{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:04:20Z","timestamp":1772240660118,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2025,3,1]]},"DOI":"10.1587\/transfun.2024tap0011","type":"journal-article","created":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:11:34Z","timestamp":1725833494000},"page":"423-434","source":"Crossref","is-referenced-by-count":2,"title":["Scalable Unified Privacy-Preserving Machine Learning Framework (SUPM)"],"prefix":"10.1587","volume":"E108.A","author":[{"given":"Atsuko","family":"MIYAJI","sequence":"first","affiliation":[{"name":"Graduate School of Engineering, Osaka University"}]},{"given":"Tatsuhiro","family":"YAMATSUKI","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Osaka University"}]},{"given":"Tomoka","family":"TAKAHASHI","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Osaka University"}]},{"given":"Ping-Lun","family":"WANG","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering department, Carnegie Mellon University"}]},{"given":"Tomoaki","family":"MIMOTO","sequence":"additional","affiliation":[{"name":"KDDI Research, Inc."}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] C. Gentry, \u201cFully homomorphic encryption using ideal lattices,\u201d Proc. Forty-First Annual ACM Symposium on Theory of Computing, pp.169-178, 2009. 10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] D. Demmler, T. Schneider, and M. Zohner, \u201cABY\u2006\u2014\u2006A framework for efficient mixed-protocol secure two-party computation,\u201d NDSS, 2015. 10.14722\/ndss.2015.23113","DOI":"10.14722\/ndss.2015.23113"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] M. Bellare, V.T. Hoang, and P. Rogaway, \u201cFoundations of garbled circuits,\u201d Proc. 2012 ACM Conference on Computer and Communications Security, pp.784-796, 2012. 10.1145\/2382196.2382279","DOI":"10.1145\/2382196.2382279"},{"key":"4","unstructured":"[4] P. Xie, M. Bilenko, T. Finley, R. Gilad-Bachrach, K. Lauter, and M. Naehrig, \u201cCrypto-nets: Neural networks over encrypted data,\u201d arXiv preprint arXiv:1412.6181, 2014. 10.48550\/arXiv.1412.6181"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] C. Dwork, \u201cDifferential privacy,\u201d Proc. ICALP 2006, LNCS, vol.4052, pp.1-12, 2006. 10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"key":"6","unstructured":"[6] P. Kairouz, K. Bonawitz, and D. Ramage, \u201cDiscrete distribution estimation under local privacy,\u201d International Conference on Machine Learning, PMLR, pp.2436-2444, 2016."},{"key":"7","unstructured":"[7] T. Wang, J. Blocki, N. Li, and S. Jha, \u201cLocally differentially private protocols for frequency estimation,\u201d 26th USENIX Security Symposium (USENIX Security 17), pp.729-745, 2017."},{"key":"8","unstructured":"[8] M. Gaboardi and R. Rogers, \u201cLocal private hypothesis testing: Chi-square tests,\u201d International Conference on Machine Learning, pp.1626-1635, 2018."},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] B. Ding, H. Nori, and e. Li, \u201cComparing population means under local differential privacy: With significance and power,\u201d Proc. AAAI, vol.32, no.1, 2018. 10.1609\/aaai.v32i1.11301","DOI":"10.1609\/aaai.v32i1.11301"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] K. Wei, J. Li, M. Ding, C. Ma, H.H. Yang, F. Farokhi, S. Jin, T.Q. Quek, and H.V. Poor, \u201cFederated learning with differential privacy: Algorithms and performance analysis,\u201d IEEE Trans. Inf. Forensics Security, vol.15, pp.3454-3469, 2020. 10.1109\/tifs.2020.2988575","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] N. Wang, X. Xiao, Y. Yang, J. Zhao, S.C. Hui, H. Shin, J. Shin, and G. Yu, \u201cCollecting and analyzing multidimensional data with local differential privacy,\u201d 2019 IEEE 35th International Conference on Data Engineering (ICDE), pp.638-649, 2019. 10.1109\/icde.2019.00063","DOI":"10.1109\/ICDE.2019.00063"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] A. Miyaji, T. Takahashi, P.-L. Wang, T. Yamatsuki, and T. Mimoto, \u201cPrivacy-preserving data analysis without trusted third party,\u201d 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.710-717, 2022. 10.1109\/trustcom56396.2022.00101","DOI":"10.1109\/TrustCom56396.2022.00101"},{"key":"13","unstructured":"[13] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and \u00c9. Duchesnay, \u201cScikit-learn: Machine learning in python,\u201d Journal of Machine Learning Research, vol.12, no.85, pp.2825-2830, 2011."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] J.C. Duchi, M.I. Jordan, and M.J. Wainwright, \u201cLocal privacy and statistical minimax rates,\u201d 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp.429-438, 2013. 10.1109\/focs.2013.53","DOI":"10.1109\/FOCS.2013.53"},{"key":"15","unstructured":"[15] P. Kairouz, S. Oh, and P. Viswanath, \u201cExtremal mechanisms for local differential privacy,\u201d Advances in Neural Information Processing Systems, vol.27, 2014."},{"key":"16","unstructured":"[16] B.I. Rubinstein, P.L. Bartlett, L. Huang, and N. Taft, \u201cLearning in a large function space: Privacy-preserving mechanisms for SVM learning,\u201d arXiv preprint arXiv:0911.5708, 2009. 10.48550\/arXiv.0911.5708"},{"key":"17","unstructured":"[17] \u201cBreast cancer wisconsin (diagnostic) data set,\u201d UCI Machine Learning Repository https:\/\/archive.ics.uci.edu\/ml\/datasets\/breast+cancer+wisconsin+(diagnostic)"},{"key":"18","unstructured":"[18] \u201cIonosphere data set,\u201d UCI Machine Learning Repository https:\/\/archive.ics.uci.edu\/ml\/datasets\/ionosphere."},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] N. Holohan, D.J. Leith, and O. Mason, \u201cOptimal differentially private mechanisms for randomised response,\u201d IEEE Trans. Inf. Forensics Security, vol.12, no.11, pp.2726-2735, 2017. 10.1109\/tifs.2017.2718487","DOI":"10.1109\/TIFS.2017.2718487"},{"key":"20","unstructured":"[20] \u201cMusk (version2) data set,\u201d UCI Machine Learning Repository https:\/\/archive.ics.uci.edu\/ml\/datasets\/Musk+(Version+2)."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/3\/E108.A_2024TAP0011\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T03:31:15Z","timestamp":1740799875000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/3\/E108.A_2024TAP0011\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,1]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2024tap0011","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,1]]},"article-number":"2024TAP0011"}}