{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:32:30Z","timestamp":1771698750632,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018AAA0101100"],"award-info":[{"award-number":["2018AAA0101100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSFC","award":["61972008"],"award-info":[{"award-number":["61972008"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2021B0101400001"],"award-info":[{"award-number":["2021B0101400001"]}]},{"name":"Hong Kong RGC TRS","award":["T41-603\/20R"],"award-info":[{"award-number":["T41-603\/20R"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539402","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"46-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Practical Lossless Federated Singular Vector Decomposition over Billion-Scale Data"],"prefix":"10.1145","author":[{"given":"Di","family":"Chai","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Leye","family":"Wang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Junxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Liu","family":"Yang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Shuowei","family":"Cai","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Roksana Boreli, and Shlomo Berkovsky.","author":"Berlioz Arnaud","year":"2015","unstructured":"Arnaud Berlioz, Arik Friedman, Mohamed Ali K\u00e2afar, Roksana Boreli, and Shlomo Berkovsky. 2015. Applying Differential Privacy to Matrix Factorization. In RecSys. ACM, 107--114."},{"key":"e_1_3_2_2_2_1","unstructured":"Aditya Bhaskara and Maheshakya Wijewardena. 2019. On Distributed Averaging for Stochastic k-PCA. In NeurIPS. 11024--11033."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Kallista A. Bonawitz Vladimir Ivanov Ben Kreuter Antonio Marcedone H. Brendan McMahan Sarvar Patel Daniel Ramage Aaron Segal and Karn Seth. 2017. Practical Secure Aggregation for Privacy-Preserving Machine Learning. In CCS. ACM 1175--1191.","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_2_2_5_1","first-page":"772","article-title":"Reorthogonalization and stable algorithms for updating the Gram-Schmidt QR factorization","volume":"30","author":"Daniel James W","year":"1976","unstructured":"James W Daniel, Walter Bill Gragg, Linda Kaufman, and Gilbert W Stewart. 1976. Reorthogonalization and stable algorithms for updating the Gram-Schmidt QR factorization. Math. Comp. 30, 136 (1976), 772--795.","journal-title":"Math. Comp."},{"key":"e_1_3_2_2_6_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2911282"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440380105"},{"key":"e_1_3_2_2_9_1","unstructured":"Andreas Grammenos Rodrigo Mendoza-Smith Jon Crowcroft and Cecilia Mascolo. 2020. Federated Principal Component Analysis. In NeurIPS."},{"key":"e_1_3_2_2_10_1","volume-title":"Matrix variate distributions","author":"Gupta Arjun K","unstructured":"Arjun K Gupta and Daya K Nagar. 2018. Matrix variate distributions. Vol. 104. CRC Press."},{"key":"e_1_3_2_2_11_1","volume-title":"Wee Keong Ng, and Philip S. Yu","author":"Han Shuguo","year":"2009","unstructured":"Shuguo Han, Wee Keong Ng, and Philip S. Yu. 2009. Privacy-Preserving Singular Value Decomposition. In ICDE. IEEE Computer Society, 1267--1270."},{"key":"e_1_3_2_2_12_1","article-title":"The MovieLens Datasets","volume":"5","author":"Maxwell Harper F.","year":"2016","unstructured":"F. Maxwell Harper and Joseph A. Konstan. 2016. The MovieLens Datasets: History and Context. ACM Trans. Interact. Intell. Syst. 5, 4 (2016), 19:1--19:19.","journal-title":"History and Context. ACM Trans. Interact. Intell. Syst."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2007.04.001"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_15_1","volume-title":"Insecurity and Hardness of Nearest Neighbor Queries Over Encrypted Data","author":"Li Rui","unstructured":"Rui Li, Alex X. Liu, Ying Liu, Huanle Xu, and Huaqiang Yuan. 2019. Insecurity and Hardness of Nearest Neighbor Queries Over Encrypted Data. In ICDE. IEEE, 1614--1617."