{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:59Z","timestamp":1775188139216,"version":"3.50.1"},"reference-count":157,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T00:00:00Z","timestamp":1766707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:00:00Z","timestamp":1768521600000},"content-version":"vor","delay-in-days":21,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62472125"],"award-info":[{"award-number":["62472125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62206139"],"award-info":[{"award-number":["62206139"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["72495122"],"award-info":[{"award-number":["72495122"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62472125"],"award-info":[{"award-number":["62472125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Guangdong Province, China","award":["2025A1515011258"],"award-info":[{"award-number":["2025A1515011258"]}]},{"name":"Natural Science Foundation of Guangdong Province, China","award":["2025A1515011258"],"award-info":[{"award-number":["2025A1515011258"]}]},{"name":"Shenzhen Science and Technology Programs","award":["GXWD20231128102922001"],"award-info":[{"award-number":["GXWD20231128102922001"]}]},{"name":"Shenzhen Science and Technology Programs","award":["GXWD20231128102922001"],"award-info":[{"award-number":["GXWD20231128102922001"]}]},{"name":"Major Key Project of PCL","award":["PCL2025AS209"],"award-info":[{"award-number":["PCL2025AS209"]}]},{"name":"Major Key Project of PCL","award":["PCL2025AS209"],"award-info":[{"award-number":["PCL2025AS209"]}]},{"name":"Major Key Project of PCL","award":["PCL2025AS209"],"award-info":[{"award-number":["PCL2025AS209"]}]},{"name":"Major Key Project of PCL","award":["PCL2025AS209"],"award-info":[{"award-number":["PCL2025AS209"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"DOI":"10.1007\/s10462-025-11466-6","type":"journal-article","created":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T16:02:20Z","timestamp":1766764940000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptography-based privacy-preserving large language models: a lifecycle survey of frameworks, methods, and future directions"],"prefix":"10.1007","volume":"59","author":[{"given":"Jinglong","family":"Luo","sequence":"first","affiliation":[]},{"given":"Yehong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shiyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Haoran","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zenglin","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,26]]},"reference":[{"issue":"8016","key":"11466_CR1","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1038\/s41586-024-07487-w","volume":"630","author":"J Abramson","year":"2024","unstructured":"Abramson J, Adler J, Dunger J et al (2024) Accurate structure prediction of biomolecular interactions with Alphafold 3. Nature 630(8016):493\u2013500","journal-title":"Nature"},{"key":"11466_CR2","unstructured":"AI Z (2024) Tfhe-rs. https:\/\/github.com\/zama-ai\/tfhe-rs"},{"key":"11466_CR3","doi-asserted-by":"crossref","unstructured":"Akimoto Y, Fukuchi K, Akimoto Y, et\u00a0al (2023) Privformer: Privacy-preserving transformer with mpc. In: 2023 IEEE 8th European symposium on security and privacy (EuroS &P), IEEE, pp 392\u2013410","DOI":"10.1109\/EuroSP57164.2023.00031"},{"issue":"2","key":"11466_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie M, Chang JM (2019) Privacy-preserving machine learning: threats and solutions. IEEE Secur Privacy 17(2):49\u201358","journal-title":"IEEE Secur Privacy"},{"key":"11466_CR5","unstructured":"AntCPLab (2022) OpenBumbleBee. https:\/\/github.com\/AntCPLab\/OpenBumbleBee"},{"key":"11466_CR6","doi-asserted-by":"crossref","unstructured":"Beaver D (1991) Efficient multiparty protocols using circuit randomization. In: Annual international cryptology conference, Springer, pp 420\u2013432","DOI":"10.1007\/3-540-46766-1_34"},{"key":"11466_CR7","doi-asserted-by":"crossref","unstructured":"Behnia R, Ebrahimi MR, Pacheco J, et\u00a0al (2022) Ew-tune: A framework for privately fine-tuning large language models with differential privacy. In: 2022 IEEE international conference on data mining workshops (ICDMW), IEEE, pp 560\u2013566","DOI":"10.1109\/ICDMW58026.2022.00078"},{"key":"11466_CR8","doi-asserted-by":"crossref","unstructured":"Ben-Or M, Goldwasser S, Wigderson A (2019) Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Providing sound foundations for cryptography: on the work of Shafi Goldwasser and Silvio Micali. pp 351\u2013371","DOI":"10.1145\/3335741.3335756"},{"key":"11466_CR9","unstructured":"Bommasani R, Hudson DA, Adeli E, et\u00a0al (2021) On the opportunities and risks of foundation models. arXiv preprint arXiv:2108.07258"},{"key":"11466_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.neucom.2019.11.041","volume":"384","author":"A Boulemtafes","year":"2020","unstructured":"Boulemtafes A, Derhab A, Challal Y (2020) A review of privacy-preserving techniques for deep learning. Neurocomputing 384:21\u201345","journal-title":"Neurocomputing"},{"issue":"3","key":"11466_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory (TOCT) 6(3):1\u201336","journal-title":"ACM Trans Comput Theory (TOCT)"},{"key":"11466_CR12","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown T, Mann B, Ryder N et al (2020) Language models are few-shot learners. Adv Neural Inf Process Syst 33:1877\u20131901","journal-title":"Adv Neural Inf Process Syst"},{"key":"11466_CR13","doi-asserted-by":"crossref","unstructured":"Canetti R (2001) Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE symposium on foundations of computer science, IEEE, pp 136\u2013145","DOI":"10.1109\/SFCS.2001.959888"},{"key":"11466_CR14","doi-asserted-by":"crossref","unstructured":"Chateau L, Arora P, Herman L (2025) Cross-cultural approaches to creative media content in the age of ai. Media, Cult Soc, p 01634437251328188","DOI":"10.1177\/01634437251328188"},{"key":"11466_CR16","doi-asserted-by":"crossref","unstructured":"Chen T, Bao H, Huang S, et\u00a0al (2022) THE-X: Privacy-preserving transformer inference with homomorphic encryption. In: Findings of the association for computational linguistics, pp 3510\u20133520","DOI":"10.18653\/v1\/2022.findings-acl.277"},{"key":"11466_CR19","doi-asserted-by":"crossref","unstructured":"Chen D, Zhang Y, Kundu S, et\u00a0al (2023) Rna-vit: reduced-dimension approximate normalized attention vision transformers for latency efficient private inference. In: 2023 IEEE\/ACM international conference on computer aided design (ICCAD), IEEE, pp 1\u20139","DOI":"10.1109\/ICCAD57390.2023.10323702"},{"key":"11466_CR18","doi-asserted-by":"crossref","unstructured":"Chen G, Qin Z, Yang M, et\u00a0al (2024) Unveiling the vulnerability of private fine-tuning in split-based frameworks for large language models: a bidirectionally enhanced attack. arXiv:2409.00960","DOI":"10.1145\/3658644.3690295"},{"issue":"4","key":"11466_CR15","first-page":"1","volume":"19","author":"C Chen","year":"2025","unstructured":"Chen C, Wei L, Xie J et al (2025) Privacy-preserving machine learning based on cryptography: a survey. ACM Trans Knowl Discov Data 19(4):1\u201333","journal-title":"ACM Trans Knowl Discov Data"},{"key":"11466_CR17","doi-asserted-by":"crossref","unstructured":"Cheng W, Sun K, Zhang X, et\u00a0al (2025) Security attacks on llm-based code completion tools. In: Proceedings of the AAAI conference on artificial intelligence, pp 23669\u201323677","DOI":"10.1609\/aaai.v39i22.34537"},{"key":"11466_CR20","doi-asserted-by":"crossref","unstructured":"Cheon JH, Kim A, Kim M, et\u00a0al (2017) Homomorphic encryption for arithmetic of approximate numbers. https:\/\/ckks.org\/software\/\/","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"11466_CR21","unstructured":"Choromanski KM, Likhosherstov V, Dohan D, et\u00a0al (2021) Rethinking attention with performers. In: 9th International conference on learning representations, ICLR 2021"},{"key":"11466_CR22","doi-asserted-by":"crossref","unstructured":"Cho K, Van\u00a0Merri\u00ebnboer B, Gulcehre C, et\u00a0al (2014) Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"key":"11466_CR23","unstructured":"Costa-Juss\u00e0 MR, Cross J, \u00c7elebi O, et\u00a0al (2022) No language left behind: scaling human-centered machine translation. arXiv preprint arXiv:2207.04672"},{"issue":"6","key":"11466_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3712001","volume":"57","author":"BC Das","year":"2025","unstructured":"Das BC, Amini MH, Wu Y (2025) Security and privacy challenges of large language models: a survey. ACM Comput Surv 57(6):1\u201339","journal-title":"ACM Comput Surv"},{"key":"11466_CR25","unstructured":"Desilo (2023) liberate-fhe. https:\/\/github.com\/Desilo\/liberate-fhe"},{"key":"11466_CR26","first-page":"10088","volume":"36","author":"T Dettmers","year":"2023","unstructured":"Dettmers T, Pagnoni A, Holtzman A et al (2023) Qlora: Efficient finetuning of quantized llms. Adv Neural Inf Process Syst 36:10088\u201310115","journal-title":"Adv Neural Inf Process Syst"},{"key":"11466_CR27","doi-asserted-by":"crossref","unstructured":"Devlin J, Chang M, Lee K, et\u00a0al (2019) BERT: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics, pp 4171\u20134186","DOI":"10.18653\/v1\/N19-1423"},{"key":"11466_CR28","doi-asserted-by":"crossref","unstructured":"Ding Y, Guo H, Guan Y, et\u00a0al (2025) East: Efficient and accurate secure inference framework for transformer. IEEE Trans Serv Comput","DOI":"10.1109\/TSC.2025.3577491"},{"key":"11466_CR29","unstructured":"Dong Y, Lu WJ, Zheng Y, et\u00a0al (2023) PUMA: Secure inference of LLaMA-7B in five minutes. arXiv preprint arXiv:2307.12533"},{"key":"11466_CR30","doi-asserted-by":"crossref","unstructured":"Dong J, Zhang Y, Yan L, et\u00a0al (2025) \u201ci\u2019ve decided to leak\u201d: Probing internals behind prompt leakage intents. In: Proceedings of the 2025 conference on empirical methods in natural language processing, pp 21329\u201321359","DOI":"10.18653\/v1\/2025.emnlp-main.1082"},{"key":"11466_CR31","unstructured":"Dubey A, Jauhri A, Pandey A, et\u00a0al (2024) The llama 3 herd of models. arXiv e-prints pp arXiv\u20132407"},{"key":"11466_CR32","doi-asserted-by":"crossref","unstructured":"Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. In: The algorithmic foundations of differential privacy, pp 19\u201320","DOI":"10.1561\/9781601988195"},{"key":"11466_CR34","doi-asserted-by":"crossref","unstructured":"Eloundou T, Manning S, Mishkin