{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T23:15:43Z","timestamp":1761174943805,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":84,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032017987","type":"print"},{"value":"9783032017994","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01799-4_10","type":"book-chapter","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T07:47:34Z","timestamp":1761119254000},"page":"163-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting Privacy in\u00a0IoT-Based Deep Learning: State-of-the-Art Methods and\u00a0Challenges"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6967-8800","authenticated-orcid":false,"given":"Martin","family":"Nocker","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3562-5265","authenticated-orcid":false,"given":"Florian","family":"Merkle","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-9188","authenticated-orcid":false,"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6968-295X","authenticated-orcid":false,"given":"Matthias","family":"Janetschek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: ACM Conference on Computer and Communications Security (CCS), pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"495","DOI":"10.3390\/en16010495","volume":"16","author":"MS Abdalzaher","year":"2023","unstructured":"Abdalzaher, M.S., Elsayed, H.A., Fouda, M.M., Salim, M.M.: Employing machine learning and IoT for earthquake early warning system in smart cities. Energies 16(1), 495 (2023)","journal-title":"Energies"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Aharoni, E., et\u00a0al.: Efficient pruning for machine learning under homomorphic encryption. In: European Symposium on Research in Computer Security, pp. 204\u2013225. Springer (2023)","DOI":"10.1007\/978-3-031-51482-1_11"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ak\u0131n, Y., Klemsa, J., \u00d6nen, M.: A practical TFHE-based multi-key homomorphic encryption with linear complexity and low noise growth. In: European Symposium on Research in Computer Security, pp. 3\u201323. Springer (2023)","DOI":"10.1007\/978-3-031-50594-2_1"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.ins.2023.03.033","volume":"632","author":"R Al-Huthaifi","year":"2023","unstructured":"Al-Huthaifi, R., Li, T., Huang, W., Gu, J., Li, C.: Federated learning in smart cities: privacy and security survey. Inf. Sci. 632, 833\u2013857 (2023)","journal-title":"Inf. Sci."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Annamalai, M.S.M.S., Bilogrevic, I., De\u00a0Cristofaro, E.: FP-Fed: privacy-preserving federated detection of browser fingerprinting. In: Symposium on Network and Distributed System Security (2024)","DOI":"10.14722\/ndss.2024.24360"},{"key":"10_CR7","unstructured":"Ao, W., Boddeti, V.N.: AutoFHE: automated adaption of CNNs for efficient evaluation over FHE. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 2173\u20132190 (2024)"},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1504\/IJSN.2015.071829","volume":"10","author":"G Ateniese","year":"2015","unstructured":"Ateniese, G., Mancini, L.V., Spognardi, A., Villani, A., Vitali, D., Felici, G.: Hacking smart machines with smarter ones: how to extract meaningful data from machine learning classifiers. Int. J. Secure. Network. 10(3), 137\u2013150 (2015)","journal-title":"Int. J. Secure. Network."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.mfglet.2020.04.011","volume":"24","author":"B Bagheri","year":"2020","unstructured":"Bagheri, B., Rezapoor, M., Lee, J.: A unified data security framework for federated prognostics and health management in smart manufacturing. Manufact. Lett. 24, 136\u2013139 (2020)","journal-title":"Manufact. Lett."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Advances in Cryptology \u2013 CRYPTO \u201992, pp. 420\u2013432. Springer (1992)","DOI":"10.1007\/3-540-46766-1_34"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. In: ACM Conference on Computer and Communications Security (CCS), pp. 2154\u20132156 (2018)","DOI":"10.1145\/3243734.3264418"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Boenisch, F., Dziedzic, A., Schuster, R., Shamsabadi, A.S., Shumailov, I., Papernot, N.: When the curious abandon honesty: federated learning is not private. In: IEEE European Symposium on Security and Privacy (EuroS &P), pp. 175\u2013199 (2023)","DOI":"10.1109\/EuroSP57164.2023.00020"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.neucom.2019.11.041","volume":"384","author":"A Boulemtafes","year":"2020","unstructured":"Boulemtafes, A., Derhab, A., Challal, Y.: A review of privacy-preserving techniques for deep learning. Neurocomputing 384, 21\u201345 (2020)","journal-title":"Neurocomputing"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Briggs, C., Fan, Z., Andras, P.: