{"id":"https://openalex.org/W3184223012","doi":"https://doi.org/10.1145/3517197","title":"Privacy-Preserving Decision Trees Training and Prediction","display_name":"Privacy-Preserving Decision Trees Training and Prediction","publication_year":2022,"publication_date":"2022-05-19","ids":{"openalex":"https://openalex.org/W3184223012","doi":"https://doi.org/10.1145/3517197","mag":"3184223012"},"language":"en","primary_location":{"id":"doi:10.1145/3517197","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3517197","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3517197","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3517197","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035202691","display_name":"Adi Akavia","orcid":"https://orcid.org/0000-0003-0853-3576"},"institutions":[{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Adi Akavia","raw_affiliation_strings":["University of Haifa, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"University of Haifa, Haifa, Israel","institution_ids":["https://openalex.org/I91203450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079567532","display_name":"Max Leibovich","orcid":"https://orcid.org/0000-0001-7027-3176"},"institutions":[{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Max Leibovich","raw_affiliation_strings":["University of Haifa, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"University of Haifa, Haifa, Israel","institution_ids":["https://openalex.org/I91203450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016189519","display_name":"Yehezkel S. Resheff","orcid":"https://orcid.org/0000-0001-7863-7632"},"institutions":[{"id":"https://openalex.org/I157943965","display_name":"Holon Institute of Technology","ror":"https://ror.org/02prqh017","country_code":"IL","type":"education","lineage":["https://openalex.org/I157943965"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yehezkel S. Resheff","raw_affiliation_strings":["Intuit Inc. and Holon Institute of Technology, Petakh Tikva, Israel"],"affiliations":[{"raw_affiliation_string":"Intuit Inc. and Holon Institute of Technology, Petakh Tikva, Israel","institution_ids":["https://openalex.org/I157943965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060923621","display_name":"Roey Ron","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Roey Ron","raw_affiliation_strings":["Intuit Inc., Petakh Tikva, Israel"],"affiliations":[{"raw_affiliation_string":"Intuit Inc., Petakh Tikva, Israel","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058126852","display_name":"Moni Shahar","orcid":"https://orcid.org/0000-0001-7512-9640"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Moni Shahar","raw_affiliation_strings":["Intuit Inc., Petakh Tikva, Israel"],"affiliations":[{"raw_affiliation_string":"Intuit Inc., Petakh Tikva, Israel","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080866144","display_name":"Margarita Vald","orcid":"https://orcid.org/0000-0003-1149-7182"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Margarita Vald","raw_affiliation_strings":["Intuit Inc., Petakh Tikva, Israel"],"affiliations":[{"raw_affiliation_string":"Intuit Inc., Petakh Tikva, Israel","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035202691"],"corresponding_institution_ids":["https://openalex.org/I91203450"],"apc_list":null,"apc_paid":null,"fwci":5.2441,"has_fulltext":true,"cited_by_count":41,"citation_normalized_percentile":{"value":0.95981025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"25","issue":"3","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9427388906478882},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.80721515417099},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7923897504806519},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5559678077697754},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5519095659255981},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.49900054931640625},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.47310328483581543},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4702785313129425},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.43994495272636414},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4395185112953186},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4273768961429596},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4090126156806946},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35922539234161377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26790282130241394},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10242798924446106},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.07873833179473877}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9427388906478882},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.80721515417099},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7923897504806519},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5559678077697754},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5519095659255981},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.49900054931640625},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47310328483581543},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4702785313129425},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43994495272636414},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4395185112953186},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4273768961429596},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4090126156806946},