzocchi, Brendan McMahan, Timon Van Overveldt, David Petrou, Daniel Ramage, and Jason Roselander. 2019. Towards Federated Learning at Scale: System Design. In Proceedings of Machine Learning and Systems 2019, MLSys 2019. mlsys.org."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"e_1_3_2_1_11_1","volume-title":"Homomorphic Encryption for Arithmetic of Approximate Numbers. In 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT","volume":"10624","author":"Cheon Jung Hee","year":"2017","unstructured":"Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song. 2017. Homomorphic Encryption for Arithmetic of Approximate Numbers. In 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, Vol. 10624. Springer, 409--437."},{"key":"e_1_3_2_1_12_1","volume-title":"ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium, NDSS","author":"Demmler Daniel","year":"2015","unstructured":"Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015. The Internet Society."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"},{"key":"e_1_3_2_1_14_1","first-page":"144","article-title":"Somewhat Practical Fully Homomorphic Encryption","volume":"2012","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2012 (2012), 144.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_15_1","volume-title":"A Survey of Homomorphic Encryption for Nonspecialists. EURASIP J. Inf. Secur. 2007","author":"Fontaine Caroline","year":"2007","unstructured":"Caroline Fontaine and Fabien Galand. 2007. A Survey of Homomorphic Encryption for Nonspecialists. EURASIP J. Inf. Secur. 2007 (2007)."},{"key":"e_1_3_2_1_16_1","volume-title":"Efficient Private Matching and Set Intersection. In International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT","volume":"3027","author":"Freedman Michael J.","year":"2004","unstructured":"Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. 2004. Efficient Private Matching and Set Intersection. In International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2004, Vol. 3027. Springer, 1--19."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020","volume":"119","author":"Fu Fangcheng","year":"2020","unstructured":"Fangcheng Fu, Yuzheng Hu, Yihan He, Jiawei Jiang, Yingxia Shao, Ce Zhang, and Bin Cui. 2020. Don't Waste Your Bits! Squeeze Activations and Gradients for Deep Neural Networks via TinyScript. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, Vol. 119. PMLR, 3304--3314."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342273"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457241"},{"key":"e_1_3_2_1_20_1","volume-title":"Annual Conference on Neural Information Processing Systems 2020","author":"Geiping Jonas","year":"2020","unstructured":"Jonas Geiping, Hartmut Bauermeister, Hannah Dr\u00f6ge, and Michael Moeller. 2020. Inverting Gradients - How easy is it to break privacy in federated learning?. In Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 33nd International Conference on Machine Learning, ICML 2016","volume":"48","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, Vol. 48. JMLR.org, 201--210."},{"key":"e_1_3_2_1_23_1","volume-title":"The Foundations of Cryptography - Volume 2: Basic Applications","author":"Goldreich Oded","unstructured":"Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2: Basic Applications. Cambridge University Press."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994695"},{"key":"e_1_3_2_1_25_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. CoRR abs\/1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. CoRR abs\/1711.10677 (2017). arXiv:1711.10677"},{"key":"e_1_3_2_1_26_1","volume-title":"CryptoDL: Deep Neural Networks over Encrypted Data. CoRR abs\/1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. CryptoDL: Deep Neural Networks over Encrypted Data. CoRR abs\/1711.05189 (2017). arXiv:1711.05189"},{"key":"e_1_3_2_1_27_1","volume-title":"Membership Inference Attacks on Machine Learning: A Survey. CoRR abs\/2103.07853","author":"Hu Hongsheng","year":"2021","unstructured":"Hongsheng Hu, Zoran Salcic, Gillian Dobbie, and Xuyun Zhang. 