{"id":"https://openalex.org/W3113273625","doi":"https://doi.org/10.1109/smc42975.2020.9283102","title":"Towards Distributed Privacy-Preserving Prediction","display_name":"Towards Distributed Privacy-Preserving Prediction","publication_year":2020,"publication_date":"2020-10-11","ids":{"openalex":"https://openalex.org/W3113273625","doi":"https://doi.org/10.1109/smc42975.2020.9283102","mag":"3113273625"},"language":"en","primary_location":{"id":"doi:10.1109/smc42975.2020.9283102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc42975.2020.9283102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052577882","display_name":"Lingjuan Lyu","orcid":"https://orcid.org/0000-0003-3170-4994"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Lingjuan Lyu","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020675850","display_name":"Yee Wei Law","orcid":"https://orcid.org/0000-0002-5665-0980"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yee Wei Law","raw_affiliation_strings":["School of Engineering, University of South Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering, University of South Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048997284","display_name":"Kee Siong Ng","orcid":"https://orcid.org/0000-0003-0701-8783"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Kee Siong Ng","raw_affiliation_strings":["Software Innovation Institute, Australian National University"],"affiliations":[{"raw_affiliation_string":"Software Innovation Institute, Australian National University","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006610590","display_name":"Shibei Xue","orcid":"https://orcid.org/0000-0002-8617-4719"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shibei Xue","raw_affiliation_strings":["Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071321132","display_name":"Jun Zhao","orcid":"https://orcid.org/0000-0002-3004-7091"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jun Zhao","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087351635","display_name":"Mengmeng Yang","orcid":"https://orcid.org/0000-0002-8988-269X"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mengmeng Yang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100349496","display_name":"Lei Liu","orcid":"https://orcid.org/0000-0001-8173-0408"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lei Liu","raw_affiliation_strings":["Unicloud Engine Technology Co., Ltd, China"],"affiliations":[{"raw_affiliation_string":"Unicloud Engine Technology Co., Ltd, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5052577882"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.6857,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.77612844,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"4179","last_page":"4184"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9514999985694885,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8418638706207275},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.833487868309021},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7773196697235107},{"id":"https://openalex.org/keywords/news-aggregator","display_name":"News aggregator","score":0.7397337555885315},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5090860724449158},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4937354028224945},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4293524920940399},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37335604429244995},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35563763976097107},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.335237979888916}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8418638706207275},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.833487868309021},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7773196697235107},{"id":"https://openalex.org/C180505990","wikidata":"https://www.wikidata.org/wiki/Q498267","display_name":"News aggregator","level":2,"score":0.7397337555885315},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5090860724449158},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4937354028224945},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4293524920940399},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37335604429244995},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35563763976097107},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.335237979888916},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/smc42975.2020.9283102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc42975.2020.9283102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/311702","is_oa":false,"landing_page_url":"http://hdl.handle.net/1885/311702","pdf_url":null,"source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"},{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/733754526","is_oa":false,"landing_page_url":"https://hdl.handle.net/1885/733754526","pdf_url":null,"source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5699999928474426}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322927","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884"},{"id":"https://openalex.org/F4320326952","display_name":"State Key Laboratory of Industrial Control Technology","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1544327602","https://openalex.org/W1557833142","https://openalex.org/W1600010237","https://openalex.org/W1952161176","https://openalex.org/W2027595342","https://openalex.org/W2097669016","https://openalex.org/W2104803737","https://openalex.org/W2146673169","https://openalex.org/W2473418344","https://openalex.org/W2532781556","https://openalex.org/W2535690855","https://openalex.org/W2755142057","https://openalex.org/W2785361959","https://openalex.org/W2804268522","https://openalex.org/W2946412645","https://openalex.org/W2963189173","https://openalex.org/W2963374540","https://openalex.org/W2963965291","https://openalex.org/W2981641173","https://openalex.org/W3048252189","https://openalex.org/W4205228770","https://openalex.org/W4297799122","https://openalex.org/W6728897251","https://openalex.org/W6747732332","https://openalex.org/W6751754709","https://openalex.org/W6751920018","https://openalex.org/W6762705885","https://openalex.org/W6769496135","https://openalex.org/W6782269965"],"related_works":["https://openalex.org/W4287668808","https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W3185918024","https://openalex.org/W3138333794","https://openalex.org/W2773408865","https://openalex.org/W4226426276","https://openalex.org/W2083287929","https://openalex.org/W3132022922","https://openalex.org/W2613373864"],"abstract_inverted_index":{"In":[0],"privacy-preserving":[1],"machine":[2],"learning,":[3],"individual":[4,75],"parties":[5],"are":[6],"reluctant":[7],"to":[8,15,73,88,98,119],"share":[9],"their":[10],"sensitive":[11,50],"training":[12],"data":[13,51],"due":[14],"privacy":[16,28,65],"concerns.":[17],"Even":[18],"the":[19,80,101,106,120,128],"trained":[20],"model":[21,53],"parameters":[22],"or":[23,52],"prediction":[24],"can":[25],"pose":[26],"serious":[27],"leakage.":[29],"To":[30],"address":[31],"these":[32],"problems,":[33],"we":[34,78,94],"demonstrate":[35,112],"a":[36],"generally":[37],"applicable":[38],"Distributed":[39],"Privacy-Preserving":[40],"Prediction":[41],"(DPPP)":[42],"framework,":[43],"in":[44],"which":[45],"instead":[46],"of":[47],"sharing":[48],"more":[49],"parameters,":[54],"an":[55],"untrusted":[56],"aggregator":[57,102],"combines":[58],"only":[59],"multiple":[60],"models'":[61],"predictions":[62],"under":[63],"provable":[64],"guarantee.":[66],"Our":[67],"framework":[68,115,132],"integrates":[69],"two":[70],"main":[71],"techniques":[72],"guarantee":[74],"privacy.":[76,92],"First,":[77],"introduce":[79],"improved":[81],"Binomial":[82],"Mechanism":[83,87],"and":[84,123,133],"Discrete":[85],"Gaussian":[86],"achieve":[89],"distributed":[90],"differential":[91],"Second,":[93],"utilize":[95],"homomorphic":[96],"encryption":[97],"ensure":[99],"that":[100,113],"learns":[103],"nothing":[104],"but":[105],"noisy":[107],"aggregated":[108],"prediction.":[109],"Experimental":[110],"results":[111,126],"our":[114],"has":[116],"comparable":[117],"performance":[118],"non-private":[121],"frameworks":[122],"delivers":[124],"better":[125],"than":[127],"local":[129],"differentially":[130],"private":[131],"standalone":[134],"framework.":[135]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
