{"id":"https://openalex.org/W4414070452","doi":"https://doi.org/10.32604/cmc.2025.068875","title":"On Privacy-Preserved Machine Learning Using Secure Multi-Party Computing: Techniques and Trends","display_name":"On Privacy-Preserved Machine Learning Using Secure Multi-Party Computing: Techniques and Trends","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414070452","doi":"https://doi.org/10.32604/cmc.2025.068875"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.068875","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068875","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.068875","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119571966","display_name":"Oshan Mudannayake","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Oshan Mudannayake","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119571967","display_name":"Amila Indika","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amila Indika","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024318086","display_name":"Upul Jayasinghe","orcid":"https://orcid.org/0000-0001-7671-9490"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Upul Jayasinghe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060724570","display_name":"Gyu Myoung Lee","orcid":"https://orcid.org/0000-0002-2155-5553"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gyu Myoung Lee","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5056029451","display_name":"Janaka Alawatugoda","orcid":"https://orcid.org/0000-0001-9431-5836"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Janaka Alawatugoda","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5119571966"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13081301,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"2","first_page":"2527","last_page":"2578"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9426000118255615,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9301999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6183000206947327},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.6164000034332275},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5792999863624573},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5188999772071838},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4729999899864197},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.3637999892234802},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.3483999967575073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.782800018787384},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6420000195503235},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6183000206947327},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.6164000034332275},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6111000180244446},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5792999863624573},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5188999772071838},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4729999899864197},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.423799991607666},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.3483999967575073},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3434000015258789},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32850000262260437},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.31709998846054077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3066999912261963},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.2606000006198883}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.32604/cmc.2025.068875","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068875","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},{"id":"pmh:oai:researchonline.ljmu.ac.uk:26937","is_oa":false,"landing_page_url":"https://orcid.org/0000-0002-2155-5553","pdf_url":null,"source":{"id":"https://openalex.org/S4306401246","display_name":"Liverpool John Moores University","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63098007","host_organization_name":"Liverpool John Moores University","host_organization_lineage":["https://openalex.org/I63098007"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.068875","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.068875","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W807476078","https://openalex.org/W1969009977","https://openalex.org/W2007339694","https://openalex.org/W2134167315","https://openalex.org/W2159024459","https://openalex.org/W2177209050","https://openalex.org/W2513202551","https://openalex.org/W2573908344","https://openalex.org/W2597998853","https://openalex.org/W2606882085","https://openalex.org/W2729742878","https://openalex.org/W2781091734","https://openalex.org/W2788531461","https://openalex.org/W2792109132","https://openalex.org/W2795354529","https://openalex.org/W2800679800","https://openalex.org/W2801874531","https://openalex.org/W2812083516","https://openalex.org/W2890134031","https://openalex.org/W2896479683","https://openalex.org/W2903850320","https://openalex.org/W2904364493","https://openalex.org/W2905034922","https://openalex.org/W2907842073","https://openalex.org/W2913608349","https://openalex.org/W2917996064","https://openalex.org/W2930843880","https://openalex.org/W2936154336","https://openalex.org/W2945824031","https://openalex.org/W2950847865","https://openalex.org/W2963752132","https://openalex.org/W2972653719","https://openalex.org/W2994111940","https://openalex.org/W2995191368","https://openalex.org/W3008381581","https://openalex.org/W3014777329","https://openalex.org/W3015767938","https://openalex.org/W3033511014","https://openalex.org/W3040469779","https://openalex.org/W3042006926","https://openalex.org/W3082031333","https://openalex.org/W3084128899","https://openalex.org/W3108146280","https://openalex.org/W3132340800","https://openalex.org/W3168851959","https://openalex.org/W3173471586","https://openalex.org/W3185987447","https://openalex.org/W3201690998","https://openalex.org/W4293783465","https://openalex.org/W4296198142","https://openalex.org/W4386763756","https://openalex.org/W4389232919","https://openalex.org/W4392380561","https://openalex.org/W4394804988","https://openalex.org/W4400020588","https://openalex.org/W4401070270","https://openalex.org/W4402684292","https://openalex.org/W4403370595","https://openalex.org/W4404213219","https://openalex.org/W4404595387","https://openalex.org/W4405330211","https://openalex.org/W4408051714","https://openalex.org/W4409481859","https://openalex.org/W4412039896","https://openalex.org/W4412370306"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,155],"rapid":[1],"adoption":[2],"of":[3,41,57,80,88,129],"machine":[4,25],"learning":[5,26],"in":[6,50,82,166],"sensitive":[7,33],"domains,":[8],"such":[9,146],"as":[10,147],"healthcare,":[11],"finance,":[12],"and":[13,54,92,115,126,152,164],"government":[14],"services,":[15],"has":[16],"heightened":[17],"the":[18,39,78],"need":[19],"for":[20,143],"robust,":[21],"privacy-preserving":[22],"techniques.":[23],"Traditional":[24],"approaches":[27],"lack":[28],"built-in":[29],"privacy":[30],"mechanisms,":[31],"exposing":[32],"data":[34],"to":[35,70],"risks,":[36],"which":[37],"motivates":[38],"development":[40],"Privacy-Preserving":[42],"Machine":[43],"Learning":[44],"(PPML)":[45],"methods.":[46,132],"Despite":[47],"significant":[48],"advances":[49],"PPML,":[51,83],"a":[52,85,96],"comprehensive":[53],"focused":[55],"exploration":[56],"Secure":[58],"Multi-Party":[59],"Computing":[60],"(SMPC)":[61],"within":[62],"this":[63,72,101],"context":[64],"remains":[65],"underdeveloped.":[66],"This":[67],"review":[68],"aims":[69],"bridge":[71],"knowledge":[73],"gap":[74],"by":[75],"systematically":[76],"analyzing":[77],"role":[79],"SMPC":[81,107,138],"offering":[84],"structured":[86],"overview":[87],"current":[89],"techniques,":[90],"challenges,":[91],"future":[93],"directions.":[94],"Using":[95],"semi-systematic":[97],"mapping":[98],"study":[99],"methodology,":[100],"paper":[102,156],"surveys":[103],"recent":[104],"literature":[105],"spanning":[106],"protocols,":[108],"PPML":[109],"frameworks,":[110],"implementation":[111],"approaches,":[112],"threat":[113],"models,":[114],"performance":[116],"metrics.":[117],"Emphasis":[118],"is":[119],"placed":[120],"on":[121],"identifying":[122],"trends,":[123],"technical":[124],"limitations,":[125],"comparative":[127],"strengths":[128],"leading":[130],"SMPC-based":[131],"Our":[133],"findings":[134],"reveal":[135],"that":[136],"while":[137],"offers":[139],"strong":[140],"cryptographic":[141],"guarantees":[142],"privacy,":[144],"challenges":[145],"computational":[148],"overhead,":[149],"communication":[150],"costs,":[151],"scalability":[153],"persist.":[154],"also":[157],"discusses":[158],"critical":[159],"vulnerabilities,":[160],"practical":[161],"deployment":[162],"issues,":[163],"variations":[165],"protocol":[167],"efficiency":[168],"across":[169],"use":[170],"cases.":[171]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
