{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:15:16Z","timestamp":1768515316347,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1261, 16KISA050K"],"award-info":[{"award-number":["16KIS1261, 16KISA050K"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union ? NextGenerationEU"},{"name":"Bundesministerium f\u00fcr Wirtschaft und Klimaschutz","award":["03EWR007P2"],"award-info":[{"award-number":["03EWR007P2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690301","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"288-302","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["S-BDT: Distributed Differentially Private Boosted Decision Trees"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9720-7263","authenticated-orcid":false,"given":"Thorsten","family":"Peinemann","sequence":"first","affiliation":[{"name":"Universit\u00e4t zu L\u00fcbeck, L\u00fcbeck, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8138-7208","authenticated-orcid":false,"given":"Moritz","family":"Kirschte","sequence":"additional","affiliation":[{"name":"Universit\u00e4t zu L\u00fcbeck, L\u00fcbeck, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3940-2229","authenticated-orcid":false,"given":"Joshua","family":"Stock","sequence":"additional","affiliation":[{"name":"University of Hamburg, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8167-2284","authenticated-orcid":false,"given":"Carlos","family":"Cotrini","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2799-8128","authenticated-orcid":false,"given":"Esfandiar","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"Universit\u00e4t zu L\u00fcbeck, L\u00fcbeck, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.331.7521.903"},{"key":"e_1_3_2_1_3_1","volume-title":"Advances in Neural Information Processing Systems","volume":"31","author":"Balle Borja","year":"2018","unstructured":"Borja Balle, Gilles Barthe, and Marco Gaboardi. 2018. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences. In Advances in Neural Information Processing Systems, Vol. 31. Curran Associates, Inc."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"2506","author":"Balle Borja","year":"2020","unstructured":"Borja Balle, Gilles Barthe, Marco Gaboardi, Justin Hsu, and Tetsuya Sato. 2020. Hypothesis Testing Interpretations and Renyi Differential Privacy. In Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 108). PMLR, 2496--2506."},{"key":"e_1_3_2_1_5_1","unstructured":"Barry Becker and Ronny Kohavi. 1996. Adult. UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/dataset\/2\/adult"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"e_1_3_2_1_7_1","volume-title":"Differentially- and non-differentially-private random decision trees. preprint arXiv:1410.6973","author":"Bojarski Mariusz","year":"2014","unstructured":"Mariusz Bojarski, Anna Choromanska, Krzysztof Choromanski, and Yann LeCun. 2014. Differentially- and non-differentially-private random decision trees. preprint arXiv:1410.6973 (2014)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_9_1","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Canonne Cl\u00e9ment L","year":"2020","unstructured":"Cl\u00e9ment L Canonne, Gautam Kamath, and Thomas Steinke. 2020. The Discrete Gaussian for Differential Privacy. In Advances in Neural Information Processing Systems, Vol. 33. Curran Associates, Inc., 15676--15688."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243750"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_12_1","volume-title":"TCC 2006 (Lecture Notes in Computer Science","volume":"284","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, TCC 2006 (Lecture Notes in Computer Science, Vol. 3876). Springer, Berlin, Heidelberg, 265--284."},{"key":"e_1_3_2_1_13_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci., Vol. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_14_1","volume-title":"Advances in Neural Information Processing Systems","volume":"34","author":"Feldman Vitaly","year":"2021","unstructured":"Vitaly Feldman and Tijana Zrnic. 2021. Individual Privacy Accounting via a R\u00e9nyi Filter. In Advances in Neural Information Processing Systems, Vol. 34. Curran Associates, Inc., 28080--28091."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.01.034"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_17_1","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman Jerome H","year":"2001","unstructured":"Jerome H Friedman. 2001. Greedy function approximation: a gradient boosting machine. Annals of statistics (2001), 1189--1232."},{"key":"e_1_3_2_1_18_1","unstructured":"Mark Hopkins Erik Reeber George Forman and Jaap Suermondt. 