{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:54:30Z","timestamp":1767084870780,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031547720"},{"type":"electronic","value":"9783031547737"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54773-7_13","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:02:47Z","timestamp":1709164967000},"page":"313-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Memory Efficient Privacy-Preserving Machine Learning Based on\u00a0Homomorphic Encryption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2997-109X","authenticated-orcid":false,"given":"Robert","family":"Podschwadt","sequence":"first","affiliation":[]},{"given":"Parsa","family":"Ghazvinian","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"GhasemiGol","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Takabi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"13_CR2","doi-asserted-by":"publisher","unstructured":"Aharoni, E., et al.: HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data. Proceedings on Privacy Enhancing Technologies 2023(1), 325\u2013342 (Jan 2023). https:\/\/doi.org\/10.56553\/popets-2023-0020, http:\/\/arxiv.org\/abs\/2011.01805, arXiv:2011.01805 [cs]","DOI":"10.56553\/popets-2023-0020"},{"key":"13_CR3","unstructured":"Akavia, A., Oren, N., Sapir, B., Vald, M.: Compact storage for homomorphic encryption. Cryptology ePrint Archive (2022)"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Al Badawi, A., et al.: Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs. IEEE Trans. Emerg. Topics Comput. (2020). https:\/\/doi.org\/10.1109\/TETC.2020.3014636, conference Name: IEEE Transactions on Emerging Topics in Computing","DOI":"10.1109\/TETC.2020.3014636"},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"Al Badawi, A., et al.: OpenFHE: open-source fully homomorphic encryption library. in: proceedings of the 10th workshop on encrypted computing & applied homomorphic cryptography, pp. 53\u201363. WAHC\u201922, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3560827.3563379 event-place: Los Angeles, CA, USA","DOI":"10.1145\/3560827.3563379"},{"key":"13_CR6","unstructured":"Amazon.com, I.: Amazon alexa voice ai, alexa developer offical site. https:\/\/developer.amazon.com\/en-US\/alexa Accessed 17 Oct 2023"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Boemer, F., Costache, A., Cammarota, R., Wierzynski, C.: ngraph-he2: A high-throughput framework for neural network inference on encrypted data. In: Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 45\u201356 (2019)","DOI":"10.1145\/3338469.3358944"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Boemer, F., Lao, Y., Cammarota, R., Wierzynski, C.: ngraph-he: a graph compiler for deep learning on homomorphically encrypted data. In: Proceedings of the 16th ACM International Conference on Computing Frontiers, pp. 3\u201313 (2019)","DOI":"10.1145\/3310273.3323047"},{"key":"13_CR9","unstructured":"Brutzkus, A., Gilad-Bachrach, R., Elisha, O.: Low latency privacy preserving inference. In: International Conference on Machine Learning, pp. 812\u2013821. PMLR (2019)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Cai, Y., Zhang, Q., Ning, R., Xin, C., Wu, H.: Hunter: he-friendly structured pruning for efficient privacy-preserving deep learning. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 931\u2013945 (2022)","DOI":"10.1145\/3488932.3517401"},{"key":"13_CR11","first-page":"35","volume":"2017","author":"H Chabanne","year":"2017","unstructured":"Chabanne, H., de Wargny, A., Milgram, J., Morel, C., Prouff, E.: Privacy-preserving classification on deep neural network. IACR Cryptol. ePrint Arch. 2017, 35 (2017)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Chaudhari, H., Rachuri, R., Suresh, A.: Trident: efficient 4pc framework for privacy preserving machine learning. In: Proceedings 2020 Network and Distributed System Security Symposium. NDSS 2020, Internet Society (2020). https:\/\/doi.org\/10.14722\/ndss.2020.23005, http:\/\/dx.doi.org\/10.14722\/ndss.2020.23005","DOI":"10.14722\/ndss.2020.23005"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-030-10970-7_16","volume-title":"Selected Areas in Cryptography \u2013 SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15\u201317, 2018, Revised Selected Papers","author":"JH Cheon","year":"2019","unstructured":"Cheon, J.H., Han, K., Kim, A., Kim, M., Song, Y.: A full RNS variant of approximate homomorphic encryption. In: Cid, C., Jacobson, M.J. (eds.) Selected Areas in Cryptography \u2013 SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15\u201317, 2018, Revised Selected Papers, pp. 347\u2013368. