{"id":"https://openalex.org/W4240141439","doi":"https://doi.org/10.1145/3411501","title":"Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice","display_name":"Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice","publication_year":2020,"publication_date":"2020-11-04","ids":{"openalex":"https://openalex.org/W4240141439","doi":"https://doi.org/10.1145/3411501"},"language":"en","primary_location":{"id":"doi:10.1145/3411501","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3411501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7051181793212891},{"id":"https://openalex.org/keywords/pleasure","display_name":"Pleasure","score":0.5171113014221191},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.5126647353172302},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4880880117416382},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4202047884464264},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.378583163022995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3570272624492645},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17272767424583435},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07613343000411987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7051181793212891},{"id":"https://openalex.org/C2777113389","wikidata":"https://www.wikidata.org/wiki/Q208195","display_name":"Pleasure","level":2,"score":0.5171113014221191},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.5126647353172302},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4880880117416382},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4202047884464264},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.378583163022995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3570272624492645},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17272767424583435},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07613343000411987},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3411501","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3411501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2171170310","https://openalex.org/W1603590763","https://openalex.org/W114017169","https://openalex.org/W2366083675","https://openalex.org/W2231036510","https://openalex.org/W2890483697","https://openalex.org/W3129172297","https://openalex.org/W2489482894","https://openalex.org/W3121649228","https://openalex.org/W4308641276"],"abstract_inverted_index":{"It":[0],"is":[1],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,66,98,107,133],"welcome":[6],"you":[7],"the":[9,68,84,109,136,153],"PPMLP":[10,120],"2020:":[11],"Workshop":[12],"on":[13,83,140],"Privacy-Preserving":[14],"Machine":[15],"Learning":[16],"in":[17,77,112,117],"Practice.":[18],"Protecting":[19],"data":[20,24,29,36,145],"privacy":[21,89],"from":[22,59,71,101,152],"multiple":[23,64],"owners":[25],"while":[26],"utilizing":[27],"these":[28],"for":[30,88,125],"joint":[31,35],"model":[32],"creation":[33],"and":[34,42,49,75,90,104,114,129,144,148],"analysis":[37,146],"has":[38],"become":[39],"a":[40,123],"more":[41,43,96],"practical":[44],"problem,":[45],"given":[46],"that":[47],"GDPR":[48],"other":[50],"national":[51],"laws":[52],"have":[53,62],"come":[54],"into":[55],"force.":[56],"Academic":[57],"researchers":[58,100],"different":[60,72,102,118],"areas":[61],"proposed":[63],"ideas":[65],"attack":[67],"aforementioned":[69],"challenges":[70],"perspectives.":[73],"Researchers":[74],"engineers":[76],"industries":[78],"also":[79],"implement":[80],"various":[81],"improvements":[82],"internal":[85],"AI":[86],"systems":[87],"security":[91,130],"enhancement.":[92],"However,":[93],"we":[94],"need":[95],"opportunities":[97],"connect":[99],"backgrounds":[103],"domains":[105],"together":[106],"exchange":[108],"problem":[110],"formulations":[111],"practice":[113],"research":[115],"advances":[116],"principals.":[119],"will":[121],"provide":[122],"forum":[124],"both":[126],"machine":[127,142],"learning":[128,143],"researchers/industrial":[131],"practitioners":[132],"jointly":[134],"review":[135],"recent":[137],"academic":[138],"progress":[139],"privacypreserving":[141],"techniques":[147],"valuable":[149],"lessons":[150],"learned":[151],"real-world":[154],"applications.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