1999. Spambase. UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/dataset\/94\/spambase"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3657024"},{"key":"e_1_3_2_1_20_1","volume-title":"Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Lu Wen","year":"2023","unstructured":"Wen jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, and Cheng Hong. 2023. Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 6435--6451."},{"key":"e_1_3_2_1_21_1","volume-title":"Individual Privacy Accounting with Gaussian Differential Privacy. In The Eleventh International Conference on Learning Representations, ICLR.","author":"Koskela Antti","year":"2023","unstructured":"Antti Koskela, Marlon Tobaben, and Antti Honkela. 2023. Individual Privacy Accounting with Gaussian Differential Privacy. In The Eleventh International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414474"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5422"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560687"},{"key":"e_1_3_2_1_25_1","volume-title":"Learning Differentially Private Recurrent Language Models. In International Conference on Learning Representations.","author":"McMahan H. Brendan","year":"2018","unstructured":"H. Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2018. Learning Differentially Private Recurrent Language Models. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_26_1","volume-title":"R\u00e9nyi Differential Privacy. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF). 263--275","author":"Mironov Ilya","year":"2017","unstructured":"Ilya Mironov. 2017. R\u00e9nyi Differential Privacy. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF). 263--275."},{"key":"e_1_3_2_1_27_1","unstructured":"Warwick Nash Tracy Sellers Simon Talbot Andrew Cawthorn and Wes Ford. 1995. Abalone. UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/dataset\/1\/abalone"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"8237","author":"Nori Harsha","year":"2021","unstructured":"Harsha Nori, Rich Caruana, Zhiqi Bu, Judy Hanwen Shen, and Janardhan Kulkarni. 2021. Accuracy, Interpretability, and Differential Privacy via Explainable Boosting. In Proceedings of the 38th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 139). PMLR, 8227--8237."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the fourth Berkeley symposium on mathematical statistics and probability","volume":"4","author":"R\u00e9nyi Alfr\u00e9d","year":"1961","unstructured":"Alfr\u00e9d R\u00e9nyi. 1961. On measures of entropy and information. In Proceedings of the fourth Berkeley symposium on mathematical statistics and probability, volume 1: contributions to the theory of statistics, Vol. 4. University of California Press, 547--562."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2023","author":"Sabater C\u00e9sar","year":"2022","unstructured":"C\u00e9sar Sabater, Florian Hahn, Andreas Peter, and Jan Ramon. 2022. Private Sampling with Identifiable Cheaters. Proceedings on Privacy Enhancing Technologies, Vol. 2023 (01 2022)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0029"},{"key":"e_1_3_2_1_32_1","volume-title":"FEVERLESS: Fast and Secure Vertical Federated Learning based on XGBoost for Decentralized Labels","author":"Wang Rui","year":"2022","unstructured":"Rui Wang, Oguzhan Ersoy, Hangyu Zhu, Yaochu Jin, and Kaitai Liang. 2022. FEVERLESS: Fast and Secure Vertical Federated Learning based on XGBoost for Decentralized Labels. IEEE Transactions on Big Data (2022), 1--15."},{"key":"e_1_3_2_1_33_1","volume-title":"Individual Privacy Accounting for Differentially Private Stochastic Gradient Descent. Transactions on Machine Learning Research","author":"Yu Da","year":"2023","unstructured":"Da Yu, Gautam Kamath, Janardhan Kulkarni, Tie-Yan Liu, Jian Yin, and Huishuai Zhang. 2023. Individual Privacy Accounting for Differentially Private Stochastic Gradient Descent. Transactions on Machine Learning Research (2023)."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning","volume":"97","author":"Zhu Yuqing","year":"2019","unstructured":"Yuqing Zhu and Yu-Xiang Wang. 2019. Poisson Subsampled R\u00e9nyi Differential Privacy. In Proceedings of the 36th International Conference on Machine Learning, Vol. 97. PMLR, 7634--7642."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690301","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:13:42Z","timestamp":1755843222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":34,"alternative-id":["10.1145\/3658644.3690301","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690301","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}