{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T07:00:50Z","timestamp":1775199650670,"version":"3.50.1"},"reference-count":186,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100018978","name":"Zhejiang Office of Philosophy and Social Science","doi-asserted-by":"publisher","award":["22NDJC188YB"],"award-info":[{"award-number":["22NDJC188YB"]}],"id":[{"id":"10.13039\/100018978","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018978","name":"Zhejiang Office of Philosophy and Social Science","doi-asserted-by":"publisher","award":["24NDQN120YBM"],"award-info":[{"award-number":["24NDQN120YBM"]}],"id":[{"id":"10.13039\/100018978","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"DOI":"10.1007\/s10462-024-11076-8","type":"journal-article","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T04:27:53Z","timestamp":1736137673000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Approximate homomorphic encryption based privacy-preserving machine learning: a survey"],"prefix":"10.1007","volume":"58","author":[{"given":"Jiangjun","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Weinan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiawen","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Qingqing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,6]]},"reference":[{"key":"11076_CR1","volume-title":"Machine Learning: An Artificial Intelligence Approach","author":"RS Michalski","year":"2013","unstructured":"Michalski RS, Carbonell JG, Mitchell TM (2013) Machine Learning: An Artificial Intelligence Approach. Springer"},{"key":"11076_CR2","doi-asserted-by":"crossref","first-page":"109701","DOI":"10.1016\/j.cie.2023.109701","volume":"186","author":"C-Y Hsu","year":"2023","unstructured":"Hsu C-Y, Lu Y-W (2023) Virtual metrology of material removal rate using a one-dimensional convolutional neural network-based bidirectional long short-term memory network with attention. Comp Ind Eng 186:109701","journal-title":"Comp Ind Eng"},{"key":"11076_CR3","first-page":"100182","volume":"25","author":"H Vartiainen","year":"2020","unstructured":"Vartiainen H, Tedre M, Valtonen T (2020) Learning machine learning with very young children: Who is teaching whom? Int J Child-Comp Inter 25:100182","journal-title":"Int J Child-Comp Inter"},{"issue":"8","key":"11076_CR4","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/s41582-020-0377-8","volume":"16","author":"MA Myszczynska","year":"2020","unstructured":"Myszczynska MA, Ojamies PN, Lacoste AMB, Neil D, Saffari A, Mead R, Hautbergue GM, Holbrook JD, Ferraiuolo L (2020) Applications of machine learning to diagnosis and treatment of neurodegenerative diseases. Nat Rev Neurol 16(8):440\u2013456","journal-title":"Nat Rev Neurol"},{"key":"11076_CR5","doi-asserted-by":"crossref","unstructured":"Rigaki M, Garc\u00eda SR (2023) A survey of privacy attacks in machine learning. ACM Computing Surveys 56(4)","DOI":"10.1145\/3624010"},{"issue":"8","key":"11076_CR6","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2018.3191268","volume":"51","author":"J Isaak","year":"2018","unstructured":"Isaak J, Hanna MJ (2018) User data privacy: facebook, cambridge analytica, and privacy protection. IEEE Comp Arch Lett 51(8):56\u201359","journal-title":"IEEE Comp Arch Lett"},{"key":"11076_CR7","doi-asserted-by":"crossref","unstructured":"Zou Y, Roundy K, Tamersoy A, Shintre S, Roturier J, Schaub F (2020) Examining the adoption and abandonment of security, privacy, and identity theft protection practices. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201315","DOI":"10.1145\/3313831.3376570"},{"key":"11076_CR8","doi-asserted-by":"crossref","first-page":"101431","DOI":"10.1016\/j.tele.2020.101431","volume":"52","author":"JS Baik","year":"2020","unstructured":"Baik JS (2020) Data privacy against innovation or against discrimination?: the case of the california consumer privacy act (ccpa). Telemat Inf 52:101431","journal-title":"Telemat Inf"},{"issue":"1","key":"11076_CR9","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1038\/s41597-023-02256-2","volume":"10","author":"JW Kok","year":"2023","unstructured":"Kok JW, Hoz M\u00c1A, Jong Y, Brokke V, Elbers PW, Thoral P, Castillejo A, Trenor T, Castellano JM, Bronchalo AE et al (2023) A guide to sharing open healthcare data under the general data protection regulation. Sci Data 10(1):404","journal-title":"Sci Data"},{"key":"11076_CR10","doi-asserted-by":"crossref","unstructured":"Hesamifard E, Takabi H, Ghasemi M, Wright RN (2018) Privacy-preserving machine learning as a service. Proceedings on Privacy Enhancing Technologies","DOI":"10.1515\/popets-2018-0024"},{"key":"11076_CR11","doi-asserted-by":"crossref","unstructured":"Wang S, Zheng Y, Jia X (2023) Secgnn: Privacy-preserving graph neural network training and inference as a cloud service. IEEE Transactions on Services Computing","DOI":"10.1109\/TSC.2023.3241615"},{"issue":"4","key":"11076_CR12","first-page":"1","volume":"53","author":"A Wood","year":"2020","unstructured":"Wood A, Najarian K, Kahrobaei D (2020) Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Comp Surv (CSUR) 53(4):1\u201335","journal-title":"ACM Comp Surv (CSUR)"},{"issue":"10","key":"11076_CR13","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","volume":"110","author":"C Marcolla","year":"2022","unstructured":"Marcolla C, Sucasas V, Manzano M, Bassoli R, Fitzek FH, Aaraj N (2022) Survey on fully homomorphic encryption, theory, and applications. Procee IEEE 110(10):1572\u20131609","journal-title":"Procee IEEE"},{"issue":"2","key":"11076_CR14","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1007\/s10462-022-10204-6","volume":"56","author":"S Sousa","year":"2023","unstructured":"Sousa S, Kern R (2023) How to keep text private? a systematic review of deep learning methods for privacy-preserving natural language processing. Artif Intell Rev 56(2):1427\u20131492","journal-title":"Artif Intell Rev"},{"key":"11076_CR15","doi-asserted-by":"crossref","unstructured":"Carbonell JG, Michalski RS, Mitchell TM (1983) An overview of machine learning. Machine learning, 3\u201323","DOI":"10.1016\/B978-0-08-051054-5.50005-4"},{"issue":"2","key":"11076_CR16","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MSP.2012.2230219","volume":"30","author":"C Aguilar-Melchor","year":"2013","unstructured":"Aguilar-Melchor C, Fau S, Fontaine C, Gogniat G, Sirdey R (2013) Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Proc Mag 30(2):108\u2013117","journal-title":"IEEE Signal Proc Mag"},{"issue":"6245","key":"11076_CR17","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. Science 349(6245):255\u2013260","journal-title":"Science"},{"issue":"6","key":"11076_CR18","first-page":"1","volume":"50","author":"P Martins","year":"2017","unstructured":"Martins P, Sousa L, Mariano A (2017) A