2021. Membership Inference Attacks on Machine Learning: A Survey. CoRR abs\/2103.07853 (2021). arXiv:2103.07853"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330765"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/3446095.3446106"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196892"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196894"},{"key":"e_1_3_2_1_32_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_3_2_1_33_1","volume-title":"Federated Optimization: Distributed Machine Learning for On-Device Intelligence. CoRR abs\/1610.02527","author":"Jakub","year":"2016","unstructured":"Jakub Kone?n\u00fd, H. Brendan McMahan, Daniel Ramage, and Peter Richt\u00e1rik. 2016. Federated Optimization: Distributed Machine Learning for On-Device Intelligence. CoRR abs\/1610.02527 (2016). arXiv:1610.02527"},{"key":"e_1_3_2_1_34_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Jakub","year":"2016","unstructured":"Jakub Kone?n\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated Learning: Strategies for Improving Communication Efficiency. CoRR abs\/1610.05492 (2016). arXiv:1610.05492"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359639"},{"key":"e_1_3_2_1_36_1","volume-title":"Label Leakage and Protection in Two-party Split Learning. In International Conference on Learning Representations, ICLR","author":"Li Oscar","year":"2022","unstructured":"Oscar Li, Jiankai Sun, Xin Yang, Weihao Gao, Hongyi Zhang, Junyuan Xie, Virginia Smith, and Chong Wang. 2022. Label Leakage and Protection in Two-party Split Learning. In International Conference on Learning Representations, ICLR 2022."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of Machine Learning and Systems 2020","author":"Li Tian","year":"2020","unstructured":"Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith. 2020. Federated Optimization in Heterogeneous Networks. In Proceedings of Machine Learning and Systems 2020, MLSys 2020. mlsys.org."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467061"},{"key":"e_1_3_2_1_40_1","volume-title":"Privacy-Preserving Inter-database Operations. In Second Symposium on Intelligence and Security Informatics, ISI","volume":"3073","author":"Liang Gang","year":"2004","unstructured":"Gang Liang and Sudarshan S. Chawathe. 2004. Privacy-Preserving Inter-database Operations. In Second Symposium on Intelligence and Security Informatics, ISI 2004, Vol. 3073. Springer, 66--82."},{"key":"e_1_3_2_1_41_1","volume-title":"Tutorials on the Foundations of Cryptography","author":"Lindell Yehuda","unstructured":"Yehuda Lindell. 2017. How to Simulate It - A Tutorial on the Simulation Proof Technique. In Tutorials on the Foundations of Cryptography. Springer International Publishing, 277--346."},{"key":"e_1_3_2_1_42_1","volume-title":"Asymmetrical Vertical Federated Learning. CoRR abs\/2004.07427","author":"Liu Yang","year":"2020","unstructured":"Yang Liu, Xiong Zhang, and Libin Wang. 2020. Asymmetrical Vertical Federated Learning. CoRR abs\/2004.07427 (2020). arXiv:2004.07427"},{"key":"e_1_3_2_1_43_1","volume-title":"Smart, and Frederik Vercauteren","author":"Makri Eleftheria","year":"2019","unstructured":"Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, and Frederik Vercauteren. 2019. EPIC: Efficient Private Image Classification (or: Learning from the Masters). In The Cryptographers' Track at the RSA Conference 2019, CT-RSA 2019, Vol. 11405. Springer, 473--492."},{"key":"e_1_3_2_1_44_1","volume-title":"The Second Workshop on Hardware and Architectural Support for Security and Privacy, HASP","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R. Savagaonkar. 2013. Innovative instructions and software model for isolated execution. In The Second Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013. ACM, 10."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017","volume":"54","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, Vol. 54. PMLR, 1273--1282."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452773"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14778\/3489496.3489511"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_49_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP","author":"Mohassel Payman","year":"2017","unstructured":"Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP 2017. IEEE Computer Society, 19--38."},{"key":"e_1_3_2_1_50_1","unstructured":"Maxim Naumov Dheevatsa Mudigere Hao-Jun Michael Shi Jianyu Huang Narayanan Sundaraman Jongsoo Park Xiaodong Wang Udit Gupta Carole-Jean Wu Alisson G. Azzolini Dmytro Dzhulgakov Andrey Mallevich Ilia Cherniavskii Yinghai Lu Raghuraman Krishnamoorthi Ansha Yu Volodymyr Kondratenko Stephanie Pereira Xianjie Chen Wenlin Chen Vijay Rao Bill Jia Liang Xiong and Misha Smelyanskiy. 