{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T14:33:21Z","timestamp":1777300401897,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","funder":[{"name":"Key Program of the National Natural Science Foundation of China","award":["U25B2028, 62432012"],"award-info":[{"award-number":["U25B2028, 62432012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3774904.3792105","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:54:34Z","timestamp":1775771674000},"page":"2547-2556","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SIsomap: Secure Collaborative Manifold Learning with Reducing Communication Costs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6944-6148","authenticated-orcid":false,"given":"Peizhao","family":"Zhou","sequence":"first","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5295-2781","authenticated-orcid":false,"given":"Xiaojie","family":"Guo","sequence":"additional","affiliation":[{"name":"Shanghai Qi Zhi Institute, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8227-8152","authenticated-orcid":false,"given":"Pinzhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4101-0793","authenticated-orcid":false,"given":"Ranyang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8569-3739","authenticated-orcid":false,"given":"Lihai","family":"Nie","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3678-8402","authenticated-orcid":false,"given":"Tong","family":"Li","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2984-2661","authenticated-orcid":false,"given":"Zheli","family":"Liu","sequence":"additional","affiliation":[{"name":"Nankai University, Tianjin, China"}]}],"member":"320","published-online":{"date-parts":[[2026,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17143-7_37"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_21"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_25"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560691"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623132"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_30"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36030-6_14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358922"},{"key":"e_1_3_2_1_11_1","first-page":"2111","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Chen Hao","year":"2020","unstructured":"Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, and M Sadegh Riazi. 2020. : Scaling up secure approximate neighbors search. In 29th USENIX Security Symposium (USENIX Security 20). 2111-2128."},{"key":"e_1_3_2_1_12_1","volume-title":"Robust kernel isomap. Pattern recognition","author":"Choi Heeyoul","year":"2007","unstructured":"Heeyoul Choi and Seungjin Choi. 2007. Robust kernel isomap. Pattern recognition, Vol. 40, 3 (2007), 853-862."},{"key":"e_1_3_2_1_13_1","unstructured":"Thomas H Cormen Charles E Leiserson Ronald L Rivest and Clifford Stein. 2022. Introduction to algorithms."},{"key":"e_1_3_2_1_14_1","volume-title":"Secure evaluation of quantized neural networks. arXiv preprint arXiv:1910.12435","author":"Dalskov Anders","year":"2019","unstructured":"Anders Dalskov, Daniel Escudero, and Marcel Keller. 2019. Secure evaluation of quantized neural networks. arXiv preprint arXiv:1910.12435 (2019)."},{"key":"e_1_3_2_1_15_1","first-page":"5395","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Faisal Muhammad","year":"2023","unstructured":"Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, and Mayank Varia. 2023. : A multi-party computation system for secure and expressive time series analytics. In 32nd USENIX Security Symposium (USENIX Security 23). 5395-5412."},{"key":"e_1_3_2_1_16_1","first-page":"7","volume-title":"2nd Conference on Information-Theoretic Cryptography (ITC","author":"Falk Brett Hemenway","year":"2021","unstructured":"Brett Hemenway Falk and Rafail Ostrovsky. 2021. Secure Merge with O (n log log n) Secure Operations. In 2nd Conference on Information-Theoretic Cryptography (ITC 2021). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik, 7-1."},{"key":"e_1_3_2_1_17_1","volume-title":"Ppca: Privacy-preserving principal component analysis using secure multiparty computation (mpc). arXiv preprint arXiv:2105.07612","author":"Fan Xiaoyu","year":"2021","unstructured":"Xiaoyu Fan, Guosai Wang, Kun Chen, Xu He, and Wei Xu. 2021. Ppca: Privacy-preserving principal component analysis using secure multiparty computation (mpc). arXiv preprint arXiv:2105.07612 (2021)."},{"key":"e_1_3_2_1_18_1","volume-title":"Foundations of cryptography","author":"Goldreich Oded","unstructured":"Oded Goldreich. 2009. Foundations of cryptography: volume 2, basic applications."},{"key":"e_1_3_2_1_19_1","first-page":"244","volume-title":"CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II 41","author":"Goyal Vipul","year":"2021","unstructured":"Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, and Yifan Song. 2021. ATLAS: efficient and scalable MPC in the honest majority setting. In Advances in Cryptology-CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part II 41. 244-274."