{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:13:55Z","timestamp":1743117235103,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031611360"},{"type":"electronic","value":"9783031611377"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61137-7_16","type":"book-chapter","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T07:10:33Z","timestamp":1717053033000},"page":"163-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Private Inference on\u00a0Layered Spiking Neural P Systems"],"prefix":"10.1007","author":[{"given":"Mihail-Iulian","family":"Ple\u015fsa","sequence":"first","affiliation":[]},{"given":"Marian","family":"Gheoghe","sequence":"additional","affiliation":[]},{"given":"Florentin","family":"Ipate","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"issue":"4","key":"16_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. (Csur) 51(4), 1\u201335 (2018)","journal-title":"ACM Comput. Surv. (Csur)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S., et al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inform. Forensics Sec. 13(5), 1333\u20131345 (2017)","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. Cryptology ePrint Archive (2014)","DOI":"10.14722\/ndss.2015.23241"},{"key":"16_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100608","volume":"51","author":"AK Chattopadhyay","year":"2024","unstructured":"Chattopadhyay, A.K., Saha, S., Nag, A., Nandi, S.: Secret sharing: a comprehensive survey, taxonomy and applications. Comput. Sci. Rev. 51, 100608 (2024)","journal-title":"Comput. Sci. Rev."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Doan, T.V.T., Messai, M.L., Gavin, G., Darmont, J.: A survey on implementations of homomorphic encryption schemes. J. Supercomput., 1\u201342 (2023)","DOI":"10.21203\/rs.3.rs-2018739\/v2"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.comcom.2019.04.011","volume":"140","author":"J Domingo-Ferrer","year":"2019","unstructured":"Domingo-Ferrer, J., Farras, O., Ribes-Gonz\u00e1lez, J., S\u00e1nchez, D.: Privacy-preserving cloud computing on sensitive data: a survey of methods, products and challenges. Comput. Commun. 140, 38\u201360 (2019)","journal-title":"Comput. Commun."},{"issue":"3","key":"16_CR7","first-page":"552","volume":"105","author":"N Dowlin","year":"2017","unstructured":"Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Manual for using homomorphic encryption for bioinformatics. Proc. IEEE 105(3), 552\u2013567 (2017)","journal-title":"Proc. IEEE"},{"issue":"08","key":"16_CR8","doi-asserted-by":"publisher","first-page":"1950004","DOI":"10.1142\/S0129065719500047","volume":"29","author":"F Gal\u00e1n-Prado","year":"2019","unstructured":"Gal\u00e1n-Prado, F., Mor\u00e1n, A., Font, J., Roca, M., Rossell\u00f3, J.L.: Compact hardware synthesis of stochastic spiking neural networks. Int. J. Neural Syst. 29(08), 1950004 (2019)","journal-title":"Int. J. Neural Syst."},{"issue":"3","key":"16_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.3233\/ICA-2007-14301","volume":"14","author":"S Ghosh-Dastidar","year":"2007","unstructured":"Ghosh-Dastidar, S., Adeli, H.: Improved spiking neural networks for eeg classification and epilepsy and seizure detection. Integrated Comput.-Aided Eng. 14(3), 187\u2013212 (2007)","journal-title":"Integrated Comput.-Aided Eng."},{"issue":"04","key":"16_CR10","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1142\/S0129065709002002","volume":"19","author":"S Ghosh-Dastidar","year":"2009","unstructured":"Ghosh-Dastidar, S., Adeli, H.: Spiking neural networks. Int. J. Neural Syst. 19(04), 295\u2013308 (2009)","journal-title":"Int. J. Neural Syst."},{"key":"16_CR11","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013210. PMLR (2016)"},{"issue":"05","key":"16_CR12","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1142\/S0129065799000502","volume":"9","author":"C Grassmann","year":"1999","unstructured":"Grassmann, C., Anlauf, J.K.: Fast digital simulation of spiking neural networks and neuromorphic integration with spikelab. Int. J. Neural Syst. 9(05), 473\u2013478 (1999)","journal-title":"Int. J. Neural Syst."},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-030-58607-2_23","volume-title":"Computer Vision \u2013 ECCV 2020","author":"B Han","year":"2020","unstructured":"Han, B., Roy, K.: Deep spiking neural network: energy efficiency through time based coding. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12355, pp. 388\u2013404. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58607-2_23"},{"key":"16_CR14","unstructured":"Ionescu, M., P\u0103un, G., Yokomori, T.: Spiking neural P systems. Fundamenta informaticae 71(2-3), 279\u2013308 (2006)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to modern cryptography: principles and protocols. Chapman and hall\/CRC (2007)","DOI":"10.1201\/9781420010756"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Kim, Y., Venkatesha, Y., Panda, P.: Privatesnn: privacy-preserving spiking neural networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 1192\u20131200 (2022)","DOI":"10.1609\/aaai.v36i1.20005"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-65277-7_8","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2020","author":"N Kobeissi","year":"2020","unstructured":"Kobeissi, N., Nicolas, G., Tiwari, M.: Verifpal: cryptographic protocol analysis for the real world. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) INDOCRYPT 2020. LNCS, vol. 12578, pp. 151\u2013202. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65277-7_8"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Lobo, J.L., Del Ser, J., Bifet, A., Kasabov, N.: Spiking neural networks and online learning. An Overview Perspect. Neural Netw. 121, 88\u2013100 (2020)","DOI":"10.1016\/j.neunet.2019.09.004"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Long, L., et al.: A time series forecasting approach based on nonlinear spiking neural systems. Int. J. Neural Syst. 32(08), 2250020 (2022)","DOI":"10.1142\/S0129065722500204"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Madni, H.A., Umer, R.M., Foresti, G.L.: Swarm-fhe: fully homomorphic encryption-based swarm learning for malicious clients. Inter. J. Neural Syst., 2350033 (2023)","DOI":"10.1142\/S0129065723500338"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48405-1_3","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Nguyen","year":"1999","unstructured":"Nguyen, P., Stern, J.: The hardness of the hidden subset sum problem and its cryptographic implications. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 31\u201346. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_3"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223\u2013238. Springer (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"16_CR23","unstructured":"Plesa, M.I.: LSNP-Simulator. https:\/\/github.com\/miiip\/LSNP-Simulator (2024), (Accessed 28 February 2024)"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Rovida, L., Leporati, A.: Encrypted image classification with low memory footprint using fully homomorphic encryption. Inter. J. Neural Syst. (2024)","DOI":"10.1142\/S0129065724500254"},{"key":"16_CR25","unstructured":"Schuman, C.D., et al.: A survey of neuromorphic computing and neural networks in hardware. arXiv preprint arXiv:1705.06963 (2017)"},{"issue":"1","key":"16_CR26","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/ICA-200618","volume":"28","author":"H Siqueira","year":"2021","unstructured":"Siqueira, H., Santana, C., Macedo, M., Figueiredo, E., Gokhale, A., Bastos-Filho, C.: Simplified binary cat swarm optimization. Integra. Comput.-Aided Eng. 28(1), 35\u201350 (2021)","journal-title":"Integra. Comput.-Aided Eng."},{"key":"16_CR27","doi-asserted-by":"publisher","first-page":"167425","DOI":"10.1109\/ACCESS.2020.3023084","volume":"8","author":"HC Tanuwidjaja","year":"2020","unstructured":"Tanuwidjaja, H.C., Choi, R., Baek, S., Kim, K.: Privacy-preserving deep learning on machine learning as a service-a comprehensive survey. IEEE Access 8, 167425\u2013167447 (2020)","journal-title":"IEEE Access"},{"key":"16_CR28","unstructured":"Vaila, R., Chiasson, J., Saxena, V.: Deep convolutional spiking neural networks for image classification. arXiv preprint arXiv:1903.12272 (2019)"},{"key":"16_CR29","doi-asserted-by":"publisher","first-page":"6183","DOI":"10.1109\/TSP.2021.3121632","volume":"69","author":"Y Venkatesha","year":"2021","unstructured":"Venkatesha, Y., Kim, Y., Tassiulas, L., Panda, P.: Federated learning with spiking neural networks. IEEE Trans. Signal Process. 69, 6183\u20136194 (2021)","journal-title":"IEEE Trans. Signal Process."},{"issue":"4","key":"16_CR30","doi-asserted-by":"publisher","first-page":"361","DOI":"10.3233\/ICA-130442","volume":"20","author":"X Wang","year":"2013","unstructured":"Wang, X., Wang, Y., Cui, Y.: Energy and locality aware load balancing in cloud computing. Integrat. Comput.-Aided Eng. 20(4), 361\u2013374 (2013)","journal-title":"Integrat. Comput.-Aided Eng."},{"issue":"05","key":"16_CR31","doi-asserted-by":"publisher","first-page":"1440004","DOI":"10.1142\/S0129065714400048","volume":"24","author":"Z Wang","year":"2014","unstructured":"Wang, Z., Guo, L., Adjouadi, M.: A generalized leaky integrate-and-fire neuron model with fast implementation method. Int. J. Neural Syst. 24(05), 1440004 (2014)","journal-title":"Int. J. Neural Syst."},{"key":"16_CR32","doi-asserted-by":"publisher","first-page":"135606","DOI":"10.1109\/ACCESS.2019.2941772","volume":"7","author":"AR Young","year":"2019","unstructured":"Young, A.R., Dean, M.E., Plank, J.S., Rose, G.S.: A review of spiking neuromorphic hardware communication systems. IEEE Access 7, 135606\u2013135620 (2019)","journal-title":"IEEE Access"},{"issue":"08","key":"16_CR33","doi-asserted-by":"publisher","first-page":"2250023","DOI":"10.1142\/S012906572250023X","volume":"32","author":"G Zhang","year":"2022","unstructured":"Zhang, G., Zhang, X., Rong, H., Paul, P., Zhu, M., Neri, F., Ong, Y.-S.: A layered spiking neural system for classification problems. Int. J. Neural Syst. 32(08), 2250023 (2022)","journal-title":"Int. J. Neural Syst."},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Zhou, C., Ye, L., Peng, H., Liu, Z., Wang, J., Ramirez-de Arellano, A.: A parallel convolutional network based on spiking neural systems. Inter. J. Neural Syst. (2024)","DOI":"10.1142\/S0129065724500229"}],"container-title":["Lecture Notes in Computer Science","Bioinspired Systems for Translational Applications: From Robotics to Social Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61137-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T07:14:30Z","timestamp":1717053270000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61137-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031611360","9783031611377"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61137-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWINAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Work-Conference on the Interplay Between Natural and Artificial Computation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Olh\u00e2o","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwinac2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwinac.eu\/iwinac.org\/iwinac2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}