2019. Deep Learning Recommendation Model for Personalization and Recommendation Systems. CoRR abs\/1906.00091 (2019). arXiv:1906.00091"},{"key":"e_1_3_2_1_51_1","volume-title":"Dense-to-Sparse Gate for Mixture-of- Experts. CoRR abs\/2112.14397","author":"Nie Xiaonan","year":"2021","unstructured":"Xiaonan Nie, Shijie Cao, Xupeng Miao, Lingxiao Ma, Jilong Xue, Youshan Miao, Zichao Yang, Zhi Yang, and Bin Cui. 2021. Dense-to-Sparse Gate for Mixture-of- Experts. CoRR abs\/2112.14397 (2021). arXiv:2112.14397"},{"key":"e_1_3_2_1_52_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium, USENIX Security 16","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium, USENIX Security 16. USENIX Association, 619--636."},{"key":"e_1_3_2_1_53_1","volume-title":"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT","volume":"1592","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 1999, Vol. 1592. Springer, 223--238."},{"key":"e_1_3_2_1_54_1","volume-title":"31st Annual Cryptology Conference, CRYPTO","volume":"6841","author":"Pueyo Ignacio Cascudo","year":"2011","unstructured":"Ignacio Cascudo Pueyo, Ronald Cramer, and Chaoping Xing. 2011. The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing. In 31st Annual Cryptology Conference, CRYPTO 2011, Vol. 6841. Springer, 685--705."},{"key":"e_1_3_2_1_55_1","unstructured":"Pille Pullonen et al. 2013. Actively secure two-party computation: Efficient Beaver triple generation. Instructor (2013)."},{"key":"e_1_3_2_1_56_1","unstructured":"Ronald L Rivest Len Adleman Michael L Dertouzos et al. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4 11 (1978) 169--180."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_59_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP 2017. IEEE Computer Society, 3--18."},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007. ACM, 1431--1432","author":"Sion Radu","year":"2007","unstructured":"Radu Sion. 2007. Secure Data Outsourcing. In Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007. ACM, 1431--1432."},{"key":"e_1_3_2_1_61_1","volume-title":"Vertical Federated Learning without Revealing Intersection Membership. CoRR abs\/2106.05508","author":"Sun Jiankai","year":"2021","unstructured":"Jiankai Sun, Xin Yang, Yuanshun Yao, Aonan Zhang, Weihao Gao, Junyuan Xie, and Chong Wang. 2021. Vertical Federated Learning without Revealing Intersection Membership. CoRR abs\/2106.05508 (2021). arXiv:2106.05508"},{"key":"e_1_3_2_1_62_1","volume-title":"Mahawaga Arachchige Pathum Chamikara, and Seyit Camtepe","author":"Thapa Chandra","year":"2020","unstructured":"Chandra Thapa, Mahawaga Arachchige Pathum Chamikara, and Seyit Camtepe. 2020. SplitFed: When Federated Learning Meets Split Learning. CoRR abs\/2004.12088 (2020). arXiv:2004.12088"},{"key":"e_1_3_2_1_63_1","volume-title":"SEALion: a Framework for Neural Network Inference on Encrypted Data. CoRR abs\/1904.12840","author":"van Elsloo Tim","year":"2019","unstructured":"Tim van Elsloo, Giorgio Patrini, and Hamish Ivey-Law. 2019. SEALion: a Framework for Neural Network Inference on Encrypted Data. CoRR abs\/1904.12840 (2019). arXiv:1904.12840"},{"key":"e_1_3_2_1_64_1","volume-title":"Split learning for health: Distributed deep learning without sharing raw patient data. CoRR abs\/1812.00564","author":"Vepakomma Praneeth","year":"2018","unstructured":"Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. 2018. Split learning for health: Distributed deep learning without sharing raw patient data. CoRR abs\/1812.00564 (2018). arXiv:1812.00564"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"e_1_3_2_1_66_1","first-page":"442","article-title":"SecureNN: Efficient and Private Neural Network Training","volume":"2018","author":"Wagh Sameer","year":"2018","unstructured":"Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2018. SecureNN: Efficient and Private Neural Network Training. IACR Cryptol. ePrint Arch. 2018 (2018), 442.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_69_1","volume-title":"Vertical Federated Learning: Challenges, Methodologies and Experiments. CoRR abs\/2202.04309","author":"Wei Kang","year":"2022","unstructured":"Kang Wei, Jun Li, Chuan Ma, Ming Ding, Sha Wei, Fan Wu, Guihai Chen, and Thilina Ranbaduge. 