{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:59Z","timestamp":1775188139223,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819541546","type":"print"},{"value":"9789819541553","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-4155-3_42","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:58:47Z","timestamp":1767340727000},"page":"609-618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Confidential and\u00a0Efficient LLM Inference with\u00a0Dual Privacy Protection"],"prefix":"10.1007","author":[{"given":"Honglan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yibin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Feifei","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haihui","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,3]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Bassily, R., Smith, A.: Local, private, efficient protocols for succinct histograms. In: Proceedings of Symposium on Theory of Computing, pp. 127\u2013135 (2015)","DOI":"10.1145\/2746539.2746632"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Chen, S., Mo, F., Wang, Y., et\u00a0al.: A customized text sanitization mechanism with differential privacy. In: Proceedings of ACL, pp. 5747\u20135758 (2023)","DOI":"10.18653\/v1\/2023.findings-acl.355"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of NAACL, pp. 4171\u20134186 (2019)","DOI":"10.18653\/v1\/N19-1423"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Du, M., Yue, X., et\u00a0al.: DP-forward: fine-tuning and inference on language models with differential privacy in forward pass. In: Proceedings of CCS, pp. 2665\u20132679 (2023)","DOI":"10.1145\/3576915.3616592"},{"key":"42_CR5","unstructured":"Dubey, A., Jauhri, A., et\u00a0al.: The llama 3 herd of models (2024). arXiv:2407.21783"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"168656","DOI":"10.1109\/ACCESS.2021.3136889","volume":"9","author":"KD Duy","year":"2021","unstructured":"Duy, K.D., Noh, T., Huh, S., Lee, H.: Confidential machine learning computation in untrusted environments: a systems security perspective. IEEE Access 9, 168656\u2013168677 (2021)","journal-title":"IEEE Access"},{"issue":"3\u20134","key":"42_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Hashemi, H., Wang, Y., Annavaram, M.: Darknight: an accelerated framework for privacy and integrity preserving deep learning using trusted hardware. In: Proceedings of MICRO, pp. 212\u2013224 (2021)","DOI":"10.1145\/3466752.3480112"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Huang, W., Wang, Y., Cheng, A., Zhou, A., Yu, C., Wang, L.: A fast, performant, secure distributed training framework for large language model. In: Proceedings of ICASSP (2024)","DOI":"10.1109\/ICASSP48485.2024.10446717"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, W., et\u00a0al.: BEVFormer: learning bird\u2019s-eye-view representation from multi-camera images via spatiotemporal transformers. In: Proceedings of ECCV, pp. 1\u201318 (2022)","DOI":"10.1007\/978-3-031-20077-9_1"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.: GloVe: global vectors for word representation. In: Proceedings of EMNLP, pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: Proceedings of Trustcom, pp. 57\u201364 (2015)","DOI":"10.1109\/Trustcom.2015.357"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Schunter, M.: Intel software guard extensions: introduction and open research challenges. In: Proceedings of SRPO, p.\u00a01 (2016)","DOI":"10.1145\/2995306.2995307"},{"key":"42_CR14","unstructured":"Shen, T., Qi, J., Jiang, J., Wang, X., Wen, S., Chen, X., et\u00a0al.: SOTER: guarding black-box inference for general neural networks at the edge. In: Proceedings of USENIX, pp. 723\u2013738 (2022)"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Shen, Y., Tian, H., et\u00a0al.: Occlum: secure and efficient multitasking inside a single enclave of intel SGX. In: Proceedings of ASPLOS, pp. 955\u2013970 (2020)","DOI":"10.1145\/3373376.3378469"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Sun, Z., Sun, R., Liu, C., Chowdhury, A.R., Lu, L., Jha, S.: Shadownet: a secure and efficient on-device model inference system for convolutional neural networks. In: Proceedings of SP, pp. 1596\u20131612 (2023)","DOI":"10.1109\/SP46215.2023.10179382"},{"key":"42_CR17","doi-asserted-by":"publisher","first-page":"1930","DOI":"10.1038\/s41591-023-02448-8","volume":"8","author":"AJ Thirunavukarasu","year":"2023","unstructured":"Thirunavukarasu, A.J., Ting, D.S.J., et al.: Large language models in medicine. Nat. Med. 8, 1930\u20131940 (2023)","journal-title":"Nat. Med."},{"key":"42_CR18","unstructured":"Touvron, H., Martin, L., et\u00a0al.: Llama 2: open foundation and fine-tuned chat models (2023). arXiv:2307.09288"},{"key":"42_CR19","unstructured":"Tram\u00e8r, F., Boneh, D.: Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. In: Proceedings of ICLR (2019)"},{"key":"42_CR20","unstructured":"Tsai, C.C., Porter, D.E., Vij, M.: Graphene-SGX: a practical library OS for unmodified applications on SGX. In: Proceedings of USENIX, pp. 645\u2013658 (2017)"},{"key":"42_CR21","unstructured":"Xu, H., Kim, Y.J., Sharaf, A., Awadalla, H.H.: A paradigm shift in machine translation: boosting translation performance of large language models. In: Proceedings of ICLR (2024)"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Xu, R., Fang, Z.: Tempo: Confidentiality preservation in cloud-based neural network training (2024). arXiv:2401.11531","DOI":"10.1109\/IJCNN60899.2024.10650731"},{"key":"42_CR23","doi-asserted-by":"crossref","unstructured":"Yue, X., Du, M., et\u00a0al.: Differential privacy for text analytics via natural text sanitization. In: Proceedings of ACL, pp. 3853\u20133866 (2021)","DOI":"10.18653\/v1\/2021.findings-acl.337"},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Gong, C., et\u00a0al.: No privacy left outside: on the (in-)security of tee-shielded DNN partition for on-device ml. In: Proceedings of SP, pp. 55\u201355 (2024)","DOI":"10.1109\/SP54263.2024.00052"},{"key":"42_CR25","unstructured":"Zhou, J., Lu, T., Mishra, S., et\u00a0al.: Instruction-following evaluation for large language models (2023). arXiv:2311.07911"},{"key":"42_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, X., Lu, Y., et\u00a0al.: TextObfuscator: making pre-trained language model a privacy protector via obfuscating word representations. In: Proceedings of ACL, pp. 5459\u20135473 (2023)","DOI":"10.18653\/v1\/2023.findings-acl.337"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-4155-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:58:51Z","timestamp":1767340731000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-4155-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819541546","9789819541553"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-4155-3_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"3 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dasfaa2025.github.io","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}