{"id":"https://openalex.org/W4380905827","doi":"https://doi.org/10.1109/tifs.2023.3287072","title":"Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks","display_name":"Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4380905827","doi":"https://doi.org/10.1109/tifs.2023.3287072"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3287072","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100644371","display_name":"X Yang","orcid":"https://orcid.org/0000-0003-0883-6278"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuanang Yang","raw_affiliation_strings":["School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Rizhao Institute of Information Technology, Wuhan University, Rizhao, China","School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Rizhao Institute of Information Technology, Wuhan University, Rizhao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103052803","display_name":"Hao Bai","orcid":"https://orcid.org/0000-0002-9719-9313"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Bai","raw_affiliation_strings":["School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101623391","display_name":"Cong Wu","orcid":"https://orcid.org/0000-0002-0930-0283"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Collaborative Innovation Center of Geospatial Technology, Wuhan, China","School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Collaborative Innovation Center of Geospatial Technology, Wuhan, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.882,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.99998,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"18","issue":null,"first_page":"4815","last_page":"4829"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9969,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8503314},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.8355347},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.71602994},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.71163994},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.66068095},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6204817},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4827325},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4668615},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41346306},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4123032},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.4114748},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37662134},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35224313},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24560735},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21151447},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3287072","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62172303"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62076187"},{"funder":"https://openalex.org/F4320333596","funder_display_name":"Key Technology Research and Development Program of Shandong","award_id":"2022CXPT055"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2022YFB3102100"},{"funder":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities","award_id":"2042022kf1195"},{"funder":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities","award_id":"2042022kf0046"}],"datasets":[],"versions":[],"referenced_works_count":33,"referenced_works":["https://openalex.org/W1485800369","https://openalex.org/W1755636270","https://openalex.org/W1874619058","https://openalex.org/W1966731635","https://openalex.org/W1969009977","https://openalex.org/W2083847133","https://openalex.org/W2096733369","https://openalex.org/W2097117768","https://openalex.org/W2132172731","https://openalex.org/W2134340933","https://openalex.org/W2226167778","https://openalex.org/W2554750353","https://openalex.org/W2604319603","https://openalex.org/W2618530766","https://openalex.org/W2701059868","https://openalex.org/W2765200655","https://openalex.org/W2889746123","https://openalex.org/W2949140995","https://openalex.org/W2962746093","https://openalex.org/W2963106566","https://openalex.org/W2963844355","https://openalex.org/W2985527074","https://openalex.org/W3003532255","https://openalex.org/W3008381581","https://openalex.org/W3008493372","https://openalex.org/W3028867652","https://openalex.org/W3092115729","https://openalex.org/W3094786433","https://openalex.org/W3104454153","https://openalex.org/W3136975558","https://openalex.org/W3138596485","https://openalex.org/W3213906859","https://openalex.org/W780859780"],"related_works":["https://openalex.org/W618293728","https://openalex.org/W4286615217","https://openalex.org/W4231184955","https://openalex.org/W3125032676","https://openalex.org/W2788012436","https://openalex.org/W2374784346","https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W2291845669","https://openalex.org/W200604156"],"abstract_inverted_index":{"Inference":[0],"outsourcing":[1,83],"enables":[2],"model":[3,23,63,68,91,116],"owners":[4,24,69,92],"to":[5,14,70],"deploy":[6],"their":[7,39],"machine":[8],"learning":[9],"models":[10],"on":[11,33,103,140],"cloud":[12,106],"servers":[13],"serve":[15],"users.":[16,94],"In":[17,74],"this":[18,75],"paradigm,":[19],"the":[20,62,72,87,115,118,124],"privacy":[21,88],"of":[22,89,114],"and":[25,65,93,117,131,143],"users":[26],"should":[27],"be":[28],"considered.":[29],"Existing":[30],"solutions":[31,57],"focus":[32],"Convolutional":[34],"Neural":[35],"Networks":[36],"(CNNs)":[37],"but":[38],"efficiency":[40],"is":[41,47,150],"much":[42],"lower":[43],"than":[44,155],"GALA,":[45],"which":[46,108],"a":[48],"solution":[49,84,139,149],"that":[50,60,85,147],"only":[51],"protects":[52,86],"user":[53],"privacy.":[54],"Furthermore,":[55],"these":[56],"adopt":[58],"approximations":[59,132],"reduce":[61],"accuracy":[64],"thus":[66],"require":[67],"retrain":[71],"models.":[73],"paper,":[76],"we":[77,96],"present":[78],"an":[79],"efficient":[80],"CNN":[81],"inference":[82],"both":[90],"Specifically,":[95],"design":[97],"secure":[98],"two-party":[99],"computation":[100],"protocols":[101,122],"based":[102],"two":[104],"non-colluding":[105],"servers,":[107],"calculate":[109],"with":[110],"additive":[111],"secret":[112],"shares":[113],"user's":[119],"input.":[120],"Our":[121],"avoid":[123],"expensive":[125],"permutation":[126],"operations":[127],"in":[128,133],"linear":[129],"calculations":[130],"non-linear":[134],"calculations.":[135],"We":[136],"implement":[137],"our":[138,148],"realistic":[141],"CNNs":[142],"experimental":[144],"results":[145],"show":[146],"even":[151],"2\u20134":[152],"times":[153],"faster":[154],"GALA.":[156]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4380905827","counts_by_year":[{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2}],"updated_date":"2025-01-19T12:51:11.178893","created_date":"2023-06-17"}