},{"key":"e_1_3_2_2_16_1","volume-title":"ICICS (Lecture Notes in Computer Science","volume":"721","author":"Liu Bowen","year":"2019","unstructured":"Bowen Liu and Qiang Tang. 2019. Privacy-Preserving Decentralised Singular Value Decomposition. In ICICS (Lecture Notes in Computer Science, Vol. 11999). Springer, 703--721."},{"key":"e_1_3_2_2_17_1","article-title":"FATE: An Industrial Grade Platform for Collaborative Learning With Data Protection","volume":"22","author":"Liu Yang","year":"2021","unstructured":"Yang Liu, Tao Fan, Tianjian Chen, Qian Xu, and Qiang Yang. 2021. FATE: An Industrial Grade Platform for Collaborative Learning With Data Protection. J. Mach. Learn. Res. 22 (2021), 226:1--226:6.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_2_18_1","first-page":"796","article-title":"SecFact: Secure Large-scale QR and LU Factorizations","volume":"7","author":"Luo Changqing","year":"2021","unstructured":"Changqing Luo, Kaijin Zhang, Sergio Salinas, and Pan Li. 2021. SecFact: Secure Large-scale QR and LU Factorizations. IEEE Trans. Big Data 7, 4 (2021), 796--807.","journal-title":"IEEE Trans. Big Data"},{"key":"e_1_3_2_2_19_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 19--38","author":"Mohassel Payman","year":"2017","unstructured":"Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 19--38."},{"key":"e_1_3_2_2_20_1","volume-title":"Principal components analysis corrects for stratification in genome-wide association studies. Nature genetics 38, 8","author":"Price Alkes L","year":"2006","unstructured":"Alkes L Price, Nick J Patterson, Robert M Plenge, Michael E Weinblatt, Nancy A Shadick, and David Reich. 2006. Principal components analysis corrects for stratification in genome-wide association studies. Nature genetics 38, 8 (2006), 904--909."},{"key":"e_1_3_2_2_21_1","volume-title":"Principal Component Analysis: Engineering Applications","author":"Sanguansat Parinya","unstructured":"Parinya Sanguansat. 2012. Principal Component Analysis: Engineering Applications. BoD--Books on Demand."},{"key":"e_1_3_2_2_22_1","volume-title":"2022 2022 IEEE Symposium on Security and Privacy (SP). 1135--1149","author":"Tian H.","unstructured":"H. Tian, C. Zeng, Z. Ren, D. Chai, J. Zhang, K. Chen, and Q. Yang. 2022. Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud. In 2022 2022 IEEE Symposium on Security and Privacy (SP). 1135--1149."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"e_1_3_2_2_24_1","volume-title":"TACC: A Full-stack Cloud Computing Infrastructure for Machine Learning Tasks. CoRR abs\/2110.01556","author":"Xu Kaiqiang","year":"2021","unstructured":"Kaiqiang Xu, Xinchen Wan, Hao Wang, Zhenghang Ren, Xudong Liao, Decang Sun, Chaoliang Zeng, and Kai Chen. 2021. TACC: A Full-stack Cloud Computing Infrastructure for Machine Learning Tasks. CoRR abs\/2110.01556 (2021)."},{"key":"e_1_3_2_2_25_1","series-title":"Lecture Notes in Computer Science","volume-title":"Federated Learning","author":"Yang Liu","unstructured":"Liu Yang, Ben Tan, VincentW. Zheng, Kai Chen, and Qiang Yang. 2020. Federated Recommendation Systems. In Federated Learning. Lecture Notes in Computer Science, Vol. 12500. Springer, 225--239."},{"key":"e_1_3_2_2_26_1","article-title":"Federated Machine Learning","volume":"10","author":"Yang Qiang","year":"2019","unstructured":"Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated Machine Learning: Concept and Applications. ACM Trans. Intell. Syst. Technol. 10, 2 (2019), 12:1--12:19.","journal-title":"Concept and Applications. ACM Trans. Intell. Syst. Technol."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2947872"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:48Z","timestamp":1750186968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":27,"alternative-id":["10.1145\/3534678.3539402","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539402","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}