{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:00:59Z","timestamp":1774602059354,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032037107","type":"print"},{"value":"9783032037114","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-03711-4_11","type":"book-chapter","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T06:59:18Z","timestamp":1761893958000},"page":"120-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Inference for\u00a0Public Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5954-7199","authenticated-orcid":false,"given":"Mihail-Iulian","family":"Plesa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0692-4194","authenticated-orcid":false,"given":"Robert","family":"Poenaru","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Irimia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3291-8241","authenticated-orcid":false,"given":"Simona","family":"David","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Farcasanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,1]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. (CSUR) 51(4), 1\u201335 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"11_CR2","unstructured":"Bellare, M., Rogaway, P.: Introduction to modern cryptography. Lecture Notes (2001)"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/978-3-030-64834-3_22","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"X Bonnetain","year":"2020","unstructured":"Bonnetain, X., Bricout, R., Schrottenloher, A., Shen, Y.: Improved classical and quantum algorithms for subset-sum. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 633\u2013666. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_22"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Gaber, C., Macariot-Rat, G., David, S., Wary, J.P., Cuaboz, A.: Position paper: strengthening applets on legacy sim cards with singularization, a new moving target defense strategy. In: International Conference on Mobile, Secure, and Programmable Networking, pp. 71\u201374. Springer (2023)","DOI":"10.1007\/978-3-031-52426-4_5"},{"key":"11_CR6","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013210. PMLR (2016)"},{"key":"11_CR7","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: Cryptodl: deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)"},{"key":"11_CR8","first-page":"4961","volume":"34","author":"B Knott","year":"2021","unstructured":"Knott, B., Venkataraman, S., Hannun, A., Sengupta, S., Ibrahim, M., van der Maaten, L.: Crypten: secure multi-party computation meets machine learning. Adv. Neural. Inf. Process. Syst. 34, 4961\u20134973 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"11_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107399","volume":"128","author":"GS Kumar","year":"2024","unstructured":"Kumar, G.S., Premalatha, K., Maheshwari, G.U., Kanna, P.R., Vijaya, G., Nivaashini, M.: Differential privacy scheme using laplace mechanism and statistical method computation in deep neural network for privacy preservation. Eng. Appl. Artif. Intell. 128, 107399 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"7","key":"11_CR10","doi-asserted-by":"publisher","DOI":"10.1115\/1.4063728","volume":"24","author":"H Lee","year":"2024","unstructured":"Lee, H., Finke, D., Yang, H.: Privacy-preserving neural networks for smart manufacturing. J. Comput. Inf. Sci. Eng. 24(7), 071002 (2024)","journal-title":"J. Comput. Inf. Sci. Eng."},{"key":"11_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111181","volume":"283","author":"J Li","year":"2024","unstructured":"Li, J., Yan, Y., Zhang, K., Li, C., Yuan, P.: FPCNN: a fast privacy-preserving outsourced convolutional neural network with low-bandwidth. Knowl.-Based Syst. 283, 111181 (2024)","journal-title":"Knowl.-Based Syst."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via minionn transformations. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 619\u2013631 (2017)","DOI":"10.1145\/3133956.3134056"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Q., et al.: PP-stream: toward high-performance privacy-preserving neural network inference via distributed stream processing. In: Proceedings of the 40th IEEE International Conference on Data Engineering (ICDE 2024) (2024)","DOI":"10.1109\/ICDE60146.2024.00123"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Macario-Rat, G., Plesa, M.I.: Singularization: a new approach to designing block ciphers for resource-constrained devices. In: Meng, W., Yung, M., Shao, J. (eds.) Attacks and Defenses for the Internet-of-Things, pp. 155\u2013167. Springer (2025)","DOI":"10.1007\/978-3-031-85593-1_10"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338. IEEE (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223\u2013238. Springer (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/JSAIT.2021.3053220","volume":"2","author":"J So","year":"2021","unstructured":"So, J., G\u00fcler, B., Avestimehr, A.S.: Codedprivateml: a fast and privacy-preserving framework for distributed machine learning. IEEE J. Sel. Areas Inf. Theory 2(1), 441\u2013451 (2021)","journal-title":"IEEE J. Sel. Areas Inf. Theory"},{"key":"11_CR18","unstructured":"Touvron, H., et al.: Llama: open and efficient foundation language models. arXiv preprint arXiv:2302.13971 (2023)"},{"key":"11_CR19","unstructured":"Tramer, F., Boneh, D.: Slalom: fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287 (2018)"},{"key":"11_CR20","unstructured":"Zama: Concrete ML: a privacy-preserving machine learning library using fully homomorphic encryption for data scientists (2022). https:\/\/github.com\/zama-ai\/concrete-ml"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-03711-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:14:37Z","timestamp":1774599277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-03711-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,1]]},"ISBN":["9783032037107","9783032037114"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-03711-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,1]]},"assertion":[{"value":"1 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}