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35922539234161377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26790282130241394},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10242798924446106},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.07873833179473877},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3517197","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3517197","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3517197","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3517197","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3517197","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3517197","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6246021438","display_name":null,"funder_award_id":"3380/19","funder_id":"https://openalex.org/F4320322252","funder_display_name":"Israel Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321449","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495"},{"id":"https://openalex.org/F4320322252","display_name":"Israel Science Foundation","ror":"https://ror.org/04sazxf24"},{"id":"https://openalex.org/F4320323387","display_name":"University of Haifa","ror":"https://ror.org/02f009v59"},{"id":"https://openalex.org/F4320329496","display_name":"Israel National Cyber Directorate","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3184223012.pdf","grobid_xml":"https://content.openalex.org/works/W3184223012.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W150223756","https://openalex.org/W173088679","https://openalex.org/W1970074386","https://openalex.org/W1974392920","https://openalex.org/W2007407491","https://openalex.org/W2098970170","https://openalex.org/W2114277262","https://openalex.org/W2137596716","https://openalex.org/W2141306376","https://openalex.org/W2156800337","https://openalex.org/W2162538292","https://openalex.org/W2226167778","https://openalex.org/W2398935881","https://openalex.org/W2573908344","https://openalex.org/W2768174108","https://openalex.org/W2801491268","https://openalex.org/W2801958627","https://openalex.org/W2805215324","https://openalex.org/W2866649234","https://openalex.org/W2895782209","https://openalex.org/W2896938420","https://openalex.org/W2899635708","https://openalex.org/W2907745774","https://openalex.org/W2966536036","https://openalex.org/W2967497108","https://openalex.org/W2974369860","https://openalex.org/W2989605743","https://openalex.org/W2990280959","https://openalex.org/W2990930630","https://openalex.org/W2997591727","https://openalex.org/W3028867652","https://openalex.org/W3044375555","https://openalex.org/W3079221395","https://openalex.org/W3132999349","https://openalex.org/W3184223012","https://openalex.org/W3195598474","https://openalex.org/W3202957467","https://openalex.org/W4236137412","https://openalex.org/W6606067566","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W2625655658","https://openalex.org/W2771047361"],"abstract_inverted_index":{"In":[0,116,191],"the":[1,21,50,98,122,152,164,193,202],"era":[2],"of":[3,34,100,163,196,201],"cloud":[4],"computing":[5,87],"and":[6,46,48,127,135,205,210],"machine":[7,75],"learning,":[8],"data":[9,27,36,90,140],"has":[10,18],"become":[11],"a":[12,32,41,92,129,148,156],"highly":[13],"valuable":[14],"resource.":[15],"Recent":[16],"history":[17],"shown":[19],"that":[20,167],"benefits":[22],"brought":[23],"forth":[24],"by":[25],"this":[26,117],"driven":[28],"culture":[29],"come":[30],"at":[31],"cost":[33],"potential":[35],"leakage.":[37,85],"Such":[38],"breaches":[39],"have":[40],"devastating":[42],"impact":[43],"on":[44,121,182,216],"individuals":[45],"industry,":[47],"lead":[49],"community":[51],"to":[52,61,73,112,133,160],"seek":[53],"privacy":[54],"preserving":[55],"solutions.":[56],"A":[57],"promising":[58],"approach":[59],"is":[60,199],"utilize":[62],"Fully":[63],"Homomorphic":[64],"Encryption":[65],"(":[66],"\\(":[67,105],"\\mathsf":[68,106],"{FHE":[69,107],"}":[70,108],"\\)":[71,109],")":[72],"enable":[74],"learning":[76],"over":[77,88,139,170],"encrypted":[78,89,141,171,186],"data,":[79],"thus":[80,96],"providing":[81],"resiliency":[82],"against":[83],"information":[84],"However,":[86],"incurs":[91],"high":[93],"computational":[94],"overhead,":[95],"requiring":[97],"redesign":[99],"algorithms,":[101],"in":[102,208],"an":[103],"\u201c":[104],"-friendly\u201d":[110],"manner,":[111],"maintain":[113],"their":[114],"practicality.":[115],"work":[118],"we":[119],"focus":[120],"ever-popular":[123],"tree":[124,203],"based":[125],"methods,":[126],"propose":[128],"new":[130],"privacy-preserving":[131],"solution":[132,146],"training":[134],"prediction":[136,209],"for":[137,151,175],"trees":[138,177],"with":[142,155,187],"homomorphic":[143,189],"encryption.":[144,190],"Our":[145,173],"employs":[147],"low-degree":[149],"approximation":[150],"step-function":[153],"together":[154],"lightweight":[157],"interactive":[158],"protocol,":[159],"replace":[161],"components":[162],"vanilla":[165],"algorithm":[166],"are":[168],"costly":[169],"data.":[172],"protocols":[174,198],"decision":[176],"achieve":[178],"practical":[179],"usability":[180],"demonstrated":[181],"standard":[183],"UCI":[184],"datasets":[185],"fully":[188],"addition,":[192],"communication":[194],"complexity":[195],"our":[197],"independent":[200],"size":[204,207],"dataset":[206],"training,":[211],"respectively,":[212],"which":[213],"significantly":[214],"improves":[215],"prior":[217],"works.":[218],"1":[219]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":4}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