P, et\u00a0al (2023) Gpts are gpts: an early look at the labor market impact potential of large language models. arXiv preprint arXiv:2303.10130","DOI":"10.1126\/science.adj0998"},{"issue":"6702","key":"11466_CR33","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1126\/science.adj0998","volume":"384","author":"T Eloundou","year":"2024","unstructured":"Eloundou T, Manning S, Mishkin P et al (2024) Gpts are gpts: labor market impact potential of llms. Science 384(6702):1306\u20131308","journal-title":"Science"},{"key":"11466_CR35","unstructured":"Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive"},{"key":"11466_CR36","doi-asserted-by":"crossref","unstructured":"Fredrikson M, Jha S, Ristenpart T (2015) Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1322\u20131333","DOI":"10.1145\/2810103.2813677"},{"key":"11466_CR37","unstructured":"Frery J, Bredehoft R, Klemsa J, et\u00a0al (2025) Private lora fine-tuning of open-source llms with homomorphic encryption. arXiv preprint arXiv:2505.07329"},{"key":"11466_CR38","doi-asserted-by":"publisher","first-page":"134981","DOI":"10.52202\/079017-4290","volume":"37","author":"W Fu","year":"2024","unstructured":"Fu W, Wang H, Gao C et al (2024) Membership inference attacks against fine-tuned large language models via self-prompt calibration. Adv Neural Inf Process Syst 37:134981\u2013135010","journal-title":"Adv Neural Inf Process Syst"},{"key":"11466_CR39","unstructured":"Gentry C (2009) A fully homomorphic encryption scheme. Stanford University"},{"key":"11466_CR40","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, et\u00a0al (2016) CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In: Proceedings of the 33nd international conference on machine learning, pp 201\u2013210"},{"key":"11466_CR41","doi-asserted-by":"publisher","unstructured":"Goldreich O, Micali S, Wigderson A (2019) How to play any mental game, or a completeness theorem for protocols with honest majority. In: Goldreich O (ed) Providing sound foundations for cryptography: on the work of Shafi goldwasser and Silvio Micali. ACM, p 307\u2013328, https:\/\/doi.org\/10.1145\/3335741.3335755, https:\/\/doi.org\/10.1145\/3335741.3335755","DOI":"10.1145\/3335741.3335755"},{"key":"11466_CR42","doi-asserted-by":"crossref","unstructured":"Graves A (2012) Long short-term memory. Supervised sequence labelling with recurrent neural networks, pp 37\u201345","DOI":"10.1007\/978-3-642-24797-2_4"},{"key":"11466_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93049-7","volume-title":"Introduction to security reduction","author":"F Guo","year":"2018","unstructured":"Guo F, Susilo W, Mu Y (2018) Introduction to security reduction. Springer"},{"key":"11466_CR44","unstructured":"Guo P, Ren Y, Hu Y, et\u00a0al (2024) Teaching large language models to translate on low-resource languages with textbook prompting. In: Proceedings of the 2024 Joint international conference on computational linguistics, language resources and evaluation (LREC-COLING 2024), pp 15685\u201315697"},{"key":"11466_CR46","doi-asserted-by":"crossref","unstructured":"Gupta K, Jawalkar N, Mukherjee A, et\u00a0al (2024) Sigma: Secure gpt inference with function secret sharing. Proceedings on privacy enhancing technologies","DOI":"10.56553\/popets-2024-0107"},{"key":"11466_CR45","doi-asserted-by":"crossref","unstructured":"Gupta K, Chandran N, Gupta D, et\u00a0al (2025) Shark: actively secure inference using function secret sharing. In: 2025 IEEE symposium on security and privacy (SP), IEEE, pp 2472\u20132490","DOI":"10.1109\/SP61157.2025.00175"},{"key":"11466_CR47","first-page":"15718","volume":"35","author":"M Hao","year":"2022","unstructured":"Hao M, Li H, Chen H et al (2022) Iron: Private inference on transformers. Adv Neural Inf Process Syst 35:15718\u201315731","journal-title":"Adv Neural Inf Process Syst"},{"key":"11466_CR48","unstructured":"Hayou S, Ghosh N, Yu B (2024) Lora+: Efficient low rank adaptation of large models. arXiv preprint arXiv:2402.12354"},{"key":"11466_CR49","unstructured":"Hesamifard E, Takabi H, Ghasemi M (2017) CryptoDL: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189"},{"key":"11466_CR50","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, et\u00a0al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"11466_CR51","unstructured":"Hou X, Liu J, Li J, et\u00a0al (2023) CipherGPT: Secure two-party GPT inference. Cryptology ePrint Archive"},{"issue":"11s","key":"11466_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3523273","volume":"54","author":"H Hu","year":"2022","unstructured":"Hu H, Salcic Z, Sun L et al (2022a) Membership inference attacks on machine learning: a survey. ACM Comput Surv (CSUR) 54(11s):1\u201337","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"2","key":"11466_CR53","first-page":"3","volume":"1","author":"EJ Hu","year":"2022","unstructured":"Hu EJ, Shen Y, Wallis P et al (2022b) Lora: Low-rank adaptation of large language models. ICLR 1(2):3","journal-title":"ICLR"},{"key":"11466_CR55","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der\u00a0Maaten L, et\u00a0al (2017) Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"11466_CR54","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.18653\/v1\/2024.findings-naacl.94","volume":"2024","author":"H