{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T18:22:22Z","timestamp":1762107742563,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031651748"},{"type":"electronic","value":"9783031651755"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-65175-5_34","type":"book-chapter","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T14:43:01Z","timestamp":1721918581000},"page":"481-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Predicting the\u00a0Execution Time of Secure Neural Network Inference"],"prefix":"10.1007","author":[{"given":"Eloise","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zolt\u00e1n \u00c1d\u00e1m","family":"Mann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,26]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Alzubaidi, L., Zhang, J., Humaidi, A.J., et\u00a0al.: Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. J. Big Data 8, art. 53 (2021)","DOI":"10.1186\/s40537-021-00444-8"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Asperti, A., Evangelista, D., Marzolla, M.: Dissecting FLOPs along input dimensions for GreenAI cost estimations. In: International Conference on Machine Learning, Optimization, and Data Science, pp. 86\u2013100 (2021)","DOI":"10.1007\/978-3-030-95470-3_7"},{"key":"34_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127257","volume":"573","author":"SS Basha","year":"2024","unstructured":"Basha, S.S., Farazuddin, M., Pulabaigari, V., Dubey, S.R., Mukherjee, S.: Deep model compression based on the training history. Neurocomputing 573, 127257 (2024)","journal-title":"Neurocomputing"},{"key":"34_CR4","unstructured":"Bian, S., Jiang, W., Lu, Q., Shi, Y., Sato, T.: NASS: optimizing secure inference via neural architecture search. In: ECAI. Frontiers in Artificial Intelligence and Applications, vol.\u00a0325, pp. 1746\u20131753. IOS Press (2020)"},{"key":"34_CR5","unstructured":"Brutzkus, A., Gilad-Bachrach, R., Elisha, O.: Low latency privacy preserving inference. In: International Conference on Machine Learning, pp. 812\u2013821 (2019)"},{"key":"34_CR6","unstructured":"Cai, E., Juan, D.C., Stamoulis, D., Marculescu, D.: Neuralpower: predict and deploy energy-efficient convolutional neural networks. In: Asian Conference on Machine Learning, pp. 622\u2013637. PMLR (2017)"},{"key":"34_CR7","unstructured":"Chabal, D., Sapra, D., Mann, Z.\u00c1.: On achieving privacy-preserving state-of-the-art edge intelligence. In: 4th AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-23) (2023)"},{"key":"34_CR8","series-title":"The Springer Series on Challenges in Machine Learning","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-05318-5_1","volume-title":"Automated Machine Learning","author":"M Feurer","year":"2019","unstructured":"Feurer, M., Hutter, F.: Hyperparameter optimization. In: Hutter, F., Kotthoff, L., Vanschoren, J. (eds.) Automated Machine Learning. The Springer Series on Challenges in Machine Learning, pp. 3\u201333. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05318-5_1"},{"key":"34_CR9","first-page":"16961","volume":"33","author":"Z Ghodsi","year":"2020","unstructured":"Ghodsi, Z., Veldanda, A.K., Reagen, B., Garg, S.: CryptoNAS: private inference on a ReLU budget. Adv. Neural Inf. Process. Syst. 33, 16961\u201316971 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"10","key":"34_CR10","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff, K., Srivastava, R.K., Koutn\u00edk, J., Steunebrink, B.R., Schmidhuber, J.: LSTM: a search space odyssey. IEEE Trans. Neural Netw. Learn. Syst. 28(10), 2222\u20132232 (2016)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"issue":"8","key":"34_CR12","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"34_CR14","unstructured":"Huang, Z., Lu, W.J., Hong, C., Ding, J.: Cheetah: lean and fast secure two-party deep neural network inference. In: 31st USENIX Security, pp. 809\u2013826 (2022)"},{"key":"34_CR15","unstructured":"Iandola, F.N., Han, S., Moskewicz, M.W., Ashraf, K., Dally, W.J., Keutzer, K.: SqueezeNet: alexnet-level accuracy with 50x fewer parameters and $$<$$0.5 MB model size. arXiv preprint arXiv:1602.07360 (2016)"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Jeon, B., Park, S., Liao, P., Xu, S., Chen, T., Jia, Z.: Collage: seamless integration of deep learning backends with automatic placement. In: International Conference on Parallel Architectures and Compilation Techniques, pp. 517\u2013529 (2022)","DOI":"10.1145\/3559009.3569651"},{"key":"34_CR17","first-page":"4961","volume":"34","author":"B Knott","year":"2021","unstructured":"Knott, B., Venkataraman, S., Hannun, A., Sengupta, S., Ibrahim, M., van der Maaten, L.: CrypTen: secure multi-party computation meets machine learning. Adv. Neural Inf. Process. Syst. 34, 4961\u20134973 (2021)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Kumar, N., Rathee, M., Chandran, N., Gupta, D., Rastogi, A., Sharma, R.: CrypTFlow: secure TensorFlow inference. In: IEEE Symposium on Security and Privacy, pp. 336\u2013353. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00092"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via MiniONN transformations. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 619\u2013631 (2017)","DOI":"10.1145\/3133956.3134056"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Mann, Z.\u00c1., Weinert, C., Chabal, D., Bos, J.W.: Towards practical secure neural network inference: the journey so far and the road ahead. ACM Comput. Surv. 56(5) (2023). article 117","DOI":"10.1145\/3628446"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Mishra, P., Lehmkuhl, R., Srinivasan, A., Zheng, W., Popa, R.A.: Delphi: a cryptographic inference service for neural networks. In: 29th USENIX Security Symposium, pp. 2505\u20132522. USENIX Association (2020)","DOI":"10.1145\/3411501.3419418"},{"key":"34_CR22","doi-asserted-by":"publisher","unstructured":"Prins, J., Mann, Z.\u00c1.: Secure neural network inference for edge intelligence: implications of bandwidth and energy constraints. In: Pal, S., Savaglio, C., Minerva, R., Delicato, F.C. (eds.) IoT Edge Intelligence, pp. 265\u2013288. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58388-9_9","DOI":"10.1007\/978-3-031-58388-9_9"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Rouhani, B.D., Riazi, M.S., Koushanfar, F.: DeepSecure: scalable provably-secure deep learning. In: 55th Design Automation Conference (2018)","DOI":"10.1145\/3195970.3196023"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Shafi, O., Rai, C., Sen, R., Ananthanarayanan, G.: Demystifying TensorRT: characterizing neural network inference engine on Nvidia edge devices. In: IEEE International Symposium on Workload Characterization (IISWC), pp. 226\u2013237 (2021)","DOI":"10.1109\/IISWC53511.2021.00030"},{"key":"34_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D 404, 132306 (2020)","journal-title":"Physica D"},{"key":"34_CR26","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-030-68176-0_7","volume-title":"The Elements of Big Data Value","author":"T Timan","year":"2021","unstructured":"Timan, T., Mann, Z.: Data protection in the era of artificial intelligence: trends, existing solutions and recommendations for privacy-preserving technologies. In: Curry, E., Metzger, A., Zillner, S., Pazzaglia, J.-C., Garc\u00eda Robles, A. (eds.) The Elements of Big Data Value, pp. 153\u2013175. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68176-0_7"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"de\u00a0Vries, R., Mann, Z.\u00c1.: Secure neural network inference as a service with resource-constrained clients. In: Proceedings of the IEEE\/ACM 16th International Conference on Utility and Cloud Computing, art. 8 (2023)","DOI":"10.1145\/3603166.3632132"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-65175-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T14:48:12Z","timestamp":1721918892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-65175-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031651748","9783031651755"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-65175-5_34","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipsec2024.co.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}