A review of privacy-preserving federated learning for the internet-of-things. Federated Learning Systems: Towards Next-Generation AI, pp. 21\u201350 (2021)","DOI":"10.1007\/978-3-030-70604-3_2"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Chaudhari, H., Rachuri, R., Suresh, A.: Trident: efficient 4PC framework for privacy preserving machine learning. In: Symposium on Network and Distributed System Security (2020)","DOI":"10.14722\/ndss.2020.23005"},{"issue":"6","key":"10_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.2018.1800110","volume":"32","author":"M Chen","year":"2018","unstructured":"Chen, M., Hao, Y., Lin, K., Yuan, Z., Hu, L.: Label-less learning for traffic control in an edge network. IEEE Network 32(6), 8\u201314 (2018)","journal-title":"IEEE Network"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 409\u2013437. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_15"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34\u201391 (2020)","journal-title":"J. Cryptol."},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","volume":"144","author":"A \u010colakovi\u0107","year":"2018","unstructured":"\u010colakovi\u0107, A., Had\u017eiali\u0107, M.: Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17\u201339 (2018)","journal-title":"Comput. Netw."},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Daji, D., Ghule, K., Gagdani, S., Butala, A., Talele, P., Kamat, H.: Cloud-based asset monitoring and predictive maintenance in an industrial IoT system. In: 2020 International Conference for Emerging Technology (INCET), pp.\u00a01\u20135. IEEE (2020)","DOI":"10.1109\/INCET49848.2020.9154148"},{"key":"10_CR21","unstructured":"Diaa, A., et al.: Fast and private inference of deep neural networks by co-designing activation functions. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 2191\u20132208 (2024)"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486\u2013503. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_29"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Elsisi, M., Amer, M., Su, C.L., et\u00a0al.: A comprehensive review of machine learning and IoT solutions for demand side energy management, conservation, and resilient operation. Energy 128256 (2023)","DOI":"10.1016\/j.energy.2023.128256"},{"key":"10_CR24","unstructured":"Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., Cranor, L.F.: Are consumers willing to pay for security and privacy of IoT devices? In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 1505\u20131522 (2023)"},{"key":"10_CR25","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)"},{"issue":"2","key":"10_CR26","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.dcan.2023.01.022","volume":"9","author":"B Farahani","year":"2023","unstructured":"Farahani, B., Monsefi, A.K.: Smart and collaborative industrial IoT: a federated learning and data space approach. Digital Commun. Netw. 9(2), 436\u2013447 (2023)","journal-title":"Digital Commun. Netw."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Feng, C., Xu, N., Wen, W., Venkitasubramaniam, P., Ding, C.: Spectral-DP: Differentially private deep learning through spectral perturbation and filtering. In: IEEE Symposium on Security and Privacy (SP), pp. 1944\u20131960 (2023)","DOI":"10.1109\/SP46215.2023.10179457"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: ACM Conference on Computer and Communications Security (CCS), pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"10_CR29","unstructured":"Ganesh, A., et al.: Why is public pretraining necessary for private model training? In: Proceedings of the 40th International Conference on Machine Learning. vol.\u00a0202, pp. 10611\u201310627 (2023)"},{"issue":"2","key":"10_CR30","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/TIT.2015.2504967","volume":"62","author":"Q Geng","year":"2016","unstructured":"Geng, Q., Viswanath, P.: The optimal noise-adding mechanism in differential privacy. IEEE Trans. Inf. Theory 62(2), 925\u2013951 (2016)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"10_CR32","unstructured":"Goodfellow, I.: Efficient per-example gradient computations. arXiv preprint arXiv:1510.017992015 (2015)"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Gotarane, V., Raskar, S.: IoT practices in military applications. In: 3rd International Conference on Trends in Electronics and Informatics, pp. 891\u2013894 (2019)","DOI":"10.1109\/ICOEI.2019.8862559"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.future.2018.12.001","volume":"98","author":"L Haoyu","year":"2019","unstructured":"Haoyu, L., Jianxing, L., Arunkumar, N., Hussein, A.F., Jaber, M.M.: An IoMT cloud-based real time sleep apnea detection scheme by using the SpO2 estimation supported by heart rate variability. Futur. Gener. Comput. Syst. 98, 69\u201377 