{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:59:32Z","timestamp":1732042772528},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3102100"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2042022kf1195","2042022kf0046"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076187","62172303"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Hubei Province","award":["2022BAA039"]},{"DOI":"10.13039\/100014103","name":"Key Research and Development Program of Shandong Province","doi-asserted-by":"publisher","award":["2022CXPT055"],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3287072","type":"journal-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T17:20:29Z","timestamp":1686936029000},"page":"4815-4829","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0883-6278","authenticated-orcid":false,"given":"Xuanang","family":"Yang","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":false,"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9719-9313","authenticated-orcid":false,"given":"Hao","family":"Bai","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0930-0283","authenticated-orcid":false,"given":"Cong","family":"Wu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14778\/3282495.3282499"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref7","first-page":"1","article-title":"GForce: GPU-friendly oblivious and rapid neural network inference","volume-title":"Proc. USENIX Secur. Symp.","author":"Ng"},{"key":"ref8","volume-title":"Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals With Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation), COM (2012) 11 Final","year":"2012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161393"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000293"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref12","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"Proc. ICLR","author":"Simonyan"},{"key":"ref13","first-page":"1","article-title":"Low latency privacy preserving inference","volume-title":"Proc. ICML","author":"Brutzkus"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484797"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24351"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23166"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363207"},{"key":"ref20","article-title":"Optimizing privacy-preserving outsourced convolutional neural network predictions","author":"Li","year":"2020","journal-title":"arXiv:2002.10944"},{"key":"ref21","first-page":"210","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. ICML","author":"Gilad-Bachrach"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465894"},{"key":"ref24","first-page":"1","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. USENIX Secur. Symp.","author":"Juvekar"},{"key":"ref25","first-page":"1","article-title":"XONN: XNOR-based oblivious deep neural network inference","volume-title":"Proc. USENIX Secur. Symp.","author":"Riazi"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419418"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1"},{"key":"ref37","first-page":"1","article-title":"ABY3: A mixed protocol framework for machine learning","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Mohassel"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24202"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00038"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"ref41","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_8"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10154059.pdf?arnumber=10154059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:45:54Z","timestamp":1705020354000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10154059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3287072","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}