Huang","year":"2024","unstructured":"Huang H, Zhao Z, Backes M et al (2024a) Composite backdoor attacks against large language models. Findings of the association for computational linguistics NAACL 2024:1459\u20131472","journal-title":"Findings of the association for computational linguistics NAACL"},{"key":"11466_CR56","doi-asserted-by":"crossref","unstructured":"Huang W, Wang Y, Cheng A et al (2024b) A fast, performant, secure distributed training framework for llm. ICASSP 2024\u20132024 IEEE international conference on Acoustics. IEEE, Speech and Signal Processing (ICASSP), pp 4800\u20134804","DOI":"10.1109\/ICASSP48485.2024.10446717"},{"key":"11466_CR57","unstructured":"Huang P, Yadav C, Wu R, et\u00a0al (2025) Can we infer confidential properties of training data from llms? In: ICML 2025 Workshop on Reliable and Responsible Foundation Models"},{"key":"11466_CR58","unstructured":"Hurst A, Lerer A, Goucher AP, et\u00a0al (2024) Gpt-4o system card. arXiv preprint arXiv:2410.21276"},{"key":"11466_CR59","doi-asserted-by":"crossref","unstructured":"Ibarrondo A, Viand A (2021) Pyfhel. https:\/\/github.com\/ibarrond\/Pyfhel","DOI":"10.1145\/3474366.3486923"},{"key":"11466_CR60","unstructured":"Irdan (2014) JustGarble. https:\/\/github.com\/irdan\/justGarble"},{"key":"11466_CR61","doi-asserted-by":"crossref","unstructured":"Ishai Y, Kilian J, Nissim K, et\u00a0al (2003) Extending oblivious transfers efficiently. In: Annual international cryptology conference, Springer, pp 145\u2013161","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"11466_CR62","doi-asserted-by":"crossref","unstructured":"Kairouz P, McMahan HB, Avent B, et\u00a0al (2021) Advances and open problems in federated learning. Foundations and trends\u00ae in machine learning 14(1\u20132):1\u2013210","DOI":"10.1561\/2200000083"},{"key":"11466_CR63","unstructured":"Kanav99 (2025) Shark. https:\/\/github.com\/kanav99\/shark"},{"key":"11466_CR64","doi-asserted-by":"crossref","unstructured":"Kandpal N, Pillutla K, Oprea A, et\u00a0al (2024) User inference attacks on large language models. In: Proceedings of the 2024 conference on empirical methods in natural language processing, pp 18238\u201318265","DOI":"10.18653\/v1\/2024.emnlp-main.1014"},{"key":"11466_CR65","doi-asserted-by":"crossref","unstructured":"Kei AY, Chow SS (2025) Shaft: Secure, handy, accurate, and fast transformer inference. In: Network and distributed system security symposium, NDSS","DOI":"10.14722\/ndss.2025.242287"},{"key":"11466_CR66","doi-asserted-by":"publisher","unstructured":"Keller M (2020) MP-SPDZ: A versatile framework for multi-party computation. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security. https:\/\/doi.org\/10.1145\/3372297.3417872, https:\/\/doi.org\/10.1145\/3372297.3417872","DOI":"10.1145\/3372297.3417872"},{"key":"11466_CR67","doi-asserted-by":"crossref","unstructured":"Kilian J (1988) Founding crytpography on oblivious transfer. In: Proceedings of the twentieth annual ACM symposium on theory of computing, pp 20\u201331","DOI":"10.1145\/62212.62215"},{"issue":"4","key":"11466_CR68","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1080\/00207543.2023.2281663","volume":"62","author":"EE Kosasih","year":"2024","unstructured":"Kosasih EE, Papadakis E, Baryannis G et al (2024) A review of explainable artificial intelligence in supply chain management using neurosymbolic approaches. Int J Prod Res 62(4):1510\u20131540","journal-title":"Int J Prod Res"},{"key":"11466_CR69","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25"},{"issue":"11","key":"11466_CR70","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"2002","unstructured":"LeCun Y, Bottou L, Bengio Y et al (2002) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"issue":"13","key":"11466_CR71","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1056\/NEJMsr2214184","volume":"388","author":"P Lee","year":"2023","unstructured":"Lee P, Bubeck S, Petro J (2023) Benefits, limits, and risks of gpt-4 as an ai chatbot for medicine. N Engl J Med 388(13):1233\u20131239","journal-title":"N Engl J Med"},{"key":"11466_CR72","doi-asserted-by":"crossref","unstructured":"Lester B, Al-Rfou R, Constant N (2021) The power of scale for parameter-efficient prompt tuning. arXiv preprint arXiv:2104.08691","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"11466_CR73","doi-asserted-by":"publisher","unstructured":"Li XL, Liang P (2021) Prefix-tuning: Optimizing continuous prompts for generation. In: Proceedings of the 59th annual meeting of the association for computational linguistics and the 11th international joint conference on natural language processing (Volume 1: Long Papers). Association for Computational Linguistics, Online, pp 4582\u2013459https:\/\/doi.org\/10.18653\/v1\/2021.acl-long.353, https:\/\/aclanthology.org\/2021.acl-long.353","DOI":"10.18653\/v1\/2021.acl-long.353"},{"key":"11466_CR79","unstructured":"Li D, Shao R, Wang H, et\u00a0al (2023a) MPCFormer: Fast, performant and private transformer inference with MPC. In: Proceedings of the eleventh international conference on learning representations, ICLR"},{"key":"11466_CR77","unstructured":"Li H, Chen Y, Luo J, et\u00a0al (2023b) Privacy in large language models: attacks, defenses and future