{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T18:18:53Z","timestamp":1769710733679,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,29]]},"DOI":"10.1145\/3778265.3778266","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:25:21Z","timestamp":1769671521000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and Secure Federated Split Learning Based on Secret Sharing and Mixup Augmentation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0175-7489","authenticated-orcid":false,"given":"Jun","family":"Lu","sequence":"first","affiliation":[{"name":"School of Information Engineering and Automation, Kunming University of Science and Technology, China, Kunming, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2505-0288","authenticated-orcid":false,"given":"Fenhua","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Information Engineering and Automation, Kunming University of Science and Technology, China, Kunming, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3753-9993","authenticated-orcid":false,"given":"Zhize","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Information Engineering and Automation, Kunming University of Science and Technology, China, Kunming, China"}]}],"member":"320","published-online":{"date-parts":[[2026,1,28]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22165983"},{"key":"e_1_3_3_1_2_2","first-page":"755","article-title":"Secure training of multi-party deep neural network","volume":"10","author":"Gupta O","year":"2020","unstructured":"Gupta O, Raskar R. Secure training of multi-party deep neural network: U.S. Patent 10,755,172[P]. 2020-8-25.","journal-title":"U.S. Patent"},{"key":"e_1_3_3_1_3_2","volume-title":"Federated learning: Strategies for improving communication efficiency[J]. arXiv preprint arXiv:1610.05492","author":"Kone\u010dn\u00fd J","year":"2016","unstructured":"Kone\u010dn\u00fd J, McMahan H B, Yu F X, et al. Federated learning: Strategies for improving communication efficiency[J]. arXiv preprint arXiv:1610.05492, 2016."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2941458"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Yun S Han D Oh S J et al. Cutmix: Regularization strategy to train strong classifiers with localizable features[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2019: 6023-6032.","DOI":"10.1109\/ICCV.2019.00612"},{"key":"e_1_3_3_1_7_2","first-page":"79","article-title":"Advancements of federated learning towards privacy preservation: from federated learning to split learning[J]","volume":"2021","author":"Thapa C","unstructured":"Thapa C, Chamikara M A P, Camtepe S A. Advancements of federated learning towards privacy preservation: from federated learning to split learning[J]. Federated Learning Systems: Towards Next-Generation AI, 2021: 79-109.","journal-title":"Federated Learning Systems: Towards Next-Generation AI"},{"key":"e_1_3_3_1_8_2","first-page":"755","article-title":"Secure training of multi-party deep neural network","volume":"10","author":"Gupta O","year":"2020","unstructured":"Gupta O, Raskar R. Secure training of multi-party deep neural network: U.S. Patent 10,755,172[P]. 2020-8-25.","journal-title":"U.S. Patent"},{"key":"e_1_3_3_1_9_2","volume-title":"Split learning for health: Distributed deep learning without sharing raw patient data[J]. arXiv preprint arXiv:1812.00564","author":"Vepakomma P","year":"2018","unstructured":"Vepakomma P, Gupta O, Swedish T, et al. Split learning for health: Distributed deep learning without sharing raw patient data[J]. arXiv preprint arXiv:1812.00564, 2018."},{"key":"e_1_3_3_1_10_2","volume-title":"A novel hybrid split and federated learning architecture in wireless uav networks[C]\/\/ICC 2022-IEEE International Conference on Communications","author":"Liu X","year":"2022","unstructured":"Liu X, Deng Y, Mahmoodi T. A novel hybrid split and federated learning architecture in wireless uav networks[C]\/\/ICC 2022-IEEE International Conference on Communications. IEEE, 2022: 1-6."},{"key":"e_1_3_3_1_11_2","volume-title":"Camtepe S, et al. Splitfed: When federated learning meets split learning[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence.","author":"Thapa C","year":"2022","unstructured":"Thapa C, Arachchige P C M, Camtepe S, et al. Splitfed: When federated learning meets split learning[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 2022, 36(8): 8485-8493."},{"key":"e_1_3_3_1_12_2","volume-title":"HSFL: An Efficient Split Federated Learning Framework via Hierarchical Organization[C]\/\/2022 18th International Conference on Network and Service Management (CNSM)","author":"Xia T","year":"2022","unstructured":"Xia T, Deng Y, Yue S, et al. HSFL: An Efficient Split Federated Learning Framework via Hierarchical Organization[C]\/\/2022 18th International Conference on Network and Service Management (CNSM). IEEE, 2022: 1-9."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176469"},{"key":"e_1_3_3_1_14_2","volume-title":"A survey on the edge computing for the Internet of Things[J]","author":"Yu W","year":"2017","unstructured":"Yu W, Liang F, He X, et al. A survey on the edge computing for the Internet of Things[J]. IEEE access, 2017, 6: 6900-6919."},{"issue":"5","key":"e_1_3_3_1_15_2","first-page":"2438","article-title":"Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive[J]","volume":"18","author":"Weng J","year":"2019","unstructured":"Weng J, Weng J, Zhang J, et al. Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 18(5): 2438-2455.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3150806"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Bonawitz K Ivanov V Kreuter B et al. Practical secure aggregation for privacy-preserving machine learning[C]\/\/proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 1175-1191.","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_3_1_18_2","volume-title":"CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM[C]\/\/2018 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"Bos J","year":"2018","unstructured":"Bos J, Ducas L, Kiltz E, et al. CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM[C]\/\/2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2018: 353-367."