survey on fully homomorphic encryption: an engineering perspective. ACM Comp Surv(CSUR) 50(6):1\u201333","journal-title":"ACM Comp Surv(CSUR)"},{"issue":"4","key":"11076_CR19","first-page":"1","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comp Surv (Csur) 51(4):1\u201335","journal-title":"ACM Comp Surv (Csur)"},{"key":"11076_CR20","doi-asserted-by":"crossref","first-page":"100235","DOI":"10.1016\/j.cosrev.2020.100235","volume":"36","author":"B Alaya","year":"2020","unstructured":"Alaya B, Laouamer L, Msilini N (2020) Homomorphic encryption systems statement: trends and challenges. Comp Sci Rev 36:100235","journal-title":"Comp Sci Rev"},{"issue":"2","key":"11076_CR21","first-page":"1","volume":"54","author":"B Liu","year":"2021","unstructured":"Liu B, Ding M, Shaham S, Rahayu W, Farokhi F, Lin Z (2021) When machine learning meets privacy: a survey and outlook. ACM Comp Surv (CSUR) 54(2):1\u201336","journal-title":"ACM Comp Surv (CSUR)"},{"issue":"8","key":"11076_CR22","first-page":"1","volume":"54","author":"MS Murshed","year":"2021","unstructured":"Murshed MS, Murphy C, Hou D, Khan N, Ananthanarayanan G, Hussain F (2021) Machine learning at the network edge: a survey. ACM Comp Surv (CSUR) 54(8):1\u201337","journal-title":"ACM Comp Surv (CSUR)"},{"key":"11076_CR23","doi-asserted-by":"crossref","unstructured":"Munjal K, Bhatia R (2022) A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex & Intelligent Systems, 1\u201328","DOI":"10.1007\/s40747-022-00756-z"},{"issue":"3","key":"11076_CR24","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1038\/s41578-022-00490-5","volume":"8","author":"Z Yao","year":"2023","unstructured":"Yao Z, Lum Y, Johnston A, Mejia-Mendoza LM, Zhou X, Wen Y, Aspuru-Guzik A, Sargent EH, Seh ZW (2023) Machine learning for a sustainable energy future. Nat Rev Mater 8(3):202\u2013215","journal-title":"Nat Rev Mater"},{"issue":"2","key":"11076_CR25","doi-asserted-by":"publisher","first-page":"245","DOI":"10.2196\/medinform.8805","volume":"6","author":"M Kim","year":"2018","unstructured":"Kim M, Song Y, Wang S, Xia Y, Jiang X (2018) Secure logistic regression based on homomorphic encryption: design and evaluation. JMIR Med Inf 6(2):245\u201302550. https:\/\/doi.org\/10.2196\/medinform.8805","journal-title":"JMIR Med Inf"},{"key":"11076_CR26","doi-asserted-by":"crossref","unstructured":"Lu W-j, Huang Z, Hong C, Ma Y, Qu H (2021) Pegasus: bridging polynomial and non-polynomial evaluations in homomorphic encryption. In: 2021 IEEE Symposium on Security and Privacy (SP). 2021 IEEE Symposium on Security and Privacy (SP), pp. 1057\u20131073. IEEE,","DOI":"10.1109\/SP40001.2021.00043"},{"issue":"2","key":"11076_CR27","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s13389-022-00299-6","volume":"13","author":"R Koseki","year":"2023","unstructured":"Koseki R, Ito A, Ueno R, Tibouchi M, Homma N (2023) Homomorphic encryption for stochastic computing. J Cryptogr Eng 13(2):251\u2013263","journal-title":"J Cryptogr Eng"},{"key":"11076_CR28","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1145\/3243734.3243837","volume":"2018","author":"X Jiang","year":"2018","unstructured":"Jiang X, Kim M, Lauter KE, Song Y (2018) Secure outsourced matrix computation and application to neural networks. Comp Sci 2018:1209\u20131222. https:\/\/doi.org\/10.1145\/3243734.3243837","journal-title":"Comp Sci"},{"key":"11076_CR29","unstructured":"Lee E, Lee J-W, Lee J, Kim Y-S, Kim Y, No J-S, Choi W (2022) Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions. In: International Conference on Machine Learning, pp. 12403\u201312422. PMLR"},{"key":"11076_CR30","doi-asserted-by":"crossref","first-page":"2175","DOI":"10.1109\/TIFS.2023.3263631","volume":"18","author":"D Kim","year":"2023","unstructured":"Kim D, Guyot C (2023) Optimized privacy-preserving cnn inference with fully homomorphic encryption. IEEE Trans Inf Forens Secur 18:2175\u20132187","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"11","key":"11076_CR31","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML et al (1978) On data banks and privacy homomorphisms. Found Secure Comp 4(11):169\u2013180","journal-title":"Found Secure Comp"},{"issue":"2","key":"11076_CR32","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"11076_CR33","doi-asserted-by":"crossref","unstructured":"Zhao S, Xu S, Han S, Ren S, Wang Y, Chen Z, Chen X, Lin J, Liu W (2023) Ppmm-da: Privacy-preserving multi-dimensional and multi-subset data aggregation with differential privacy for fog-based smart grids. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2023.3309132"},{"key":"11076_CR34","unstructured":"Benaloh J (1994) Dense probabilistic encryption. In: Proceedings of the Workshop on Selected Areas of Cryptography, pp. 120\u2013128"},{"key":"11076_CR35","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 223\u2013238. Springer","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"20","key":"11076_CR36","doi-asserted-by":"crossref","first-page":"20149","DOI":"10.1109\/JIOT.2022.3171767","volume":"9","author":"C He","year":"2022","unstructured":"He C, Liu G, Guo S, Yang Y (2022) Privacy-preserving and low-latency federated learning in edge computing. IEEE Int Things J 9(20):20149\u201320159","journal-title":"IEEE Int Things J"},{"key":"11076_CR37","doi-asserted-by":"crossref","unstructured":"Han J, Yan L (2023) Adaptive batch homomorphic encryption for joint federated learning in cross-device scenarios. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2023.3323358"},{"key":"11076_CR38","doi-asserted-by":"crossref","unstructured":"Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings 2, pp. 325\u2013341. Springer","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"11076_CR39","volume-title":"A Fully Homomorphic Encryption Scheme","author":"C Gentry","year":"2009","unstructured":"Gentry C (2009) A Fully Homomorphic Encryption Scheme. Stanford university"},{"issue":"3","key":"11076_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (Leveled) Fully Homomorphic Encryption Without Bootstrapping. ACM Trans Comp Theory (TOCT) 6(3):1\u201336","journal-title":"ACM Trans Comp Theory (TOCT)"},{"key":"11076_CR41","unstructured":"Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive"},{"issue":"2","key":"11076_CR42","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (standard) lwe. SIAM J Comp 43(2):831\u2013871","journal-title":"SIAM J Comp"},{"key":"11076_CR43","doi-asserted-by":"crossref","unstructured":"Gentry C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology\u2013CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, pp. 75\u201392 . Springer","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"11076_CR44","doi-asserted-by":"crossref","unstructured":"Ducas L, Micciancio D (2015) Fhew: bootstrapping homomorphic encryption in less than a second. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 617\u2013640. Springer","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"11076_CR45","doi-asserted-by":"crossref","unstructured":"Chillotti I, Gama N, Georgieva M, Izabachene M (2016) Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In: Advances in Cryptology\u2013ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I 22, pp. 3\u201333. Springer","DOI":"10.1007\/978-3-662-53887-6_1"},{"issue":"6","key":"11076_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM (JACM) 56(6):1\u201340","journal-title":"J ACM (JACM)"},{"key":"11076_CR47","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Advances in Cryptology\u2013EUROCRYPT 2010, French Riviera, May 30\u2013June 3, 2010. Proceedings 29, pp. 1\u201323. Springer","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"11076_CR48","doi-asserted-by":"crossref","unstructured":"Cheon JH, Kim A, Kim M, Song Y (2017) Homomorphic encryption for arithmetic of approximate numbers. In: Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23, pp. 409\u2013437. Springer","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"11076_CR49","doi-asserted-by":"crossref","unstructured":"Jin W, Krishnamachari B, Naveed M, Ravi S, Sanou E, Wright K-L (2022) Secure publish-process-subscribe system for dispersed computing. In: 2022 41st International Symposium on Reliable Distributed Systems (SRDS), pp. 58\u201368. IEEE","DOI":"10.1109\/SRDS55811.2022.00016"},{"key":"11076_CR50","doi-asserted-by":"crossref","unstructured":"Chen S, Zhao Y, Li R, Li X, Zhao J, Liu K (2022) Privacy preserving electronic scoring scheme based on ckks. In: 2022 IEEE 22nd International Conference on Communication Technology (ICCT), pp. 1884\u20131888. IEEE","DOI":"10.1109\/ICCT56141.2022.10072408"},{"key":"11076_CR51","doi-asserted-by":"crossref","unstructured":"Lai R, Fang X, Zheng P, Liu H, Lu W, Luo W (2022) Efficient fragile privacy-preserving audio watermarking using homomorphic encryption. In: International Conference on Artificial Intelligence and Security, pp. 373\u2013385. Springer","DOI":"10.1007\/978-3-031-06791-4_30"},{"key":"11076_CR52","doi-asserted-by":"crossref","unstructured":"Basuki A, Setiawan I, Rosiyadi D, Ramdhani TI, Susanto H (2022) Accelerating encrypted watermarking using wavelet transform and ckks homomorphic encryption. In: Proceedings of the 2022 International Conference on Computer, Control, Informatics and Its Applications, pp. 311\u2013315","DOI":"10.1145\/3575882.3575942"},{"issue":"3","key":"11076_CR53","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht MR, Player R, Scott S (2015) On the concrete hardness of learning with errors. J Math Cryptol 9(3):169\u2013203","journal-title":"J Math Cryptol"},{"key":"11076_CR54","unstructured":"Guo Q, Nabokov D, Suvanto E, Johansson T (2024) Key recovery attacks on approximate homomorphic encryption with non-worst-case noise flooding countermeasures. In: Usenix Security"},{"key":"11076_CR55","unstructured":"Cheon JH, Choe H, Kang M, Kim J (2024) Grafting: Complementing rns in ckks. Cryptology ePrint Archive"},{"key":"11076_CR56","doi-asserted-by":"crossref","unstructured":"Al Badawi A, Bates J, Bergamaschi F, Cousins DB, Erabelli S, Genise N, Halevi S, Hunt H, Kim A, Lee Y et al (2022) Openfhe: Open-source fully homomorphic encryption library. In: Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 53\u201363","DOI":"10.1145\/3560827.3563379"},{"key":"11076_CR57","unstructured":"Microsoft SEAL (2023) (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA"},{"key":"11076_CR58","doi-asserted-by":"crossref","unstructured":"Cheon JH, Han K, Kim A, Kim M, Song Y (2018) Bootstrapping for approximate homomorphic encryption. In: Advances in Cryptology\u2013EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29-May 3, 2018 Proceedings, Part I 37, pp. 360\u2013384. Springer","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"11076_CR59","doi-asserted-by":"crossref","unstructured":"Cheon JH, Cho W, Kim J, Stehl\u00e9 D (2023) Homomorphic multiple precision multiplication for ckks and reduced modulus consumption. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 696\u2013710","DOI":"10.1145\/3576915.3623086"},{"key":"11076_CR60","doi-asserted-by":"crossref","unstructured":"Cheon JH, Han K, Kim A, Kim M, Song Y (2019) A full rns variant of approximate homomorphic encryption. In: Selected Areas in Cryptography\u2013SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15\u201317, 2018, Revised Selected Papers 25, pp. 347\u2013368. Springer","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"11076_CR61","doi-asserted-by":"crossref","unstructured":"Wang J, Yang C, Hou J, Zhang F, Meng Y, Su Y, Liu L (2024) A compact and efficient hardware accelerator for rns-ckks en\/decoding and en\/decryption. IEEE Transactions on Circuits and Systems II: Express Briefs (2024)","DOI":"10.1109\/TCSII.2024.3454024"},{"key":"11076_CR62","doi-asserted-by":"crossref","unstructured":"Chen H, Dai W, Kim M, Song Y (2019) Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 395\u2013412","DOI":"10.1145\/3319535.3363207"},{"key":"11076_CR63","doi-asserted-by":"crossref","unstructured":"Du W, Li M, Wu L, Han Y, Zhou T, Yang X (2023) A efficient and robust privacy-preserving framework for cross-device federated learning. Complex & Intelligent Systems, 1\u201315","DOI":"10.1007\/s40747-023-00978-9"},{"key":"11076_CR64","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy. In: International Colloquium on Automata, Languages, and Programming, pp. 1\u201312. Springer","DOI":"10.1007\/11787006_1"},{"key":"11076_CR65","doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160\u2013164. IEEE","DOI":"10.1109\/SFCS.1982.38"},{"key":"11076_CR66","unstructured":"Mugunthan V, Polychroniadou A, Byrd D, Balch TH (2019) Smpai: Secure multi-party computation for federated learning. In: Proceedings of the NeurIPS 2019 Workshop on Robust AI in Financial Services, vol. 21. MIT Press Cambridge, MA, USA"},{"key":"11076_CR67","doi-asserted-by":"crossref","unstructured":"B\u00f6hler J, Kerschbaum F (2021) Secure multi-party computation of differentially private heavy hitters. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 2361\u20132377","DOI":"10.1145\/3460120.3484557"},{"issue":"5","key":"11076_CR68","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1007\/s10623-022-01160-x","volume":"91","author":"N Attrapadung","year":"2023","unstructured":"Attrapadung N, Hanaoka G, Hiromasa R, Matsuda T, Schuldt JC (2023) Maliciously circuit-private multi-key fhe and mpc based on lwe. Des, Codes Cryptogr 91(5):1645\u20131684","journal-title":"Des, Codes Cryptogr"},{"key":"11076_CR69","doi-asserted-by":"crossref","unstructured":"Bian M, He G, Feng G, Zhang X, Ren Y (2023) Verifiable privacy-preserving heart rate estimation based on lstm. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2023.3290651"},{"key":"11076_CR70","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3, pp. 265\u2013284. Springer","DOI":"10.1007\/11681878_14"},{"key":"11076_CR71","doi-asserted-by":"crossref","unstructured":"Dwork C, Rothblum GN, Vadhan S (2010) Boosting and differential privacy. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 51\u201360. IEEE","DOI":"10.1109\/FOCS.2010.12"},{"key":"11076_CR72","doi-asserted-by":"crossref","unstructured":"Erlingsson \u00da, Pihur V, Korolova A (2014) Rappor: Randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1054\u20131067","DOI":"10.1145\/2660267.2660348"},{"key":"11076_CR73","unstructured":"Dwork C, Rothblum GN (2016) Concentrated differential privacy. arXiv preprint arXiv:1603.01887"},{"issue":"7","key":"11076_CR74","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1109\/TKDE.2018.2824328","volume":"31","author":"Y Cao","year":"2018","unstructured":"Cao Y, Yoshikawa M, Xiao Y, Xiong L (2018) Quantifying differential privacy in continuous data release under temporal correlations. IEEE Trans Knowl Data Eng 31(7):1281\u20131295","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"11076_CR75","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/TII.2023.3280325","volume":"20","author":"P Tedeschi","year":"2023","unstructured":"Tedeschi P, Al Nuaimi FA, Awad AI, Natalizio E (2023) Privacy-aware remote identification for unmanned aerial vehicles: current solutions, potential threats, and future directions. IEEE Trans Ind Inf 20(2):1069\u20131080","journal-title":"IEEE Trans Ind Inf"},{"key":"11076_CR76","unstructured":"Mangold P, Perrot M, Bellet A, Tommasi M (2023) Differential privacy has bounded impact on fairness in classification. In: International Conference on Machine Learning, pp. 23681\u201323705. PMLR"},{"key":"11076_CR77","doi-asserted-by":"crossref","unstructured":"Xu Z, Collins M, Wang Y, Panait L, Oh S, Augenstein S, Liu T, Schroff F, McMahan HB (2023) Learning to generate image embeddings with user-level differential privacy. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7969\u20137980","DOI":"10.1109\/CVPR52729.2023.00770"},{"key":"11076_CR78","doi-asserted-by":"crossref","unstructured":"Guan J, Fang W, Huang M, Ying M (2023) Detecting violations of differential privacy for quantum algorithms. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2277\u20132291","DOI":"10.1145\/3576915.3623108"},{"key":"11076_CR79","doi-asserted-by":"crossref","unstructured":"Shi Y, Yang Y, Wu Y (2024) Federated edge learning with differential privacy: An active reconfigurable intelligent surface approach. IEEE Transactions on Wireless Communications","DOI":"10.1109\/TWC.2024.3453392"},{"key":"11076_CR80","first-page":"187","volume":"2005","author":"MO Rabin","year":"2005","unstructured":"Rabin MO (2005) How to exchange secrets with oblivious transfer. IACR Cryptol ePrint Arch 2005:187","journal-title":"IACR Cryptol ePrint Arch"},{"key":"11076_CR81","doi-asserted-by":"crossref","unstructured":"Bellare M, Hoang VT, Rogaway P (2012) Foundations of garbled circuits. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 784\u2013796","DOI":"10.1145\/2382196.2382279"},{"issue":"11","key":"11076_CR82","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"11076_CR83","doi-asserted-by":"crossref","unstructured":"Goldreich O, Micali S, Wigderson A (2019) How to play any mental game, or a completeness theorem for protocols with honest majority. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 307\u2013328","DOI":"10.1145\/3335741.3335759"},{"key":"11076_CR84","first-page":"4961","volume":"34","author":"B Knott","year":"2021","unstructured":"Knott B, Venkataraman S, Hannun A, Sengupta S, Ibrahim M, Maaten L (2021) Crypten: secure multi-party computation meets machine learning. Adv Neural Inf Proc Syst 34:4961\u20134973","journal-title":"Adv Neural Inf Proc Syst"},{"key":"11076_CR85","unstructured":"Li X, Dowsley R, De Cock M (2021) Privacy-preserving feature selection with secure multiparty computation. In: International Conference on Machine Learning, pp. 6326\u20136336. PMLR"},{"key":"11076_CR86","doi-asserted-by":"crossref","first-page":"103142","DOI":"10.1016\/j.cose.2023.103142","volume":"128","author":"C Gao","year":"2023","unstructured":"Gao C, Yu J (2023) Securerc: a system for privacy-preserving relation classification using secure multi-party computation. Comp Sec 128:103142","journal-title":"Comp Sec"},{"key":"11076_CR87","doi-asserted-by":"crossref","unstructured":"Chen L, Xiao D, Yu Z, Zhang M (2024) Secure and efficient federated learning via novel multi-party computation and compressed sensing. Information Sciences, 120481","DOI":"10.1016\/j.ins.2024.120481"},{"key":"11076_CR88","doi-asserted-by":"crossref","unstructured":"Gasc\u00f3n A, Schoppmann P, Balle B, Raykova M, Doerner J, Zahur S, Evans D (2016) Privacy-preserving distributed linear regression on high-dimensional data. Cryptology ePrint Archive","DOI":"10.1515\/popets-2017-0053"},{"key":"11076_CR89","unstructured":"Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) $$\\{$$GAZELLE$$\\}$$: A low latency framework for secure neural network inference. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 1651\u20131669"},{"key":"11076_CR90","doi-asserted-by":"crossref","unstructured":"Li S, Xue K, Zhu B, Ding C, Gao X, Wei D, Wan T (2020) Falcon: A fourier transform based approach for fast and secure convolutional neural network predictions. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8705\u20138714","DOI":"10.1109\/CVPR42600.2020.00873"},{"key":"11076_CR91","doi-asserted-by":"crossref","unstructured":"Mishra P, Lehmkuhl R, Srinivasan A, Zheng W, Popa RA (2020) Delphi: A cryptographic inference system for neural networks. In: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, pp. 27\u201330","DOI":"10.1145\/3411501.3419418"},{"key":"11076_CR92","unstructured":"Jha NK, Ghodsi Z, Garg S, Reagen B (2021) Deepreduce: Relu reduction for fast private inference. In: International Conference on Machine Learning, pp. 4839\u20134849. PMLR"},{"key":"11076_CR93","doi-asserted-by":"crossref","unstructured":"Graepel T, Lauter K, Naehrig M (2012) Ml confidential: Machine learning on encrypted data. In: International Conference on Information Security and Cryptology, pp. 1\u201321. Springer","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"11076_CR94","doi-asserted-by":"crossref","unstructured":"Choi H, Woo SS, Kim H (2024) Blind-touch: Homomorphic encryption-based distributed neural network inference for privacy-preserving fingerprint authentication. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 38, pp. 21976\u201321985","DOI":"10.1609\/aaai.v38i20.30200"},{"key":"11076_CR95","doi-asserted-by":"crossref","unstructured":"Hijazi NM, Aloqaily M, Guizani M, Ouni B, Karray F (2023) Secure federated learning with fully homomorphic encryption for iot communications. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2023.3302065"},{"key":"11076_CR96","first-page":"102791","volume":"58","author":"H Li","year":"2021","unstructured":"Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. J Inf Sec Appl 58:102791","journal-title":"J Inf Sec Appl"},{"key":"11076_CR97","doi-asserted-by":"crossref","unstructured":"Liu Z, Wan L, Guo J, Huang F, Feng X, Wang L, Ma J (2023) Ppru: A privacy-preserving reputation updating scheme for cloud-assisted vehicular networks. IEEE Transactions on Vehicular Technology","DOI":"10.1109\/TVT.2023.3340723"},{"key":"11076_CR98","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: Global vectors for word representation. In: Conference on Empirical Methods in Natural Language Processing, pp. 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"key":"11076_CR99","unstructured":"Muhammad I, Yan Z (2015) Supervised machine learning approaches: A survey. ICTACT Journal on Soft Computing 5(3)"},{"key":"11076_CR100","doi-asserted-by":"crossref","unstructured":"Kim A, Song Y, Kim M, Lee K, Cheon JH (2018) Logistic regression model training based on the approximate homomorphic encryption. BMC medical genomics 2018(Suppl 4),","DOI":"10.1186\/s12920-018-0401-7"},{"key":"11076_CR101","unstructured":"Mihara K, Yamaguchi R, Mitsuishi M, Maruyama Y (2020) Neural network training with homomorphic encryption. Preprint at arXiv:2012.13552"},{"key":"11076_CR102","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8759922","author":"J Liu","year":"2021","unstructured":"Liu J, Wang C, Tu Z, Wang XA, Lin C, Li Z (2021) Secure knn classification scheme based on homomorphic encryption for cyberspace. Sec Commun Net. https:\/\/doi.org\/10.1155\/2021\/8759922","journal-title":"Sec Commun Net"},{"key":"11076_CR103","doi-asserted-by":"crossref","unstructured":"T\u2019Jonck K, Kancharla CR, Pang B, Hallez H, Boydens J (2022) Privacy preserving classification via machine learning model inference on homomorphic encrypted medical data. In: 2022 XXXI International Scientific Conference Electronics (ET). 2022 XXXI International Scientific Conference Electronics (ET), pp. 1\u20136. IEEE,","DOI":"10.1109\/ET55967.2022.9920289"},{"issue":"1","key":"11076_CR104","first-page":"166","volume":"24","author":"K Li","year":"2022","unstructured":"Li K, Huang R (2022) A ckks-based privacy preserving extreme learning machine. Int J Inf Sec 24(1):166\u2013175","journal-title":"Int J Inf Sec"},{"issue":"1","key":"11076_CR105","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12864-022-08469-w","volume":"23","author":"S Hong","year":"2022","unstructured":"Hong S, Park JH, Cho W, Choe H, Cheon JH (2022) Secure tumor classification by shallow neural network using homomorphic encryption. BMC Genom 23(1):1\u201319. https:\/\/doi.org\/10.1186\/s12864-022-08469-w","journal-title":"BMC Genom"},{"key":"11076_CR106","doi-asserted-by":"crossref","unstructured":"Rovida L (2023) Fast but approximate homomorphic k-means based on masking technique. International Journal of Information Security, 1\u201315","DOI":"10.1007\/s10207-023-00708-9"},{"issue":"4","key":"11076_CR107","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1137\/1037125","volume":"37","author":"TJ Ypma","year":"1995","unstructured":"Ypma TJ (1995) Historical development of the newton-raphson method. SIAM Rev 37(4):531\u2013551","journal-title":"SIAM Rev"},{"key":"11076_CR108","doi-asserted-by":"crossref","unstructured":"Bottou L (2010) Large-scale machine learning with stochastic gradient descent. In: Proceedings of COMPSTAT\u20192010: 19th International Conference on Computational StatisticsParis France, August 22-27, 2010 Keynote, Invited and Contributed Papers, pp. 177\u2013186. Springer","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"11076_CR109","doi-asserted-by":"crossref","unstructured":"Lu W-j, Zhou J-J, Sakuma J (2018) Non-interactive and output expressive private comparison from homomorphic encryption. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 67\u201374","DOI":"10.1145\/3196494.3196503"},{"key":"11076_CR110","doi-asserted-by":"crossref","unstructured":"Tueno A, Boev Y, Kerschbaum F (2020) Non-interactive private decision tree evaluation. In: Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25\u201326, 2020, Proceedings 34, pp. 174\u2013194. Springer","DOI":"10.1007\/978-3-030-49669-2_10"},{"key":"11076_CR111","unstructured":"Goldschmidt RE (1964) Applications of division by convergence. PhD thesis, Massachusetts Institute of Technology"},{"key":"11076_CR112","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1007\/s13042-019-01054-w","volume":"11","author":"W Wang","year":"2020","unstructured":"Wang W, Gan Y, Vong C-M, Chen C (2020) Homo-elm: fully homomorphic extreme learning machine. Int J Mach Learn Cybern 11:1531\u20131540","journal-title":"Int J Mach Learn Cybern"},{"key":"11076_CR113","doi-asserted-by":"crossref","unstructured":"Kuri S, Hayashi T, Omori T, Ozawa S, Aono Y, Wang L, Moriai S et al (2017) Privacy preserving extreme learning machine using additively homomorphic encryption. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1\u20138. IEEE","DOI":"10.1109\/SSCI.2017.8285190"},{"key":"11076_CR114","doi-asserted-by":"crossref","first-page":"226544","DOI":"10.1109\/ACCESS.2020.3045465","volume":"8","author":"A Al Badawi","year":"2020","unstructured":"Al Badawi A, Hoang L, Mun CF, Laine K, Aung KMM (2020) Privft: private and fast text classification with homomorphic encryption. IEEE Access 8:226544\u2013226556","journal-title":"IEEE Access"},{"key":"11076_CR115","unstructured":"Podschwadt R, Takabi D (2020) Classification of encrypted word embeddings using recurrent neural networks. Web Search and Data Mining, 27\u201331"},{"key":"11076_CR116","doi-asserted-by":"publisher","unstructured":"Podschwadt R, Takabi D (2021) Non-interactive privacy preserving recurrent neural network prediction with homomorphic encryption. IEEE International Conference on Cloud Computing, 65\u201370 https:\/\/doi.org\/10.1109\/CLOUD53861.2021.00019","DOI":"10.1109\/CLOUD53861.2021.00019"},{"key":"11076_CR117","doi-asserted-by":"crossref","unstructured":"Lee G, Kim M, Park JH, Hwang S-w, Cheon JH (2022) Privacy-preserving text classification on bert embeddings with homomorphic encryption. arXiv preprint arXiv:2210.02574","DOI":"10.18653\/v1\/2022.naacl-main.231"},{"key":"11076_CR118","doi-asserted-by":"crossref","unstructured":"Kim D, Lee G, Oh S (2022) Toward privacy-preserving text embedding similarity with homomorphic encryption. In: Proceedings of the Fourth Workshop on Financial Technology and Natural Language Processing (FinNLP). Proceedings of the Fourth Workshop on Financial Technology and Natural Language Processing (FinNLP), pp. 25\u201336","DOI":"10.18653\/v1\/2022.finnlp-1.4"},{"key":"11076_CR119","unstructured":"Walch R, Sousa S, Helminger L, Lindstaedt S, Rechberger C, Tr\u00fcgler A (2022) Cryptotl: Private, efficient and secure transfer learning. arXiv preprint arXiv:2205.11935"},{"key":"11076_CR120","doi-asserted-by":"publisher","unstructured":"Ali H, Tallal R, Qayyum A, Alghadhban A, Alazmi M, Alzamil A, AlUtaibi K, Qadir J (2022) Spam-das: Secure and privacy-aware misinformation detection as a service. TechRxiv, https:\/\/doi.org\/10.36227\/techrxiv.19351679.v1","DOI":"10.36227\/techrxiv.19351679.v1"},{"key":"11076_CR121","doi-asserted-by":"crossref","unstructured":"Jang J, Lee Y, Kim A, Na B, Yhee D, Lee B, Cheon JH, Yoon S (2022) Privacy-preserving deep sequential model with matrix homomorphic encryption. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. ASIA CCS \u201922, pp. 377\u2013391. Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/3488932.3523253"},{"key":"11076_CR122","doi-asserted-by":"crossref","unstructured":"Wang Z, Ikeda M (2023) High-throughput privacy-preserving gru network with homomorphic encryption. In: 2023 International Joint Conference on Neural Networks (IJCNN). 2023 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20139","DOI":"10.1109\/IJCNN54540.2023.10191194"},{"key":"11076_CR123","doi-asserted-by":"crossref","unstructured":"Li Z, Sang Y, Deng X, Tian H (2023) Lightweight and efficient privacy-preserving multimodal representation inference via fully homomorphic encryption. ACIIDS (1)","DOI":"10.1007\/978-981-99-5834-4_25"},{"key":"11076_CR124","doi-asserted-by":"crossref","unstructured":"Panda S (2021) Principal component analysis using ckks homomorphic scheme. In: Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be\u2019er Sheva, Israel, July 8\u20139, 2021, Proceedings 5, pp. 52\u201370. Springer","DOI":"10.1007\/978-3-030-78086-9_4"},{"key":"11076_CR125","unstructured":"Conneau A, Kiela D (2018) Senteval: An evaluation toolkit for universal sentence representations. arXiv preprint arXiv:1803.05449"},{"key":"11076_CR126","doi-asserted-by":"crossref","unstructured":"Joulin A, Grave E, Bojanowski P, Mikolov T (2016) Bag of tricks for efficient text classification. arXiv preprint arXiv:1607.01759","DOI":"10.18653\/v1\/E17-2068"},{"issue":"1","key":"11076_CR127","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/JPROC.2020.3004555","volume":"109","author":"Z Fuzhen","year":"2021","unstructured":"Fuzhen Z, Zhiyuan Q, Keyu D, Dongbo X, Yongchun Z, Hengshu Z, Hui X, Qing H (2021) A comprehensive survey on transfer learning. Procee IEEE 109(1):43\u201376","journal-title":"Procee IEEE"},{"key":"11076_CR128","doi-asserted-by":"crossref","unstructured":"He Z, Zhang T, Lee RB (2019) Model inversion attacks against collaborative inference. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 148\u2013162","DOI":"10.1145\/3359789.3359824"},{"key":"11076_CR129","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"key":"11076_CR130","volume-title":"Chebfun guide","author":"TA Driscoll","year":"2014","unstructured":"Driscoll TA, Hale N, Trefethen LN (2014) Chebfun guide. Pafnuty Publications, Oxford"},{"key":"11076_CR131","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2021.12.076","volume":"476","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Komachi M, Kajiwara T, Chu C (2022) Region-attentive multimodal neural machine translation. Neurocomputing 476:1\u201313","journal-title":"Neurocomputing"},{"issue":"4","key":"11076_CR132","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1109\/TPAMI.2016.2598339","volume":"39","author":"A Karpathy","year":"2017","unstructured":"Karpathy A, Fei-Fei L (2017) Deep visual-semantic alignments for generating image descriptions. IEEE Trans Pattern Analy Mach Intell 39(4):664\u2013676","journal-title":"IEEE Trans Pattern Analy Mach Intell"},{"key":"11076_CR133","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. Preprint at arXiv:1810.04805"},{"key":"11076_CR134","doi-asserted-by":"crossref","unstructured":"Boemer F, Costache A, Cammarota R, Wierzynski C (2019) ngraph-he2: A high-throughput framework for neural network inference on encrypted data. In: Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, pp. 45\u201356","DOI":"10.1145\/3338469.3358944"},{"key":"11076_CR135","doi-asserted-by":"crossref","unstructured":"Ishiyama T, Suzuki T, Yamana H (2020) Highly accurate cnn inference using approximate activation functions over homomorphic encryption. In: 2020 IEEE International Conference on Big Data (Big Data). 2020 IEEE International Conference on Big Data (Big Data), pp. 3989\u20133995. IEEE,","DOI":"10.1109\/BigData50022.2020.9378372"},{"key":"11076_CR136","doi-asserted-by":"crossref","unstructured":"Jung W, Kim S, Ahn JH, Cheon JH, Lee Y (2021) Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with gpus. IACR Transactions on Cryptographic Hardware and Embedded Systems, 114\u2013148","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"11076_CR137","doi-asserted-by":"crossref","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","volume":"10","author":"J-W Lee","year":"2022","unstructured":"Lee J-W, Kang H, Lee Y, Choi W, Eom J, Deryabin M, Lee E, Lee J, Yoo D, Kim Y-S (2022) Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access 10:30039\u201330054","journal-title":"IEEE Access"},{"issue":"5","key":"11076_CR138","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TC.2021.3076123","volume":"71","author":"G Lloret-Talavera","year":"2022","unstructured":"Lloret-Talavera G, Jorda M, Servat H, Boemer F, Chauhan C, Tomishima S, Shah NN, Pe\u00f1a AJ (2022) Enabling homomorphically encrypted inference for large dnn models. IEEE Trans Comp 71(5):1145\u20131155. https:\/\/doi.org\/10.1109\/TC.2021.3076123","journal-title":"IEEE Trans Comp"},{"key":"11076_CR139","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000971","author":"L Li","year":"2022","unstructured":"Li L, Zhu H, Zheng Y, Wang F, Lu R, Li H (2022) Efficient and privacy-preserving fusion based multi-biometric recognition. Global Commun Conf. https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000971","journal-title":"Global Commun Conf"},{"key":"11076_CR140","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007995","author":"L Sperling","year":"2022","unstructured":"Sperling L, Ratha N, Ross A, Boddeti VN (2022) Heft: homomorphically encrypted fusion of biometric templates. Int Conf Biom. https:\/\/doi.org\/10.1109\/IJCB54206.2022.10007995","journal-title":"Int Conf Biom"},{"key":"11076_CR141","doi-asserted-by":"crossref","unstructured":"Lee J-W, Lee E, Kim Y-S, No J-S (2023) Rotation key reduction for client-server systems of deep neural network on fully homomorphic encryption. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 36\u201368. Springer","DOI":"10.1007\/978-981-99-8736-8_2"},{"key":"11076_CR142","doi-asserted-by":"crossref","unstructured":"Y, N, M, Z, S, G, G, DM, R, C, C, W, D, M, T R (2023) Efficient machine learning on encrypted data using hyperdimensional computing. In: 2023 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED). 2023 IEEE\/ACM International Symposium on Low Power Electronics and Design (ISLPED), pp. 1\u20136","DOI":"10.1109\/ISLPED58423.2023.10244262"},{"key":"11076_CR143","doi-asserted-by":"crossref","unstructured":"Sandler M, Howard A, Zhu M, Zhmoginov A, Chen L-C (2018) Mobilenetv2: Inverted residuals and linear bottlenecks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 4510\u20134520","DOI":"10.1109\/CVPR.2018.00474"},{"key":"11076_CR144","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013210. PMLR"},{"key":"11076_CR145","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"11076_CR146","unstructured":"Jang E, Gu S, Poole B (2016) Categorical reparameterization with gumbel-softmax. Preprint at arXiv:1611.01144"},{"issue":"1","key":"11076_CR147","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/THMS.2014.2361437","volume":"45","author":"K Nguyen","year":"2014","unstructured":"Nguyen K, Denman S, Sridharan S, Fookes C (2014) Score-level multibiometric fusion based on dempster-shafer theory incorporating uncertainty factors. IEEE Trans Human-Mach Syst 45(1):132\u2013140","journal-title":"IEEE Trans Human-Mach Syst"},{"key":"11076_CR148","unstructured":"Ahmed D, Sabir A, Das A (2023) Spying through your voice assistants: realistic voice command fingerprinting. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 2419\u20132436"},{"key":"11076_CR149","doi-asserted-by":"crossref","first-page":"100618","DOI":"10.1016\/j.cosrev.2024.100618","volume":"51","author":"Y Deldjoo","year":"2024","unstructured":"Deldjoo Y, Schedl M, Knees P (2024) Content-driven music recommendation: evolution, state of the art, and challenges. Comp Sci Rev 51:100618","journal-title":"Comp Sci Rev"},{"key":"11076_CR150","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Advances in neural information processing systems 30"},{"key":"11076_CR151","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69255-1_13","author":"M-C Chindris","year":"2020","unstructured":"Chindris M-C, Togan M, Arseni S-C (2020) Secure speaker recognition system using homomorphic encryption. Sec Inf Technol Commun. https:\/\/doi.org\/10.1007\/978-3-030-69255-1_13","journal-title":"Sec Inf Technol Commun"},{"key":"11076_CR152","unstructured":"Rahulamathavan Y (2022) Privacy-preserving similarity calculation of speaker features using fully homomorphic encryption. Preprint at arXiv:2202.07994"},{"key":"11076_CR153","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548350","author":"P Zheng","year":"2022","unstructured":"Zheng P, Cai Z, Zeng H, Huang J (2022) Keyword spotting in the homomorphic encrypted domain using deep complex-valued cnn. ACM Int Conf Multimed. https:\/\/doi.org\/10.1145\/3503161.3548350","journal-title":"ACM Int Conf Multimed"},{"key":"11076_CR154","doi-asserted-by":"publisher","unstructured":"Elworth DL, Kim S (2022) Hekws: Privacy-preserving convolutional neural network-based keyword spotting with a ciphertext packing technique. 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), 01\u201306 https:\/\/doi.org\/10.1109\/MMSP55362.2022.9949982","DOI":"10.1109\/MMSP55362.2022.9949982"},{"key":"11076_CR155","doi-asserted-by":"crossref","unstructured":"Zhang Q-y, Wen Y-w, Huang Y-b, Li F-p (2024) Secure speech retrieval method using deep hashing and ckks fully homomorphic encryption. Multimedia Tools and Applications","DOI":"10.1007\/s11042-024-18113-2"},{"key":"11076_CR156","unstructured":"Tang R, Lin J (2017) Honk: A pytorch reimplementation of convolutional neural networks for keyword spotting. Computing Research Repository arXiv:1710.06554"},{"key":"11076_CR157","doi-asserted-by":"crossref","unstructured":"Lagesse B, Nguyen G, Goswami U, Wu K (2021) You had to be there: Private video sharing for mobile phones using fully homomorphic encryption. In: 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops), pp. 730\u2013735. IEEE","DOI":"10.1109\/PerComWorkshops51409.2021.9431029"},{"key":"11076_CR158","doi-asserted-by":"crossref","first-page":"80565","DOI":"10.1109\/ACCESS.2022.3192454","volume":"10","author":"L Zhang","year":"2022","unstructured":"Zhang L, Saito H, Yang L, Wu J (2022) Privacy-preserving federated transfer learning for driver drowsiness detection. IEEE Access 10:80565\u201380574","journal-title":"IEEE Access"},{"key":"11076_CR159","doi-asserted-by":"crossref","unstructured":"Wu K, Lagesse B (2019) Do you see what i see?$$<$$ subtitle$$>$$ detecting hidden streaming cameras through similarity of simultaneous observation. In: 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom, pp. 1\u201310. IEEE","DOI":"10.1109\/PERCOM.2019.8767411"},{"issue":"5","key":"11076_CR160","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1109\/JAS.2023.123618","volume":"10","author":"T Wu","year":"2023","unstructured":"Wu T, He S, Liu J, Sun S, Liu K, Han Q-L, Tang Y (2023) A brief overview of chatgpt: the history, status quo and potential future development. IEEE\/CAA J Autom Sinica 10(5):1122\u20131136","journal-title":"IEEE\/CAA J Autom Sinica"},{"key":"11076_CR161","doi-asserted-by":"publisher","first-page":"80218","DOI":"10.1109\/ACCESS.2023.3300381","volume":"11","author":"M Gupta","year":"2023","unstructured":"Gupta M, Akiri C, Aryal K, Parker E, Praharaj L (2023) From chatgpt to threatgpt: impact of generative ai in cybersecurity and privacy. IEEE Access 11:80218\u201380245. https:\/\/doi.org\/10.1109\/ACCESS.2023.3300381","journal-title":"IEEE Access"},{"key":"11076_CR162","unstructured":"Dong Y, Lu W-j, Zheng Y, Wu H, Zhao D, Tan J, Huang Z, Hong C, Wei T, Chen W (2023) PUMA: Secure Inference of LLaMA-7B in Five Minutes"},{"key":"11076_CR163","unstructured":"Zhang J, Liu J, Yang X, Wang Y, Chen K, Hou X, Ren K, Yang X (2024) Secure transformer inference made non-interactive. Cryptology ePrint Archive"},{"key":"11076_CR164","unstructured":"Lu W-j, Huang Z, Gu Z, Li J, Liu J, Ren K, Hong C, Wei T, Chen W (2023) Bumblebee: Secure two-party inference framework for large transformers. Cryptology ePrint Archive"},{"key":"11076_CR165","doi-asserted-by":"crossref","unstructured":"Pang Q, Zhu J, M\u00f6llering H, Zheng W, Schneider T (2024) Bolt: Privacy-preserving, accurate and efficient inference for transformers. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 130\u2013130. IEEE Computer Society","DOI":"10.1109\/SP54263.2024.00130"},{"issue":"9","key":"11076_CR166","doi-asserted-by":"crossref","first-page":"5880","DOI":"10.1002\/int.22818","volume":"37","author":"J Ma","year":"2022","unstructured":"Ma J, Naas S-A, Sigg S, Lyu X (2022) Privacy-preserving federated learning based on multi-key homomorphic encryption. Int J Intell Syst 37(9):5880\u20135901","journal-title":"Int J Intell Syst"},{"key":"11076_CR167","doi-asserted-by":"crossref","unstructured":"Zhang Y, Miao Y, Li X, Wei L, Liu Z, Choo K-KR, Deng RH (2023) Efficient privacy-preserving federated learning with improved compressed sensing. IEEE Transactions on Industrial Informatics","DOI":"10.1109\/TII.2023.3297596"},{"key":"11076_CR168","doi-asserted-by":"crossref","unstructured":"Hu C, Li B (2024) Maskcrypt: Federated learning with selective homomorphic encryption. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2024.3392424"},{"issue":"4","key":"11076_CR169","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE Trans Inf Theory 52(4):1289\u20131306","journal-title":"IEEE Trans Inf Theory"},{"key":"11076_CR170","doi-asserted-by":"crossref","unstructured":"Kurniawan A (2021) Iot projects with nvidia jetson nano. IoT Projects with NVIDIA Jetson Nano","DOI":"10.1007\/978-1-4842-6452-2"},{"issue":"9","key":"11076_CR171","doi-asserted-by":"crossref","first-page":"1988","DOI":"10.3390\/s19091988","volume":"19","author":"L Mart\u00ednez-Villase\u00f1or","year":"2019","unstructured":"Mart\u00ednez-Villase\u00f1or L, Ponce H, Brieva J, Moya-Albor E, N\u00fa\u00f1ez-Mart\u00ednez J, Pe\u00f1afort-Asturiano C (2019) Up-fall detection dataset: a multimodal approach. Sensors 19(9):1988","journal-title":"Sensors"},{"key":"11076_CR172","doi-asserted-by":"crossref","unstructured":"Qiu F, Yang H, Zhou L, Ma C, Fang L (2022) Privacy preserving federated learning using ckks homomorphic encryption. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 427\u2013440. Springer","DOI":"10.1007\/978-3-031-19208-1_35"},{"issue":"3","key":"11076_CR173","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3560486","volume":"41","author":"M Imran","year":"2023","unstructured":"Imran M, Yin H, Chen T, Nguyen QVH, Zhou A, Zheng K (2023) Refrs: resource-efficient federated recommender system for dynamic and diversified user preferences. ACM Trans Inf Syst 41(3):1\u201330","journal-title":"ACM Trans Inf Syst"},{"key":"11076_CR174","doi-asserted-by":"crossref","unstructured":"Hao X, Lin C, Dong W, Huang X, Xiong H (2023) Robust and secure federated learning against hybrid attacks: a generic architecture. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2023.3336521"},{"key":"11076_CR175","doi-asserted-by":"crossref","unstructured":"Fotohi R, Aliee FS, Farahani B (2024) A lightweight and secure deep learning model for privacy-preserving federated learning in intelligent enterprises. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3421602"},{"key":"11076_CR176","doi-asserted-by":"crossref","unstructured":"Nguyen C-H, Saputra YM, Hoang DT, Nguyen DN, Nguyen V-D, Xiao Y, Dutkiewicz E (2024) Encrypted data caching and learning framework for robust federated learning-based mobile edge computing. IEEE\/ACM Transactions on Networking","DOI":"10.36227\/techrxiv.22656385"},{"key":"11076_CR177","doi-asserted-by":"crossref","unstructured":"Srivastava SK, Vidyarthi A, Singh SK (2023) Modified ml-knn: Role of similarity measures and nearest neighbor configuration in multi-label text classification on big social network graph data. In: Advances in Computers vol. 128, pp. 287\u2013312. Elsevier,","DOI":"10.1016\/bs.adcom.2021.10.006"},{"issue":"6","key":"11076_CR178","first-page":"2733","volume":"34","author":"N Jalal","year":"2022","unstructured":"Jalal N, Mehmood A, Choi GS, Ashraf I (2022) A novel improved random forest for text classification using feature ranking and optimal number of trees. J King Saud Univ-Comp Inf Sci 34(6):2733\u20132742","journal-title":"J King Saud Univ-Comp Inf Sci"},{"key":"11076_CR179","doi-asserted-by":"crossref","unstructured":"Ruan S, Chen B, Song K, Li H (2022) Weighted na\u00efve bayes text classification algorithm based on improved distance correlation coefficient. Neural Computing and Applications, 1\u201310","DOI":"10.1007\/s00521-021-05989-6"},{"key":"11076_CR180","doi-asserted-by":"crossref","unstructured":"Xu W, Shen Y, Bergmann N, Hu W (2018) Sensor-assisted multi-view face recognition system on smart glass. IEEE Transactions on Mobile Computing 17(1)","DOI":"10.1109\/TMC.2017.2702634"},{"key":"11076_CR181","unstructured":"UCL Research Data Repository. http:\/\/archive.ics.uci.edu\/datasets"},{"key":"11076_CR182","unstructured":"Chen D, Qu H, Xu G (2024) AegisFL: Efficient and flexible privacy-preserving byzantine-robust cross-silo federated learning. In: Forty-first International Conference on Machine Learning. https:\/\/openreview.net\/forum?id=PHUAG63Efe"},{"issue":"10","key":"11076_CR183","first-page":"1","volume":"56","author":"PP Liang","year":"2024","unstructured":"Liang PP, Zadeh A, Morency L-P (2024) Foundations & trends in multimodal machine learning: principles, challenges, and open questions. ACM Comp Surv 56(10):1\u201342","journal-title":"ACM Comp Surv"},{"issue":"10","key":"11076_CR184","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3559540","volume":"55","author":"E Brophy","year":"2023","unstructured":"Brophy E, Wang Z, She Q, Ward T (2023) Generative adversarial networks in time series: a systematic literature review. ACM Comp Surv 55(10):1\u201331","journal-title":"ACM Comp Surv"},{"key":"11076_CR185","doi-asserted-by":"crossref","unstructured":"Yao Y, Duan J, Xu K, Cai Y, Sun Z, Zhang Y (2024) A survey on large language model (llm) security and privacy: The good, the bad, and the ugly. High-Confidence Computing 4(2)","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"11076_CR186","doi-asserted-by":"crossref","unstructured":"Das BC, Amini MH, Wu Y (2024) Security and privacy challenges of large language models: A survey. Preprint at arXiv:2402.00888","DOI":"10.1145\/3712001"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-11076-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-024-11076-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-11076-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T11:36:40Z","timestamp":1738582600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-024-11076-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":186,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["11076"],"URL":"https:\/\/doi.org\/10.1007\/s10462-024-11076-8","relation":{},"ISSN":["1573-7462"],"issn-type":[{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,6]]},"assertion":[{"value":"13 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"82"}}