directions. arXiv preprint arXiv:2310.10383"},{"key":"11466_CR78","doi-asserted-by":"publisher","unstructured":"Li H, Guo D, Fan W, et\u00a0al (2023c) Multi-step jailbreaking privacy attacks on ChatGPT. In: Bouamor H, Pino J, Bali K (eds) Findings of the association for computational linguistics: EMNLP 2023. Association for Computational Linguistics, Singapore, pp 4138\u2013415. https:\/\/doi.org\/10.18653\/v1\/2023.findings-emnlp.272, https:\/\/aclanthology.org\/2023.findings-emnlp.272","DOI":"10.18653\/v1\/2023.findings-emnlp.272"},{"key":"11466_CR84","doi-asserted-by":"crossref","unstructured":"Li Y, Yu W, Zhao J (2024a) Privtuner with homomorphic encryption and lora: a p3eft scheme for privacy-preserving parameter-efficient fine-tuning of ai foundation models. arXiv preprint arXiv:2410.00433","DOI":"10.1109\/TWC.2025.3585291"},{"key":"11466_CR74","first-page":"21572","volume":"37","author":"Z Li","year":"2024","unstructured":"Li Z, Yang K, Tan J et al (2024b) Nimbus: Secure and efficient two-party inference for transformers. Adv Neural Inf Process Syst 37:21572\u201321600","journal-title":"Adv Neural Inf Process Syst"},{"key":"11466_CR85","unstructured":"Li Y, Zhou X, Wang Y, et\u00a0al (2025) Private transformer inference in mlaas: a survey. arXiv preprint arXiv:2505.10315"},{"key":"11466_CR75","doi-asserted-by":"crossref","unstructured":"Liang J, Pang R, Li C, et\u00a0al (2024a) Model extraction attacks revisited. In: Proceedings of the 19th ACM Asia conference on computer and communications security, pp 1231\u20131245","DOI":"10.1145\/3634737.3657002"},{"key":"11466_CR76","doi-asserted-by":"crossref","unstructured":"Liang Z, Wang P, Zhang R, et\u00a0al (2024b) Merge: Fast private text generation. In: AAAI","DOI":"10.1609\/aaai.v38i18.29964"},{"key":"11466_CR82","unstructured":"Liu X, Liu Z (2023) Llms can understand encrypted prompt: towards privacy-computing friendly transformers. arXiv preprint arXiv:2305.18396"},{"key":"11466_CR80","unstructured":"Liu SY, Wang CY, Yin H, et\u00a0al (2024a) Dora: Weight-decomposed low-rank adaptation. In: Forty-first international conference on machine learning"},{"issue":"1","key":"11466_CR81","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-024-11024-6","volume":"58","author":"Y Liu","year":"2024","unstructured":"Liu Y, Huang J, Li Y et al (2024b) Generative ai model privacy: a survey. Artif Intell Rev 58(1):33","journal-title":"Artif Intell Rev"},{"key":"11466_CR83","unstructured":"Liu Y, Ott M, Goyal N, et\u00a0al (2019) Roberta: a robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692"},{"key":"11466_CR86","doi-asserted-by":"crossref","unstructured":"Lu Wj, Huang Z, Gu Z, et\u00a0al (2025) Bumblebee: Secure two-party inference framework for large transformers. In: Network and distributed system security symposium, NDSS","DOI":"10.14722\/ndss.2025.230057"},{"key":"11466_CR88","doi-asserted-by":"crossref","unstructured":"Luo J, Zhang Y, Zhang Z et al (2024) Secformer: fast and accurate privacy-preserving inference for transformer models via smpc. Findings of the Association for Computational Linguistics ACL 2024:13333\u201313348","DOI":"10.18653\/v1\/2024.findings-acl.790"},{"key":"11466_CR87","doi-asserted-by":"crossref","unstructured":"Luo J, Chen G, Zhang Y, et\u00a0al (2025a) Centaur: bridging the impossible trinity of privacy, efficiency, and performance in privacy-preserving transformer inference. In: Proceedings of the 63st annual meeting of the association for computational linguistics (Volume 1: Long Papers)","DOI":"10.18653\/v1\/2025.acl-long.1109"},{"key":"11466_CR89","unstructured":"Luo J, Zhang Z, Zhang Y, et\u00a0al (2025b) Secfwt: Efficient privacy-preserving fine-tuning of large language models using forward-only passes. arXiv preprint arXiv:2506.15307"},{"key":"11466_CR90","doi-asserted-by":"crossref","unstructured":"Ma F, Zhang C, Ren L, et\u00a0al (2022) Xprompt: Exploring the extreme of prompt tuning. arXiv preprint arXiv:2210.04457","DOI":"10.18653\/v1\/2022.emnlp-main.758"},{"key":"11466_CR91","unstructured":"McMahan B, Moore E, Ramage D, et\u00a0al (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR, pp 1273\u20131282"},{"key":"11466_CR92","unstructured":"Meta (2019) Facebook. https:\/\/github.com\/facebookresearch\/CrypTen"},{"key":"11466_CR93","unstructured":"Mia MJ, Amini MH (2025) Fedshield-llm: A secure and scalable federated fine-tuned large language model. arXiv preprint arXiv:2506.05640"},{"key":"11466_CR94","unstructured":"Microsoft (2023) SEAL. https:\/\/github.com\/microsoft\/SEAL"},{"key":"11466_CR95","doi-asserted-by":"crossref","unstructured":"Moon J, Yoo D, Jiang X, et\u00a0al (2024) Thor: Secure transformer inference with homomorphic encryption. Cryptology ePrint Archive","DOI":"10.1145\/3719027.3765150"},{"key":"11466_CR96","unstructured":"mpc msri (2019) EzPC. https:\/\/github.com\/mpc-msri\/EzPC"},{"key":"11466_CR97","unstructured":"Nasr M, Carlini N, Hayase J, et\u00a0al (2023) Scalable extraction of training data from (production) language models. arXiv preprint arXiv:2311.17035"},{"key":"11466_CR98","unstructured":"Ouyang X, Lin FX, Ji Y (2025) Selectformer in data markets: privacy-preserving and efficient data selection for transformers with multi-party computation. In: The thirteenth international conference on learning representations, ICLR"},{"key":"11466_CR99","doi-asserted-by":"crossref","unstructured":"Pang Q, Zhu J, M\u00f6llering H, et\u00a0al (2024) Bolt: Privacy-preserving, accurate and efficient inference for transformers. In: 2024 IEEE symposium on security and privacy (SP), IEEE, pp 4753\u20134771","DOI":"10.1109\/SP54263.2024.00130"},{"key":"11466_CR101","doi-asserted-by":"crossref","unstructured":"Panzade P, Takabi D, Cai Z (2024) Medblindtuner: Towards privacy-preserving fine-tuning on biomedical images with transformers and fully homomorphic encryption. In: AI for health equity and fairness: leveraging ai to address social determinants of health. Springer, pp 197\u2013208","DOI":"10.1007\/978-3-031-63592-2_15"},{"key":"11466_CR100","doi-asserted-by":"crossref","unstructured":"Panzade P, Asl JR, Takabi D, et\u00a0al (2025) Blindtuner: On enhancement of privacy-preserving fine-tuning of transformers based on homomorphic encryption. IEEE Internet Things J","DOI":"10.1109\/JIOT.2025.3552321"},{"issue":"3","key":"11466_CR102","first-page":"499","volume":"11","author":"D Parikh","year":"2024","unstructured":"Parikh D, Radadia S, Eranna RK (2024) Privacy-preserving machine learning techniques, challenges and research directions. Int Res J Eng Technol 11(3):499","journal-title":"Int Res J Eng Technol"},{"key":"11466_CR103","unstructured":"Park D, Lee E, Lee JW (2025) Powerformer: Efficient privacy-preserving transformer with batch rectifier-power max function and optimized homomorphic attention. In: Proceedings of the 63st annual meeting of the association for computational linguistics (Volume 1: Long Papers)"},{"key":"11466_CR105","unstructured":"Peng H, Pappas N, Yogatama D, et\u00a0al (2021) Random feature attention. In: 9th International conference on learning representations, ICLR 2021"},{"key":"11466_CR104","unstructured":"Peng S, Kalliamvakou E, Cihon P, et\u00a0al (2023) The impact of ai on developer productivity: evidence from github copilot. arXiv preprint arXiv:2302.06590"},{"key":"11466_CR106","doi-asserted-by":"crossref","unstructured":"Pulido-Gaytan LB, Tchernykh A, Cort\u00e9s-Mendoza JM, et\u00a0al (2020) A survey on privacy-preserving machine learning with fully homomorphic encryption. In: Latin American high performance computing conference, Springer, pp 115\u2013129","DOI":"10.1007\/978-3-030-68035-0_9"},{"issue":"5","key":"11466_CR107","doi-asserted-by":"publisher","first-page":"1919","DOI":"10.1109\/TKDE.2023.3321803","volume":"36","author":"H Qin","year":"2023","unstructured":"Qin H, He D, Feng Q et al (2023) Cryptographic primitives in privacy-preserving machine learning: a survey. IEEE Trans Knowl Data Eng 36(5):1919\u20131934","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"11466_CR108","unstructured":"Rabin MO (2005) How to exchange secrets with oblivious transfer. Cryptology ePrint Archive"},{"issue":"8","key":"11466_CR109","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford A, Wu J, Child R et al (2019) Language models are unsupervised multitask learners. OpenAI blog 1(8):9","journal-title":"OpenAI blog"},{"key":"11466_CR111","doi-asserted-by":"crossref","unstructured":"Rathee D, Rathee M, Goli RKK, et\u00a0al (2021) SIRNN: A math library for secure RNN inference. In: Proceedings of 2021 IEEE symposium on security and privacy, pp 1003\u20131020","DOI":"10.1109\/SP40001.2021.00086"},{"key":"11466_CR110","unstructured":"Rathee D, Li D, Stoica I, et\u00a0al (2024) Mpc-minimized secure llm inference. arXiv preprint arXiv:2408.03561"},{"key":"11466_CR112","doi-asserted-by":"crossref","unstructured":"Reddy CK, Shojaee P (2025) Towards scientific discovery with generative ai: Progress, opportunities, and challenges. In: Proceedings of the AAAI conference on artificial intelligence, pp 28601\u201328609","DOI":"10.1609\/aaai.v39i27.35084"},{"key":"11466_CR113","unstructured":"Rho D, Kim T, Park M, et\u00a0al (2025) Encryption-friendly llm architecture. In: The thirteenth international conference on learning representations, ICLR"},{"key":"11466_CR114","doi-asserted-by":"crossref","unstructured":"Sabt M, Achemlal M, Bouabdallah A (2015) Trusted execution environment: what it is, and what it is not. In: 2015 IEEE Trustcom\/BigDataSE\/Ispa, IEEE, pp 57\u201364","DOI":"10.1109\/Trustcom.2015.357"},{"key":"11466_CR115","unstructured":"Secretflow (2022) Secretflow. https:\/\/github.com\/secretflow\/secretflow"},{"issue":"11","key":"11466_CR116","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"8","key":"11466_CR117","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10462-025-11170-5","volume":"58","author":"D Shenoy","year":"2025","unstructured":"Shenoy D, Bhat R, Krishna Prakasha K (2025) Exploring privacy mechanisms and metrics in federated learning. Artif Intell Rev 58(8):223","journal-title":"Artif Intell Rev"},{"key":"11466_CR118","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, et\u00a0al (2017a) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP), IEEE, pp 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"11466_CR119","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, et\u00a0al (2017b) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP), IEEE, pp 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"11466_CR120","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"11466_CR121","unstructured":"Snwagh (2020) Falcon. https:\/\/github.com\/snwagh\/falcon-public"},{"key":"11466_CR122","doi-asserted-by":"crossref","unstructured":"Song C, Raghunathan A (2020) Information leakage in embedding models. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pp 377\u2013390","DOI":"10.1145\/3372297.3417270"},{"key":"11466_CR123","doi-asserted-by":"crossref","unstructured":"Stadler M (1996) Publicly verifiable secret sharing. In: International conference on the theory and applications of cryptographic techniques, Springer, pp 190\u2013199","DOI":"10.1007\/3-540-68339-9_17"},{"key":"11466_CR124","doi-asserted-by":"crossref","unstructured":"Sun T, He Z, Qian H, et\u00a0al (2022a) BBTv2: Towards a gradient-free future with large language models. In: Proceedings of the 2022 conference on empirical methods in natural language processing, pp 3916\u20133930","DOI":"10.18653\/v1\/2022.emnlp-main.259"},{"key":"11466_CR125","unstructured":"Sun T, Shao Y, Qian H, et\u00a0al (2022b) Black-box tuning for language-model-as-a-service. In: International conference on machine learning, PMLR, pp 20841\u201320855"},{"key":"11466_CR126","unstructured":"Sutskever I, Vinyals O, Le QV (2014) Sequence to sequence learning with neural networks. Advances in neural information processing systems 27"},{"key":"11466_CR127","doi-asserted-by":"crossref","unstructured":"Truong JB, Maini P, Walls RJ, et\u00a0al (2021) Data-free model extraction. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4771\u20134780","DOI":"10.1109\/CVPR46437.2021.00474"},{"key":"11466_CR128","unstructured":"Vaswani A, Shazeer N, Parmar N, et\u00a0al (2017) Attention is all you need. In: Advances in neural information processing systems"},{"issue":"11","key":"11466_CR129","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s10462-024-10921-0","volume":"57","author":"D Wang","year":"2024","unstructured":"Wang D, Zhang S (2024) Large language models in medical and healthcare fields: applications, advances, and challenges. Artif Intell Rev 57(11):299","journal-title":"Artif Intell Rev"},{"key":"11466_CR131","doi-asserted-by":"crossref","unstructured":"Wang Y, Suh GE, Xiong W, et\u00a0al (2022) Characterization of MPC-based private inference for transformer-based models. In: Proceedings of 2022 IEEE international symposium on performance analysis of systems and software, pp 187\u2013197","DOI":"10.1109\/ISPASS55109.2022.00025"},{"key":"11466_CR132","unstructured":"Wu H, Fang W, Zheng Y, et\u00a0al (2024) Ditto: Quantization-aware secure inference of transformers upon mpc. In: International conference on machine learning, PMLR, pp 53346\u201353365"},{"key":"11466_CR130","doi-asserted-by":"crossref","unstructured":"Wang H, Guo W, Zhang L et al (2025) Generative large recommendation models: emerging trends in llms for recommendation. Companion proceedings of the ACM on web conference 2025:49\u201352","DOI":"10.1145\/3701716.3715865"},{"key":"11466_CR133","unstructured":"XidianNSS (2024) NssMPClib. https:\/\/github.com\/XidianNSS\/NssMPClib"},{"key":"11466_CR134","unstructured":"Xu X, Zhang Q, Ning R, et\u00a0al (2024) Comet: A communication-efficient and performant approximation for private transformer inference. arXiv preprint arXiv:2405.17485"},{"key":"11466_CR135","unstructured":"Yang AX, Robeyns M, Wang X, et\u00a0al (2023a) Bayesian low-rank adaptation for large language models. arXiv preprint arXiv:2308.13111"},{"key":"11466_CR137","unstructured":"Yang F, Chen Z, Jiang Z, et\u00a0al (2023b) Palr: Personalization aware llms for recommendation. arXiv preprint arXiv:2305.07622"},{"issue":"6","key":"11466_CR136","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1109\/MNET.2024.3367788","volume":"38","author":"H Yang","year":"2024","unstructured":"Yang H, Xiang K, Ge M et al (2024) A comprehensive overview of backdoor attacks in large language models within communication networks. IEEE Netw 38(6):211\u2013218","journal-title":"IEEE Netw"},{"key":"11466_CR138","unstructured":"Yang Y, Li C, Li Q, et\u00a0al (2025) $$\\{$$PRSA$$\\}$$: Prompt stealing attacks against $$\\{$$Real-World$$\\}$$ prompt services. In: 34th USENIX security symposium (USENIX Security 25), pp 2283\u20132302"},{"key":"11466_CR139","doi-asserted-by":"crossref","unstructured":"Yan B, Li K, Xu M, et\u00a0al (2024) On protecting the data privacy of large language models (llms): a survey. arXiv preprint arXiv:2403.05156","DOI":"10.1109\/ICMC60390.2024.00008"},{"key":"11466_CR140","doi-asserted-by":"crossref","unstructured":"Yan G, Zhang Y, Guo Z, et\u00a0al (2025) Comet: Accelerating private inference for large language model by predicting activation sparsity. In: 2025 IEEE symposium on security and privacy (SP), IEEE Computer Society, pp 2604\u20132622","DOI":"10.1109\/SP61157.2025.00182"},{"key":"11466_CR141","doi-asserted-by":"crossref","unstructured":"Yao ACC (1986) How to generate and exchange secrets. In: Annual symposium on foundations of computer science, pp 162\u2013167","DOI":"10.1109\/SFCS.1986.25"},{"key":"11466_CR142","doi-asserted-by":"crossref","unstructured":"You Z, Dong X, Cheng K, et\u00a0al (2025) Prifft: Privacy-preserving