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Ajtai M Dwork C. A public-key cryptosystem with worst-case\/average-case equivalence[C]\/\/Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. 1997: 284-293.","DOI":"10.1145\/258533.258604"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1039488.1039490"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Peikert C. Public-key cryptosystems from the worst-case shortest vector problem[C]\/\/Proceedings of the forty-first annual ACM symposium on Theory of computing. 2009: 333-342.","DOI":"10.1145\/1536414.1536461"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Brakerski Z Langlois A Peikert C et al. Classical hardness of learning with errors[C]\/\/Proceedings of the forty-fifth annual ACM symposium on Theory of computing. 2013: 575-584.","DOI":"10.1145\/2488608.2488680"},{"key":"e_1_3_3_1_24_2","volume-title":"A simple provably secure key exchange scheme based on the learning with errors problem[J]. Cryptology ePrint Archive","author":"Ding J","year":"2012","unstructured":"Ding J, Xie X, Lin X. A simple provably secure key exchange scheme based on the learning with errors problem[J]. Cryptology ePrint Archive, 2012."},{"key":"e_1_3_3_1_25_2","volume-title":"Lattice cryptography for the internet[C]\/\/International workshop on post-quantum cryptography","author":"Peikert C.","year":"2014","unstructured":"Peikert C. Lattice cryptography for the internet[C]\/\/International workshop on post-quantum cryptography. Cham: Springer International Publishing, 2014: 197-219."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Bos J Costello C Ducas L et al. Frodo: Take off the ring! practical quantum-secure key exchange from LWE[C]\/\/Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016: 1006-1018.","DOI":"10.1145\/2976749.2978425"},{"key":"e_1_3_3_1_27_2","volume-title":"NTRU Prime[J]. IACR Cryptol. ePrint Arch","author":"Bernstein D J","year":"2016","unstructured":"Bernstein D J, Chuengsatiansup C, Lange T, et al. NTRU Prime[J]. IACR Cryptol. ePrint Arch., 2016, 2016: 461."},{"key":"e_1_3_3_1_28_2","volume-title":"Improved regularization of convolutional neural networks with cutout[J]. arXiv preprint arXiv:1708.04552","author":"DeVries T","year":"2017","unstructured":"DeVries T, Taylor G W. Improved regularization of convolutional neural networks with cutout[J]. arXiv preprint arXiv:1708.04552, 2017."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Yun S Han D Oh S J et al. Cutmix: Regularization strategy to train strong classifiers with localizable features[C]\/\/Proceedings of the IEEE\/CVF international conference on computer vision. 2019: 6023-6032.","DOI":"10.1109\/ICCV.2019.00612"},{"key":"e_1_3_3_1_30_2","volume-title":"mixup: Beyond empirical risk minimization[J]. arXiv preprint arXiv:1710.09412","author":"Zhang H","year":"2017","unstructured":"Zhang H, Cisse M, Dauphin Y N, et al. mixup: Beyond empirical risk minimization[J]. arXiv preprint arXiv:1710.09412, 2017."},{"key":"e_1_3_3_1_31_2","volume-title":"PMLR","author":"Verma V","unstructured":"Verma V, Lamb A, Beckham C, et al. Manifold mixup: Better representations by interpolating hidden states[C]\/\/International conference on machine learning. PMLR, 2019: 6438-6447."},{"key":"e_1_3_3_1_32_2","volume-title":"PatchUp: A feature-space block-level regularization technique for convolutional neural networks[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence","author":"Faramarzi M","year":"2022","unstructured":"Faramarzi M, Amini M, Badrinaaraayanan A, et al. PatchUp: A feature-space block-level regularization technique for convolutional neural networks[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 2022, 36(1): 589-597."},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.13868\/j.cnki.jcr.000002.("},{"key":"e_1_3_3_1_34_2","volume-title":"Lattice-based cryptography for IoT in a quantum world: Are we ready?[C]\/\/2019 IEEE 8th international workshop on advances in sensors and interfaces (IWASI)","author":"Khalid A","year":"2019","unstructured":"Khalid A, McCarthy S, O'Neill M, et al. Lattice-based cryptography for IoT in a quantum world: Are we ready?[C]\/\/2019 IEEE 8th international workshop on advances in sensors and interfaces (IWASI). IEEE, 2019: 194-199."},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1561\/9781680831139"},{"key":"e_1_3_3_1_36_2","unstructured":"https:\/\/github.com\/pq-crystals\/kyber"},{"key":"e_1_3_3_1_37_2","unstructured":"https:\/\/github.com\/chandar-lab\/PatchUp"},{"key":"e_1_3_3_1_38_2","volume-title":"Accelerating federated learning with split learning on locally generated losses[C]\/\/ICML 2021 workshop on federated learning for user privacy and data confidentiality. ICML Board","author":"Han D J","year":"2021","unstructured":"Han D J, Bhatti H I, Lee J, et al. Accelerating federated learning with split learning on locally generated losses[C]\/\/ICML 2021 workshop on federated learning for user privacy and data confidentiality. ICML Board. 2021."},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.12720\/jait.6.3.124-129"}],"event":{"name":"BDSIC 2025: 2025 7th International Conference on Big-data Service and Intelligent Computation","location":"Bangkok Thailand","acronym":"BDSIC 2025"},"container-title":["Proceedings of the 2025 7th International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3778265.3778266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T07:26:05Z","timestamp":1769671565000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3778265.3778266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":40,"alternative-id":["10.1145\/3778265.3778266","10.1145\/3778265"],"URL":"https:\/\/doi.org\/10.1145\/3778265.3778266","relation":{},"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"2026-01-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}