2022. Vertical Federated Learning: Challenges, Methodologies and Experiments. CoRR abs\/2202.04309 (2022). arXiv:2202.04309"},{"key":"e_1_3_2_1_70_1","volume-title":"Unbalanced sharing: a threshold implementation of SM4. Sci. China Inf. Sci. 64, 5","author":"Wei Man","year":"2021","unstructured":"Man Wei, Siwei Sun, Zihao Wei, and Lei Hu. 2021. Unbalanced sharing: a threshold implementation of SM4. Sci. China Inf. Sci. 64, 5 (2021)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407811"},{"key":"e_1_3_2_1_72_1","volume-title":"Contrastive Learning for Sequential Recommendation. CoRR abs\/2010.14395","author":"Xie Xu","year":"2020","unstructured":"Xu Xie, Fei Sun, Zhaoyang Liu, Shiwen Wu, Jinyang Gao, Bolin Ding, and Bin Cui. 2020. Contrastive Learning for Sequential Recommendation. CoRR abs\/2010.14395 (2020). arXiv:2010.14395"},{"key":"e_1_3_2_1_73_1","volume-title":"Explore User Neighborhood for Real-time E-commerce Recommendation. In 37th IEEE International Conference on Data Engineering, ICDE","author":"Xie Xu","year":"2021","unstructured":"Xu Xie, Fei Sun, Xiaoyong Yang, Zhao Yang, Jinyang Gao, Wenwu Ou, and Bin Cui. 2021. Explore User Neighborhood for Real-time E-commerce Recommendation. In 37th IEEE International Conference on Data Engineering, ICDE 2021. IEEE, 2464--2475."},{"key":"e_1_3_2_1_74_1","article-title":"Federated Machine Learning","volume":"10","author":"Yang Qiang","year":"2019","unstructured":"Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated Machine Learning: Concept and Applications. ACM Trans. Intell. Syst. Technol. 10, 2 (2019), 12:1--12:19.","journal-title":"Concept and Applications. ACM Trans. Intell. Syst. Technol."},{"key":"e_1_3_2_1_75_1","volume-title":"Parallel Distributed Logistic Regression for Vertical Federated Learning without Third-Party Coordinator. CoRR abs\/1911.09824","author":"Yang Shengwen","year":"2019","unstructured":"Shengwen Yang, Bing Ren, Xuhui Zhou, and Liping Liu. 2019. Parallel Distributed Logistic Regression for Vertical Federated Learning without Third-Party Coordinator. CoRR abs\/1911.09824 (2019). arXiv:1911.09824"},{"key":"e_1_3_2_1_76_1","volume-title":"23rd Annual Symposium on Foundations of Computer Science, FOCS","author":"Chi-Chih Yao Andrew","year":"1982","unstructured":"Andrew Chi-Chih Yao. 1982. Protocols for Secure Computations (Extended Abstract). In 23rd Annual Symposium on Foundations of Computer Science, FOCS 1982. IEEE Computer Society, 160--164."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.18"},{"key":"e_1_3_2_1_78_1","volume-title":"Secure Bilevel Asynchronous Vertical Federated Learning with Backward Updating. In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI","author":"Zhang Qingsong","year":"2021","unstructured":"Qingsong Zhang, Bin Gu, Cheng Deng, and Heng Huang. 2021. Secure Bilevel Asynchronous Vertical Federated Learning with Backward Updating. In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021. AAAI Press, 10896--10904."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-018-9944-x"},{"key":"e_1_3_2_1_80_1","volume-title":"PaSca: a Graph Neural Architecture Search Sys- tem under the Scalable Paradigm. CoRR abs\/2203.00638","author":"Zhang Wentao","year":"2022","unstructured":"Wentao Zhang, Yu Shen, Zheyu Lin, Yang Li, Xiaosen Li, Wen Ouyang, Yangyu Tao, Zhi Yang, and Bin Cui. 2022. PaSca: a Graph Neural Architecture Search Sys- tem under the Scalable Paradigm. CoRR abs\/2203.00638 (2022). arXiv:2203.00638"},{"key":"e_1_3_2_1_81_1","volume-title":"Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning. CoRR abs\/2007.06849","author":"Zhang Yifei","year":"2020","unstructured":"Yifei Zhang and Hao Zhu. 2020. Additively Homomorphical Encryption based Deep Neural Network for Asymmetrically Collaborative Machine Learning. CoRR abs\/2007.06849 (2020). arXiv:2007.06849"},{"key":"e_1_3_2_1_82_1","volume-title":"Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI","author":"Zheng Wenting","year":"2017","unstructured":"Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017. USENIX Association, 283--298."},{"key":"e_1_3_2_1_83_1","volume-title":"Annual Conference on Neural Information Processing Systems 2019","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep Leakage from Gradients. In Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019. 14747--14756."}],"event":{"name":"SIGMOD\/PODS '22: International Conference on Management of Data","location":"Philadelphia PA USA","acronym":"SIGMOD\/PODS '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2022 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514221.3526127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514221.3526127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:07Z","timestamp":1750183807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514221.3526127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,10]]},"references-count":83,"alternative-id":["10.1145\/3514221.3526127","10.1145\/3514221"],"URL":"https:\/\/doi.org\/10.1145\/3514221.3526127","relation":{},"subject":[],"published":{"date-parts":[[2022,6,10]]},"assertion":[{"value":"2022-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}