federated fine-tuning of large language models via hybrid secret sharing. arXiv preprint arXiv:2503.03146","DOI":"10.1109\/TDSC.2026.3661572"},{"issue":"3","key":"11466_CR143","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s10462-024-11076-8","volume":"58","author":"J Yuan","year":"2025","unstructured":"Yuan J, Liu W, Shi J et al (2025) Approximate homomorphic encryption based privacy-preserving machine learning: a survey. Artif Intell Rev 58(3):82","journal-title":"Artif Intell Rev"},{"key":"11466_CR144","doi-asserted-by":"crossref","unstructured":"Zamfirescu-Pereira JD, Wong RY, Hartmann B, et\u00a0al (2023) Why johnny can\u2019t prompt: how non-ai experts try (and fail) to design llm prompts. In: Proceedings of the 2023 CHI conference on human factors in computing systems, pp 1\u201321","DOI":"10.1145\/3544548.3581388"},{"key":"11466_CR146","doi-asserted-by":"crossref","unstructured":"Zeng W, Li M, Xiong W, et\u00a0al (2023) Mpcvit: Searching for accurate and efficient mpc-friendly vision transformer with heterogeneous attention. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 5052\u20135063","DOI":"10.1109\/ICCV51070.2023.00466"},{"key":"11466_CR145","unstructured":"Zeng W, Dong Y, Zhou J, et\u00a0al (2025) Mpcache: Mpc-friendly kv cache eviction for efficient private large language model inference. arXiv preprint arXiv:2501.06807"},{"issue":"13","key":"11466_CR147","doi-asserted-by":"publisher","first-page":"10412","DOI":"10.1109\/JIOT.2021.3058638","volume":"8","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Xin C, Wu H (2021) Privacy-preserving deep learning based on multiparty secure computation: a survey. IEEE Internet Things J 8(13):10412\u201310429","journal-title":"IEEE Internet Things J"},{"key":"11466_CR149","unstructured":"Zhang Q, Chen M, Bukharin A, et\u00a0al (2023a) Adalora: adaptive budget allocation for parameter-efficient fine-tuning. arXiv preprint arXiv:2303.10512"},{"key":"11466_CR150","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen D, Kundu S, et\u00a0al (2023b) SAL-ViT: Towards latency efficient private inference on ViT using selective attention search with a learnable softmax approximation. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 5116\u20135125","DOI":"10.1109\/ICCV51070.2023.00472"},{"key":"11466_CR152","doi-asserted-by":"crossref","unstructured":"Zhang Z, Yang Y, Dai Y, et\u00a0al (2023c) Fedpetuning: When federated learning meets the parameter-efficient tuning methods of pre-trained language models. In: Annual meeting of the association of computational linguistics 2023, Association for Computational Linguistics (ACL), pp 9963\u20139977","DOI":"10.18653\/v1\/2023.findings-acl.632"},{"issue":"6","key":"11466_CR148","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3678181","volume":"15","author":"Y Zhang","year":"2024","unstructured":"Zhang Y, Zeng D, Luo J et al (2024) A survey of trustworthy federated learning: issues, solutions, and challenges. ACM Trans Intell Syst Technol 15(6):1\u201347","journal-title":"ACM Trans Intell Syst Technol"},{"key":"11466_CR153","doi-asserted-by":"crossref","unstructured":"Zhang J, Yang X, He L, et\u00a0al (2025a) Secure transformer inference made non-interactive. In: Network and distributed system security symposium, NDSS","DOI":"10.14722\/ndss.2025.230868"},{"key":"11466_CR151","unstructured":"Zhang Y, Xue J, Zheng M, et\u00a0al (2025b) Cipherprune: Efficient and scalable private transformer inference. arXiv preprint arXiv:2502.16782"},{"key":"11466_CR156","doi-asserted-by":"crossref","unstructured":"Zheng M, Lou Q, Jiang L (2023) Primer: Fast private transformer inference on encrypted data. In: 2023 60th ACM\/IEEE design automation conference (DAC), IEEE, pp 1\u20136","DOI":"10.1109\/DAC56929.2023.10247719"},{"key":"11466_CR154","unstructured":"Zheng F, Chen C, Han Z, et\u00a0al (2024) Permllm: Private inference of large language models within 3 seconds under wan. arXiv preprint arXiv:2405.18744"},{"key":"11466_CR155","doi-asserted-by":"crossref","unstructured":"Zheng Y, Koh HY, Ju J, et\u00a0al (2025) Large language models for scientific discovery in molecular property prediction. Nat Mach Intell pp 1\u201311","DOI":"10.1038\/s42256-025-00994-z"},{"key":"11466_CR157","doi-asserted-by":"crossref","unstructured":"Zhu W, Tan M (2023) Spt: Learning to selectively insert prompts for better prompt tuning. In: Proceedings of the 2023 conference on empirical methods in natural language processing, pp 11862\u201311878","DOI":"10.18653\/v1\/2023.emnlp-main.727"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-025-11466-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-025-11466-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-025-11466-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:46:38Z","timestamp":1771479998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-025-11466-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,26]]},"references-count":157,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["11466"],"URL":"https:\/\/doi.org\/10.1007\/s10462-025-11466-6","relation":{},"ISSN":["1573-7462"],"issn-type":[{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,26]]},"assertion":[{"value":"13 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"64"}}