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_16"},{"key":"13_CR14","unstructured":"Choi, W.S., Reagen, B., Wei, G.Y., Brooks, D.: Impala: Low-Latency, Communication-Efficient Private Deep Learning Inference. arXiv preprint arXiv:2205.06437 (2022)"},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"Dathathri, R., et al.: CHET: an optimizing compiler for fully-homomorphic neural-network inferencing. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 142\u2013156. PLDI 2019, Association for Computing Machinery, New York, NY, USA (Jun 2019). https:\/\/doi.org\/10.1145\/3314221.3314628, https:\/\/doi.org\/10.1145\/3314221.3314628","DOI":"10.1145\/3314221.3314628 10.1145\/3314221.3314628"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11886-013-0441-8","volume":"16","author":"SE Dilsizian","year":"2014","unstructured":"Dilsizian, S.E., Siegel, E.L.: Artificial intelligence in medicine and cardiac imaging: harnessing big data and advanced computing to provide personalized medical diagnosis and treatment. Curr. Cardiol. Rep. 16, 1\u20138 (2014)","journal-title":"Curr. Cardiol. Rep."},{"key":"13_CR17","unstructured":"Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013210 (2016)"},{"issue":"3\u20134","key":"13_CR18","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"13_CR19","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press (2016). http:\/\/www.deeplearningbook.org"},{"key":"13_CR20","unstructured":"Google, I.: Bard - chat based ai tool from google, powered by palm2. https:\/\/bard.google.com\/ Accessed 17 Oct 2023"},{"key":"13_CR21","unstructured":"Google, I.: Google assitant, your own personal google. https:\/\/assistant.google.com\/Accessed 17 Oct 2023"},{"key":"13_CR22","unstructured":"Grammarly, I.: Grammarly: free writing ai assistance. https:\/\/www.grammarly.com\/Accessed 17 Oct 2023"},{"key":"13_CR23","unstructured":"Hao, M., Li, H., Chen, H., Xing, P., Xu, G., Zhang, T.: Iron: Private Inference on Transformers. In: Advances in Neural Information Processing Systems (2022)"},{"key":"13_CR24","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)"},{"key":"13_CR25","doi-asserted-by":"publisher","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: Deep Neural networks classification over encrypted data. In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, pp. 97\u2013108. ACM, Richardson Texas USA (Mar 2019). https:\/\/doi.org\/10.1145\/3292006.3300044","DOI":"10.1145\/3292006.3300044"},{"key":"13_CR26","unstructured":"Huang, Z., Lu, W.j., Hong, C., Ding, J.: Cheetah: Lean and Fast Secure $$two-party$$ Deep Neural Network Inference. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 809\u2013826 (2022)"},{"key":"13_CR27","unstructured":"Inc., A.: Siri - apple. https:\/\/www.apple.com\/siri\/ Accessed 17 Oct 2023"},{"key":"13_CR28","doi-asserted-by":"publisher","unstructured":"Jiang, X., Kim, M., Lauter, K., Song, Y.: Secure outsourced matrix computation and application to neural networks. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 1209\u20131222. ACM, Toronto Canada (Oct 2018). https:\/\/doi.org\/10.1145\/3243734.3243837","DOI":"10.1145\/3243734.3243837"},{"key":"13_CR29","unstructured":"Juvekar, C., Vaikuntanathan, V., Chandrakasan, A.: GAZELLE: a low latency framework for secure neural network inference. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1651\u20131669 (2018)"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Kashyap, A., Plis, S., Ritter, P., Keilholz, S.: A deep learning approach to estimating initial conditions of brain network models in reference to measured fmri data. Front. Neurosci. 