},{"key":"e_1_3_2_1_20_1","volume-title":"Seoul","author":"Hamada Koki","year":"2013","unstructured":"Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, and Katsumi Takahashi. 2013. Practically efficient multi-party sorting protocols from comparison sort algorithms. In Information Security and Cryptology-ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers 15. 202-216."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00176"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-022-09423-5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3283104"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05206-2"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_18"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3337940"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670274"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/3698900.3699009"},{"key":"e_1_3_2_1_30_1","first-page":"6435","volume-title":"Squirrel: A Scalable Secure  Computation Framework for Training Gradient Boosting Decision Tree. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Huang Zhicong","year":"2023","unstructured":"Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, and Cheng Hong. 2023. Squirrel: A Scalable Secure Computation Framework for Training Gradient Boosting Decision Tree. In 32nd USENIX Security Symposium (USENIX Security 23). 6435-6451."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-040522-115238"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0080"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813705"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_5"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68400-5_3"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00130"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30499-9_161"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833702"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2847662"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 16th International Conference on Neural Information Processing Systems. 721\u2013728","author":"de Silva Vin","unstructured":"Vin de Silva and Joshua B. Tenenbaum. 2002. Global versus local methods in nonlinear dimensionality reduction. In Proceedings of the 16th International Conference on Neural Information Processing Systems. 721\u2013728."},{"key":"e_1_3_2_1_42_1","volume-title":"A global geometric framework for nonlinear dimensionality reduction. science","author":"Tenenbaum Joshua B","year":"2000","unstructured":"Joshua B Tenenbaum, Vin de Silva, and John C Langford. 2000. A global geometric framework for nonlinear dimensionality reduction. science, Vol. 290, 5500 (2000), 2319-2323."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514064"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"William Wolberg Olvi Mangasarian Nick Street and W. Street. 1993. Breast Cancer Wisconsin (Diagnostic). UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C5DW2B.","DOI":"10.24432\/C5DW2B"},{"key":"e_1_3_2_1_45_1","first-page":"2227","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Yuan Boshi","year":"2024","unstructured":"Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, and Shi-Feng Sun. 2024. : Super Fast Machine Learning for Malicious Security with a Dishonest Majority. In 33rd USENIX Security Symposium (USENIX Security 24). 2227-2244."},{"key":"e_1_3_2_1_46_1","first-page":"2348","article-title":"Privacy-preserving and outsourced multi-party k-means clustering based on multi-key fully homomorphic encryption","volume":"20","author":"Zhang Peng","year":"2022","unstructured":"Peng Zhang, Teng Huang, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai, and Joseph K Liu. 2022. Privacy-preserving and outsourced multi-party k-means clustering based on multi-key fully homomorphic encryption. IEEE Transactions on Dependable and Secure Computing, Vol. 20, 3 (2022), 2348-2359.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_47_1","first-page":"2723","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zheng Wenting","year":"2021","unstructured":"Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, and Ion Stoica. 2021. Cerebro: A platform for cryptographic collaborative learning. In 30th USENIX Security Symposium (USENIX Security 21). 2723-2740."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690314"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0020"}],"event":{"name":"WWW '26: The ACM Web Conference 2026","location":"Dubai United Arab Emirates","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2026"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3774904.3792105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T13:34:17Z","timestamp":1777296857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3774904.3792105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,12]]},"references-count":49,"alternative-id":["10.1145\/3774904.3792105","10.1145\/3774904"],"URL":"https:\/\/doi.org\/10.1145\/3774904.3792105","relation":{},"subject":[],"published":{"date-parts":[[2026,4,12]]},"assertion":[{"value":"2026-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}