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Hussain, S.U., Javaheripi, M., Samragh, M., Koushanfar, F.: COINN: Crypto\/ML codesign for oblivious inference via neural networks. In: ACM Conference on Computer and Communications Security (CCS), pp. 3266\u20133281 (2021)","DOI":"10.1145\/3460120.3484797"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Islam, M.S., Zamani, M., Kim, C.H., Khan, L., Hamlen, K.W.: Confidential execution of deep learning inference at the untrusted edge with arm TrustZone. In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, pp. 153\u2013164 (2023)","DOI":"10.1145\/3577923.3583648"},{"key":"10_CR37","first-page":"748","volume":"31","author":"R Ito","year":"2023","unstructured":"Ito, R., Liew, S.P., Takahashi, T., Sasaki, Y., Onizuka, M.: Scaling private deep learning with low-rank and sparse gradients. J. Inf. Process. 31, 748\u2013757 (2023)","journal-title":"J. Inf. Process."},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Jarin, I., Eshete, B.: DP-UTIL: comprehensive utility analysis of differential privacy in machine learning. In: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy, pp. 41\u201352 (2022)","DOI":"10.1145\/3508398.3511513"},{"key":"10_CR39","unstructured":"Keller, M., Sun, K.: Secure quantized training for deep learning. In: International Conference on Machine Learning (ICML), pp. 10912\u201310938. PMLR (2022)"},{"key":"10_CR40","unstructured":"Kim, T., Kwak, H., Lee, D., Seo, J., Song, Y.: Asymptotically faster multi-key homomorphic encryption from homomorphic gadget decomposition. Cryptology ePrint Archive, Paper 2022\/347 (2022). https:\/\/eprint.iacr.org\/2022\/347"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Lee, J., Kifer, D.: Scaling up differentially private deep learning with fast per-example gradient clipping. Proc. Priv. Enhancing Technol. 2021(1) (2021)","DOI":"10.2478\/popets-2021-0008"},{"key":"10_CR42","unstructured":"Lehmkuhl, R., Mishra, P., Srinivasan, A., Popa, R.A.: Muse: secure inference resilient to malicious clients. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 2201\u20132218 (2021)"},{"issue":"5","key":"10_CR43","doi-asserted-by":"publisher","first-page":"3137","DOI":"10.1109\/TIE.2016.2519325","volume":"63","author":"Y Lei","year":"2016","unstructured":"Lei, Y., Jia, F., Lin, J., Xing, S., Ding, S.X.: An intelligent fault diagnosis method using unsupervised feature learning towards mechanical big data. IEEE Trans. Industr. Electron. 63(5), 3137\u20133147 (2016)","journal-title":"IEEE Trans. Industr. Electron."},{"issue":"1","key":"10_CR44","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/JIOT.2018.2864168","volume":"6","author":"C Li","year":"2019","unstructured":"Li, C., Palanisamy, B.: Privacy in Internet of Things: from principles to technologies. IEEE Internet Things J. 6(1), 488\u2013505 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"10_CR45","doi-asserted-by":"publisher","first-page":"4665","DOI":"10.1109\/TII.2018.2842821","volume":"14","author":"L Li","year":"2018","unstructured":"Li, L., Ota, K., Dong, M.: Deep learning for smart industry: efficient manufacture inspection system with fog computing. IEEE Trans. Industr. Inf. 14(10), 4665\u20134673 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Liu, H., Li, C., Liu, B., Wang, P., Ge, S., Wang, W.: Differentially private learning with grouped gradient clipping. In: ACM Multimedia Asia (MMAsia) (2022)","DOI":"10.1145\/3469877.3490594"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, pp. 1219\u20131234 (2012)","DOI":"10.1145\/2213977.2214086"},{"key":"10_CR48","first-page":"9193","volume":"33","author":"Q Lou","year":"2020","unstructured":"Lou, Q., Feng, B., Charles Fox, G., Jiang, L.: Glyph: Fast and accurately training deep neural networks on encrypted data. Adv. Neural Inf. Process. Syst. (NeurIPS) 33, 9193\u20139202 (2020)","journal-title":"Adv. Neural Inf. Process. Syst. (NeurIPS)"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Lulla, G., Kumar, A., Pole, G., Deshmukh, G.: IoT based smart security and surveillance system. In: 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), pp. 385\u2013390. IEEE (2021)","DOI":"10.1109\/ESCI50559.2021.9396843"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 1\u201323. Springer (2010)","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"10_CR51","doi-asserted-by":"publisher","first-page":"181721","DOI":"10.1109\/ACCESS.2019.2958962","volume":"7","author":"X Ma","year":"2019","unstructured":"Ma, X., et al.: A survey on deep learning empowered IoT applications. IEEE Access 7, 181721\u2013181732 (2019)","journal-title":"IEEE Access"},{"key":"10_CR52","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: International Conference on Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De\u00a0Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706. IEEE (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"10_CR54","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: IEEE Symposium on Security and Privacy (SP), pp. 19\u201338. IEEE (2017)","DOI":"10.1109\/SP.2017.12"},{"issue":"1","key":"10_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-014-0007-7","volume":"2","author":"MM Najafabadi","year":"2015","unstructured":"Najafabadi, M.M., Villanustre, F., Khoshgoftaar, T.M., Seliya, N., Wald, R., Muharemagic, E.: Deep learning applications and challenges in big data analytics. J. Big Data 2(1), 1\u201321 (2015). https:\/\/doi.org\/10.1186\/s40537-014-0007-7","journal-title":"J. Big Data"},{"issue":"3","key":"10_CR56","doi-asserted-by":"publisher","first-page":"756","DOI":"10.46586\/tches.v2021.i3.756-779","volume":"2021","author":"D Natarajan","year":"2021","unstructured":"Natarajan, D., Dai, W.: SEAL-embedded: a homomorphic encryption library for the Internet of Things. IACR Trans. Cryptographic Hardware Embedded Syst. 2021(3), 756\u2013779 (2021)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"10_CR57","doi-asserted-by":"crossref","unstructured":"Natarajan, D., Loveless, A., Dai, W., Dreslinski, R.: Chex-Mix: combining homomorphic encryption with trusted execution environments for oblivious inference in the cloud. In: IEEE European Symposium on Security and Privacy (EuroS &P), pp. 73\u201391. IEEE (2023)","DOI":"10.1109\/EuroSP57164.2023.00014"},{"issue":"1","key":"10_CR58","first-page":"87","volume":"4","author":"AH Ngu","year":"2018","unstructured":"Ngu, A.H., Tseng, P.T., Paliwal, M., Carpenter, C., Stipe, W.: Smartwatch-based IoT fall detection application. Open J. Internet Things (OJIOT) 4(1), 87\u201398 (2018)","journal-title":"Open J. Internet Things (OJIOT)"},{"key":"10_CR59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312","volume":"38","author":"MM Ogonji","year":"2020","unstructured":"Ogonji, M.M., Okeyo, G., Wafula, J.M.: A survey on privacy and security of internet of things. Comput. Sci. Rev. 38, 100312 (2020)","journal-title":"Comput. Sci. Rev."},{"key":"10_CR60","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1613\/jair.1.14000","volume":"76","author":"G Ogunniye","year":"2023","unstructured":"Ogunniye, G., Kokciyan, N.: A survey on understanding and representing privacy requirements in the Internet-of-Things. J. Artif. Intell. Res. 76, 163\u2013192 (2023)","journal-title":"J. Artif. Intell. Res."},{"key":"10_CR61","doi-asserted-by":"crossref","unstructured":"Papernot, N., Thakurta, A., Song, S., Chien, S., Erlingsson, \u00da.: Tempered sigmoid activations for deep learning with differential privacy. In: AAAI Conference on Artificial Intelligence. vol.\u00a035, pp. 9312\u20139321 (2021)","DOI":"10.1609\/aaai.v35i10.17123"},{"key":"10_CR62","doi-asserted-by":"crossref","unstructured":"Patel, V., Kanani, S., Pathak, T., Patel, P., Ali, M.I., Breslin, J.: An intelligent doorbell design using federated deep learning. In: Proceedings of the 3rd ACM India Joint International Conference on Data Science & Management of Data, pp. 380\u2013384 (2021)","DOI":"10.1145\/3430984.3430988"},{"issue":"8","key":"10_CR63","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.3390\/app13084815","volume":"13","author":"J Qian","year":"2023","unstructured":"Qian, J., Zhang, P., Zhu, H., Liu, M., Wang, J., Ma, X.: LHDNN: maintaining high precision and low latency inference of deep neural networks on encrypted data. Appl. Sci. 13(8), 4815 (2023)","journal-title":"Appl. Sci."},{"issue":"21","key":"10_CR64","doi-asserted-by":"publisher","first-page":"15847","DOI":"10.1109\/JIOT.2021.3051080","volume":"8","author":"MA Rahman","year":"2021","unstructured":"Rahman, M.A., Hossain, M.S.: An internet-of-medical-things-enabled edge computing framework for tackling COVID-19. IEEE Internet Things J. 8(21), 15847\u201315854 (2021)","journal-title":"IEEE Internet Things J."},{"key":"10_CR65","doi-asserted-by":"crossref","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM Comput. Surv. 56(4) (2023)","DOI":"10.1145\/3624010"},{"key":"10_CR66","doi-asserted-by":"crossref","unstructured":"Sav, S., et al.: Poseidon: privacy-preserving federated neural network learning. In: Symposium on Network and Distributed System Security (2021)","DOI":"10.14722\/ndss.2021.24119"},{"issue":"1","key":"10_CR67","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s12021-021-09525-8","volume":"20","author":"N Senanayake","year":"2022","unstructured":"Senanayake, N., Podschwadt, R., Takabi, D., Calhoun, V.D., Plis, S.M.: NeuroCrypt: machine learning over encrypted distributed neuroimaging data. Neuroinformatics 20(1), 91\u2013108 (2022)","journal-title":"Neuroinformatics"},{"key":"10_CR68","unstructured":"Serengil, S.I., Ozpinar, A.: LightPHE: Integrating