{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:46:05Z","timestamp":1752101165059,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Research and Development Program of Guangdong Province","award":["2021B0101400003"],"award-info":[{"award-number":["2021B0101400003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,23]]},"DOI":"10.1145\/3531536.3532960","type":"proceedings-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T22:18:44Z","timestamp":1656022724000},"page":"123-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Nearest Neighbor Under-sampling Strategy for Vertical Federated Learning in Financial Domain"],"prefix":"10.1145","author":[{"given":"Denghao","family":"Li","sequence":"first","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., Shenzhen, China"}]},{"given":"Jianzong","family":"Wang","sequence":"additional","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., Shenzhen, China"}]},{"given":"Lingwei","family":"Kong","sequence":"additional","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., Shenzhen, China"}]},{"given":"Shijing","family":"Si","sequence":"additional","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., Shenzhen, China"}]},{"given":"Zhangcheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., Shenzhen, China"}]},{"given":"Chenyu","family":"Huang","sequence":"additional","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., Shenzhen, China"}]},{"given":"Jing","family":"Xiao","sequence":"additional","affiliation":[{"name":"Ping An Technology (Shenzhen) Co., Ltd., Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2022,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A review of applications in federated learning. Computers & Industrial Engineering, page 106854","author":"Li Li","year":"2020","unstructured":"Li Li , Yuxi Fan , Mike Tse , and Kuo-Yi Lin . A review of applications in federated learning. Computers & Industrial Engineering, page 106854 , 2020 . Li Li, Yuxi Fan, Mike Tse, and Kuo-Yi Lin. A review of applications in federated learning. Computers & Industrial Engineering, page 106854, 2020."},{"key":"e_1_3_2_1_2_1","volume-title":"Falcon: Honest-majority maliciously secure framework for private deep learning. arXiv preprint arXiv:2004.02229","author":"Wagh Sameer","year":"2020","unstructured":"Sameer Wagh , Shruti Tople , Fabrice Benhamouda , Eyal Kushilevitz , Prateek Mittal , and Tal Rabin . Falcon: Honest-majority maliciously secure framework for private deep learning. arXiv preprint arXiv:2004.02229 , 2020 . Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. Falcon: Honest-majority maliciously secure framework for private deep learning. arXiv preprint arXiv:2004.02229, 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"The future of digital health with federated learning. NPJ digital medicine, 3(1):1--7","author":"Rieke Nicola","year":"2020","unstructured":"Nicola Rieke , Jonny Hancox , Wenqi Li , Fausto Milletari , Holger R Roth , Shadi Albarqouni , Spyridon Bakas , Mathieu N Galtier , Bennett A Landman , Klaus Maier-Hein , The future of digital health with federated learning. NPJ digital medicine, 3(1):1--7 , 2020 . Nicola Rieke, Jonny Hancox, Wenqi Li, Fausto Milletari, Holger R Roth, Shadi Albarqouni, Spyridon Bakas, Mathieu N Galtier, Bennett A Landman, Klaus Maier-Hein, et al. The future of digital health with federated learning. NPJ digital medicine, 3(1):1--7, 2020."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69250-1"},{"key":"e_1_3_2_1_5_1","first-page":"493","volume-title":"Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning. In 2020 $$USENIX$$ Annual Technical Conference ($$USENIX$$ $$ATC$$ 20)","author":"Zhang Chengliang","year":"2020","unstructured":"Chengliang Zhang , Suyi Li , Junzhe Xia , Wei Wang , Feng Yan , and Yang Liu . Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning. In 2020 $$USENIX$$ Annual Technical Conference ($$USENIX$$ $$ATC$$ 20) , pages 493 -- 506 , 2020 . Chengliang Zhang, Suyi Li, Junzhe Xia, Wei Wang, Feng Yan, and Yang Liu. Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning. In 2020 $$USENIX$$ Annual Technical Conference ($$USENIX$$ $$ATC$$ 20), pages 493--506, 2020."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2988575"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_8_1","volume-title":"Research review of federated learning algorithms. Big Data Research, 6(6)","author":"Wang Jianzong","year":"2020","unstructured":"Jianzong Wang , Lingwei Kong , Zhangcheng Huang , Linjie Chen , Yi Liu , Anxun He , and Jing Xiao . Research review of federated learning algorithms. Big Data Research, 6(6) , 2020 . Jianzong Wang, Lingwei Kong, Zhangcheng Huang, Linjie Chen, Yi Liu, Anxun He, and Jing Xiao. Research review of federated learning algorithms. Big Data Research, 6(6), 2020."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63833-7_46"},{"key":"e_1_3_2_1_10_1","first-page":"3","article-title":"Collaborative machine learning without centralized training data","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan and Daniel Ramage . Federated learning : Collaborative machine learning without centralized training data . Google Research Blog , 3 , 2017 . Brendan McMahan and Daniel Ramage. Federated learning: Collaborative machine learning without centralized training data. Google Research Blog, 3, 2017.","journal-title":"Google Research Blog"},{"key":"e_1_3_2_1_11_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Richard Nock , Giorgio Patrini , Guillaume Smith , and Brian Thorne . Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677 , 2017 . Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677, 2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488776"},{"key":"e_1_3_2_1_13_1","first-page":"10165","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"35","author":"Wang Lixu","year":"2021","unstructured":"Lixu Wang , Shichao Xu , Xiao Wang , and Qi Zhu . Addressing class imbalance in federated learning . In Proceedings of the AAAI Conference on Artificial Intelligence , volume 35 , pages 10165 -- 10173 , 2021 . Lixu Wang, Shichao Xu, Xiao Wang, and Qi Zhu. Addressing class imbalance in federated learning. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 35, pages 10165--10173, 2021."},{"key":"e_1_3_2_1_14_1","volume-title":"Towards class imbalance in federated learning. arXiv preprint arXiv:2008.06217","author":"Wang Lixu","year":"2020","unstructured":"Lixu Wang , Shichao Xu , Xiao Wang , and Qi Zhu . Towards class imbalance in federated learning. arXiv preprint arXiv:2008.06217 , 2020 . Lixu Wang, Shichao Xu, Xiao Wang, and Qi Zhu. Towards class imbalance in federated learning. arXiv preprint arXiv:2008.06217, 2020."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3009406"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITSI50517.2020.9264958"},{"key":"e_1_3_2_1_17_1","first-page":"179","volume-title":"Icml","volume":"97","author":"Kubat Miroslav","year":"1997","unstructured":"Miroslav Kubat , Stan Matwin , Addressing the curse of imbalanced training sets: one-sided selection . In Icml , volume 97 , pages 179 -- 186 . Citeseer , 1997 . Miroslav Kubat, Stan Matwin, et al. Addressing the curse of imbalanced training sets: one-sided selection. In Icml, volume 97, pages 179--186. Citeseer, 1997."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of workshop on learning from imbalanced datasets","volume":"126","author":"Mani Inderjeet","year":"2003","unstructured":"Inderjeet Mani and I Zhang . knn approach to unbalanced data distributions: a case study involving information extraction . In Proceedings of workshop on learning from imbalanced datasets , volume 126 . ICML United States , 2003 . Inderjeet Mani and I Zhang. knn approach to unbalanced data distributions: a case study involving information extraction. In Proceedings of workshop on learning from imbalanced datasets, volume 126. ICML United States, 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-013-5422-z"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/e22121339"},{"key":"e_1_3_2_1_22_1","article-title":"A method of obtaining digital signature and public key systems","author":"Rivest R.","year":"1978","unstructured":"R. Rivest , A. Shamir , and L. Adleman . A method of obtaining digital signature and public key systems . IEEE Trans.inf.theory , 1978 . R. Rivest, A. Shamir, and L. Adleman. A method of obtaining digital signature and public key systems. IEEE Trans.inf.theory, 1978.","journal-title":"IEEE Trans.inf.theory"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_18"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"e_1_3_2_1_25_1","volume-title":"Scalable private set intersection based on OT extension. ACM Transactions on Privacy and Security (TOPS), 21(2):1--35","author":"Pinkas Benny","year":"2018","unstructured":"Benny Pinkas , Thomas Schneider , and Michael Zohner . Scalable private set intersection based on OT extension. ACM Transactions on Privacy and Security (TOPS), 21(2):1--35 , 2018 . Benny Pinkas, Thomas Schneider, and Michael Zohner. Scalable private set intersection based on OT extension. ACM Transactions on Privacy and Security (TOPS), 21(2):1--35, 2018."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.03.001"},{"key":"e_1_3_2_1_27_1","volume-title":"Health insurance cross sell prediction. https:\/\/www.kaggle.com\/anmolkumar\/health-insurance-cross-sell-prediction","author":"Kumar Anmol","year":"2020","unstructured":"Anmol Kumar . Health insurance cross sell prediction. https:\/\/www.kaggle.com\/anmolkumar\/health-insurance-cross-sell-prediction , 2020 . Anmol Kumar. Health insurance cross sell prediction. https:\/\/www.kaggle.com\/anmolkumar\/health-insurance-cross-sell-prediction, 2020."}],"event":{"name":"IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Santa Barbara CA USA","acronym":"IH&MMSec '22"},"container-title":["Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531536.3532960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531536.3532960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:22Z","timestamp":1750183762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531536.3532960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":26,"alternative-id":["10.1145\/3531536.3532960","10.1145\/3531536"],"URL":"https:\/\/doi.org\/10.1145\/3531536.3532960","relation":{},"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"2022-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}