{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:36:32Z","timestamp":1742916992384,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030869694"},{"type":"electronic","value":"9783030869700"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86970-0_17","type":"book-chapter","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T06:03:57Z","timestamp":1631253837000},"page":"227-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Machine Intelligence and Distributed Ledger"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7738-8512","authenticated-orcid":false,"given":"Dmitry","family":"Arseniev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9890-9559","authenticated-orcid":false,"given":"Dmitry","family":"Baskakov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6817-3440","authenticated-orcid":false,"given":"Vyacheslav","family":"Shkodyrev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,11]]},"reference":[{"key":"17_CR1","unstructured":"TRADI: Tracking deep neural network weight distributions (2020). https:\/\/arxiv.org\/pdf\/1912.11316v3.pdf. Accessed 03 May 2020"},{"key":"17_CR2","unstructured":"Buniatyan, D.: Hyper: distributed cloud processing for large-scale deep learning tasks (2019). https:\/\/arxiv.org\/pdf\/1910.07172v1.pdf. Accessed 25 May 2020"},{"key":"17_CR3","unstructured":"Tsikhanovich, M., Magdon-Ismail, M., Ishaq, M., PD-ML-Lite: private distributed machine learning from lightweight cryptography (2019). https:\/\/arxiv.org\/pdf\/1901.07986v2.pdf. Accessed 27 Apr 2020"},{"key":"17_CR4","unstructured":"Failures of Deep Learning (2017). https:\/\/simons.berkeley.edu\/talks\/shai-shalev-shwartz-2017-3-28. Accessed 10 Apr 2020"},{"key":"17_CR5","unstructured":"BAYHENN: Combining Bayesian deep learning and homomorphic encryption for secure DNN inference (2019). https:\/\/arxiv.org\/pdf\/1906.00639v2.pdf. Accessed 01 May 2020"},{"key":"17_CR6","unstructured":"Boddeti, V.N.: Secure face matching using fully homomorphic encryption (2018). https:\/\/arxiv.org\/pdf\/1805.00577v2.pdf. Accessed 2020 Apr 15"},{"key":"17_CR7","unstructured":"Chialva, D., Dooms, A.: Conditionals in homomorphic encryption, and machine learning applications (2019). https:\/\/arxiv.org\/pdf\/1810.12380v2.pdf. Accessed 11 Mar 2020"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Thaine, P., Gorbunov, S., Penn, G.: Efficient evaluation of activation functions over encrypted data (2020). http:\/\/www.cs.toronto.edu\/~pthaine\/EEAFED.pdf. Accessed 17 Mar 2020","DOI":"10.1109\/SPW.2019.00022"},{"key":"17_CR9","unstructured":"Lopes, V., Alexandre, L.A.: An overview of blockchain integration with robotics and artificial intelligence (2018). https:\/\/arxiv.org\/pdf\/1810.00329.pdf. Accessed 24 Feb 2020"},{"key":"17_CR10","unstructured":"Craib, R., Bradway, G., Dunn, X., Krug, J.: White paper: Numeraire: a cryptographic token for coordinating machine intelligence and preventing overfitting (2017)"},{"key":"17_CR11","unstructured":"Halevi, S.: Homomorphic encryption (2017). https:\/\/shaih.github.io\/pubs\/he-chapter.pdf. Accessed 17 Apr 2020"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. Thesis, Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"17_CR13","unstructured":"Palisade homomorphic encryption software library. https:\/\/palisade-crypto.org\/software-library\/"},{"key":"17_CR14","unstructured":"Juvekar, C., Vaikuntanathan, V., Chandrakasan, A.: GAZELLE: A Low Latency Framework for Secure Neural Network Inference, Baltimore, MD, USA, 15\u201317 August 2018"},{"key":"17_CR15","unstructured":"Chen, H., Chillotti, I., Dong, Y., Poburinnaya, O.: SANNS: scaling up secure approximate K-nearest neighbors search (2020). https:\/\/arxiv.org\/pdf\/1904.02033.pdf. Accessed 04 Apr 2020"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science (SFCS 1986) (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-662-46803-6_8","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"S Zahur","year":"2015","unstructured":"Zahur, S., Rosulek, M., Evans, D.: Two Halves make a whole. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 220\u2013250. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_8"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to plait any mental game (1987)","DOI":"10.1145\/28395.28420"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., Zohner, M.: ABY \u2013 a framework for efficient mixed-protocol secure two-party computation. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA (2015)","DOI":"10.14722\/ndss.2015.23113"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: Conference: 2017 IEEE Symposium on Security and Privacy (SP) (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via minionn transformations. In: 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas (2017)","DOI":"10.1145\/3133956.3134056"},{"key":"17_CR22","unstructured":"Ouhani, B.D., Riazi, M.S., Koushanfar, F.: Deepsecure: scalable provably-secure deep learning (2017). https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1705\/1705.08963.pdf. Accessed 14 Mar 2020"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. In: ACM (1996)","DOI":"10.1145\/233551.233553"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Stefanovy, E., van Dijkz, M., Shi, E.: Path ORAM: an extremely simple oblivious RAM protocol (2013). https:\/\/eprint.iacr.org\/2013\/280.pdf","DOI":"10.1145\/2508859.2516660"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Stefanovy, E., van Dijkz, M., Shi, E.: Path ORAM: an extremely simple oblivious RAM protocol (2013). https:\/\/eprint.iacr.org\/2013\/280.pdf","DOI":"10.1145\/2508859.2516660"},{"key":"17_CR26","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: \u201ck-anonymity: A model for protecting. Int. J. Uncertain. Fuzz. Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzz. Knowl. Based Syst."},{"key":"17_CR27","unstructured":"Chen, F., Wany, H., Caiz, H., Cheng, G.: Machine learning in\/for blockchain: future and future and challenges (2020). https:\/\/arxiv.org\/pdf\/1909.06189v2.pdf. Accessed 07 May 2020"},{"key":"17_CR28","unstructured":"Zheng, Z., Dai, H.-N., Wu, J.: Blockchain intelligence: when blockchain meets artificial intelligence (2020). https:\/\/arxiv.org\/pdf\/1912.06485v3.pdf. Accessed 03 May 2020"},{"key":"17_CR29","unstructured":"Serizawaa, T., Fujita, H.: Optimization of convolutional neural network using the linearly decreasing weight particle swarm optimization (2020). https:\/\/arxiv.org\/ftp\/arxiv\/papers\/2001\/2001.05670.pdf. Accessed 11 Mar 2020"},{"key":"17_CR30","unstructured":"Liu, J., Tai, X.-C., Luo, S.: Convex shape prior for deep neural convolution network based eye fundus images segmentation (2020). https:\/\/arxiv.org\/pdf\/2005.07476v1.pdf. Accessed 13 May 2020"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Third Conference, Berlin (2006)","DOI":"10.1007\/11681878_14"},{"key":"17_CR32","unstructured":"Mireshghallah, F., Taram, M., Vepakomma, P., Singh, A., Raskar, R., Esmaeilzadeh, H.: Privacy in deep learning: a survey. https:\/\/arxiv.org\/pdf\/2004.12254v3.pdf. Accessed 11 May 2020"},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Lecuyer, M., Atlidakis, V., Geambasu, R., Hsu, D., Jana, S.: Certified robustness to adversarial examples with differential privacy (2019). https:\/\/arxiv.org\/abs\/1802.03471. Accessed 07 Feb 2020","DOI":"10.1109\/SP.2019.00044"},{"key":"17_CR34","unstructured":"Lopes, V., Alexandre, L.A.: An overview of blockchain integration with robotics and artificial intelligence (2018). https:\/\/arxiv.org\/pdf\/1810.00329v1.pdf. Accessed 29 Apr 2020"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86970-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T23:13:26Z","timestamp":1673219606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86970-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030869694","9783030869700"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86970-0_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}