partially homomorphic encryption into python with extensive cloud environment evaluations (2024)"},{"key":"10_CR69","doi-asserted-by":"publisher","first-page":"148793","DOI":"10.1109\/ACCESS.2020.3016255","volume":"8","author":"TJ Sheng","year":"2020","unstructured":"Sheng, T.J., et al.: An internet of things based smart waste management system using LoRa and TensorFlow deep learning model. IEEE Access 8, 148793\u2013148811 (2020)","journal-title":"IEEE Access"},{"key":"10_CR70","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321 (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"10_CR71","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"10_CR72","unstructured":"SNU Cryptography & Privacy\u00a0Lab, S.N.U.: SNU-MGHE. Online: https:\/\/github.com\/SNUCP\/snu-mghe"},{"key":"10_CR73","first-page":"26409","volume":"34","author":"P Subramani","year":"2021","unstructured":"Subramani, P., Vadivelu, N., Kamath, G.: Enabling fast differentially private SGD via just-in-time compilation and vectorization. Adv. Neural Inf. Process. Syst. (NeurIPS) 34, 26409\u201326421 (2021)","journal-title":"Adv. Neural Inf. Process. Syst. (NeurIPS)"},{"key":"10_CR74","doi-asserted-by":"crossref","unstructured":"Tan, S., Knott, B., Tian, Y., Wu, D.J.: CryptGPU: fast privacy-preserving machine learning on the GPU. In: IEEE Symposium on Security and Privacy (SP), pp. 1021\u20131038. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00098"},{"key":"10_CR75","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 601\u2013618 (2016)"},{"key":"10_CR76","doi-asserted-by":"crossref","unstructured":"Treiber, A., Molina, A., Weinert, C., Schneider, T., Kersting, K.: CryptoSPN: Privacy-preserving sum-product network inference (2020)","DOI":"10.3233\/FAIA200313"},{"issue":"5","key":"10_CR77","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"L Trieu Phong","year":"2017","unstructured":"Trieu Phong, L., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR78","doi-asserted-by":"crossref","unstructured":"Varun, M., Feng, S., Wang, H., Sural, S., Hong, Y.: Towards accurate and stronger local differential privacy for federated learning with staircase randomized response. In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, pp. 307\u2013318 (2024)","DOI":"10.1145\/3626232.3653279"},{"key":"10_CR79","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.future.2020.02.054","volume":"108","author":"EK Wang","year":"2020","unstructured":"Wang, E.K., Chen, C.M., Hassan, M.M., Almogren, A.: A deep learning based medical image segmentation technique in internet-of-medical-things domain. Futur. Gener. Comput. Syst. 108, 135\u2013144 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10_CR80","doi-asserted-by":"crossref","unstructured":"Widmann, T., Merkle, F., Nocker, M., Sch\u00f6ttle, P.: Pruning for power: optimizing energy efficiency in IoT with neural network pruning. In: International Conference on Engineering Applications of Neural Networks, pp. 251\u2013263. Springer (2023)","DOI":"10.1007\/978-3-031-34204-2_22"},{"key":"10_CR81","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: How to generate and exchange secrets. In: Symposium on Foundations of Computer Science, pp. 162\u2013167. IEEE (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"10_CR82","doi-asserted-by":"publisher","first-page":"44999","DOI":"10.1109\/ACCESS.2020.2977962","volume":"8","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Han, Y.: Detection of ovarian tumors in obstetric ultrasound imaging using logistic regression classifier with an advanced machine learning approach. IEEE Access 8, 44999\u201345008 (2020)","journal-title":"IEEE Access"},{"key":"10_CR83","doi-asserted-by":"crossref","unstructured":"Zheng, M., Xu, D., Jiang, L., Gu, C., Tan, R., Cheng, P.: Challenges of privacy-preserving machine learning in IoT. In: Proceedings of the First International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, pp.\u00a01\u20137 (2019)","DOI":"10.1145\/3363347.3363357"},{"key":"10_CR84","doi-asserted-by":"crossref","unstructured":"Zhou, J., Li, J., Panaousis, E., Liang, K.: Deep binarized convolutional neural network inferences over encrypted data. In: IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 160\u2013167. IEEE (2020)","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00035"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01799-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T07:48:00Z","timestamp":1761119280000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01799-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"ISBN":["9783032017987","9783032017994"],"references-count":84,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01799-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"23 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}