17 (2023)","DOI":"10.3389\/fnins.2023.1159914"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Kim, D., Park, J., Kim, J., Kim, S., Ahn, J.H.: HyPHEN: A Hybrid Packing Method and Optimizations for Homomorphic Encryption-Based Neural Networks. arXiv preprint arXiv:2302.02407 (2023)","DOI":"10.1109\/ACCESS.2023.3348170"},{"key":"13_CR32","unstructured":"Krizhevsky, A., Hinton, G.: Learning multiple layers of features from tiny images,: publisher: Toronto. ON, Canada (2009)"},{"key":"13_CR33","unstructured":"Lee, E., et al.: Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions. In: International Conference on Machine Learning, pp. 12403\u201312422. PMLR (2022)"},{"key":"13_CR34","doi-asserted-by":"publisher","unstructured":"Lee, J.W., et al.: Privacy-Preserving Machine Learning With Fully Homomorphic Encryption for Deep Neural Network. IEEE Access 10, 30039\u201330054 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3159694, conference Name: IEEE Access","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"13_CR35","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1007\/978-3-030-77870-5_23","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part I","author":"B Li","year":"2021","unstructured":"Li, B., Micciancio, D.: On the security of homomorphic encryption on approximate numbers. In: Canteaut, A., Standaert, F.-X. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part I, pp. 648\u2013677. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_23"},{"key":"13_CR36","doi-asserted-by":"publisher","unstructured":"Li, S., et al.: FALCON: a fourier transform based approach for fast and secure convolutional neural network predictions. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 8702\u20138711. IEEE, Seattle, WA, USA (Jun 2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.00873, https:\/\/ieeexplore.ieee.org\/document\/9156980\/","DOI":"10.1109\/CVPR42600.2020.00873"},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via minionn transformations. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 619\u2013631 (2017)","DOI":"10.1145\/3133956.3134056"},{"key":"13_CR38","doi-asserted-by":"publisher","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338 (May 2017). https:\/\/doi.org\/10.1109\/SP.2017.12, iSSN: 2375-1207","DOI":"10.1109\/SP.2017.12"},{"key":"13_CR39","unstructured":"OpenAI: Chatgpt. https:\/\/openai.com\/chatgpt Accessed 17 Oct 2023"},{"key":"13_CR40","unstructured":"Papernot, N., Song, S., Mironov, I., Raghunathan, A., Talwar, K., Erlingsson, U.: Scalable private learning with pate. arXiv preprint arXiv:1802.08908 (2018)"},{"key":"13_CR41","unstructured":"Podschwadt, R., Takabi, D.: Classification of encrypted word embeddings using recurrent neural networks. In: PrivateNLP@ WSDM, pp. 27\u201331 (2020)"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Podschwadt, R., Takabi, D.: Non-interactive privacy preserving recurrent neural network prediction with homomorphic encryption. In: 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), pp. 65\u201370. IEEE (2021)","DOI":"10.1109\/CLOUD53861.2021.00019"},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Shivdikar, K., et al.: Accelerating polynomial multiplication for homomorphic encryption on gpus. In: 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), pp. 61\u201372. IEEE (2022)","DOI":"10.1109\/SEED55351.2022.00013"},{"issue":"1","key":"13_CR44","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10623-012-9720-4","volume":"71","author":"N. P. Smart","year":"2014","unstructured":"Smart, N.. P.., Vercauteren, F..: Fully homomorphic SIMD operations. Designs, Codes and Cryptography 71(1), 57\u201381 (2014). https:\/\/doi.org\/10.1007\/s10623-012-9720-4","journal-title":"Designs, Codes and Cryptography"},{"key":"13_CR45","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing Machine Learning Models via Prediction \\$\\$apis\\$\\$. In: 25th USENIX security symposium (USENIX Security 16), pp. 601\u2013618 (2016)"},{"key":"13_CR46","doi-asserted-by":"crossref","unstructured":"Zheng, M., Lou, Q., Jiang, L.: Primer: fast private transformer inference on encrypted data (Mar 2023). arXiv:2303.13679 [cs]","DOI":"10.1109\/DAC56929.2023.10247719"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54773-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:11:31Z","timestamp":1709655091000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54773-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547720","9783031547737"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54773-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}