{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T03:14:36Z","timestamp":1775790876403,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T00:00:00Z","timestamp":1741910400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T00:00:00Z","timestamp":1741910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62062009"],"award-info":[{"award-number":["62062009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"DOI":"10.1007\/s11063-025-11738-w","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T12:40:20Z","timestamp":1741956020000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Preserving Text Classification on Deep Neural Network"],"prefix":"10.1007","volume":"57","author":[{"given":"Kunhong","family":"Li","sequence":"first","affiliation":[]},{"given":"Ruwei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"issue":"11","key":"11738_CR1","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Adleman L, Dertouzos ML et al (1978) On data banks and privacy homomorphisms. Found Secure Comput 4(11):169\u2013180","journal-title":"Found Secure Comput"},{"key":"11738_CR2","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on theory of computing, pp. 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"11738_CR3","doi-asserted-by":"crossref","unstructured":"Cheon JH, Kim A, Kim M, Song Y (2017) Homomorphic encryption for arithmetic of approximate numbers. In: International conference on the theory and application of cryptology and information security, pp 409\u2013437. Springer","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"11738_CR4","doi-asserted-by":"crossref","unstructured":"Cheon JH, Han K, Kim A, Kim M, Song Y (2018) A full RNS variant of approximate homomorphic encryption. In: International conference on selected areas in cryptography, pp 347\u2013368. Springer","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"11738_CR5","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: International conference on machine learning, pp 201\u2013210. PMLR"},{"key":"11738_CR6","doi-asserted-by":"crossref","unstructured":"Hesamifard E, Takabi H, Ghasemi M (2019) Deep neural networks classification over encrypted data. In: Proceedings of the 9th ACM conference on data and application security and privacy, pp 97\u2013108","DOI":"10.1145\/3292006.3300044"},{"key":"11738_CR7","unstructured":"Brutzkus A, Gilad-Bachrach R, Elisha O (2019) Low latency privacy preserving inference. In: International conference on machine learning, pp 812\u2013821. PMLR"},{"key":"11738_CR8","unstructured":"Chabanne H, De\u00a0Wargny A, Milgram J, Morel C, Prouff E (2017) Privacy-preserving classification on deep neural network. Cryptology ePrint Archive"},{"key":"11738_CR9","unstructured":"Chao J, Badawi AA, Unnikrishnan B, Lin J, Mun CF, Brown JM, Campbell JP, Chiang M, Kalpathy-Cramer J, Chandrasekhar VR et al (2019) Carenets: compact and resource-efficient cnn for homomorphic inference on encrypted medical images. arXiv preprint arXiv:1901.10074"},{"key":"11738_CR10","doi-asserted-by":"crossref","unstructured":"Mohassel P, Zhang Y (2017) Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE symposium on security and privacy (SP), pp 19\u201338. IEEE","DOI":"10.1109\/SP.2017.12"},{"key":"11738_CR11","unstructured":"Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) $$\\{$$GAZELLE$$\\}$$: a low latency framework for secure neural network inference. In: 27th USENIX security symposium (USENIX Security 18), pp 1651\u20131669"},{"key":"11738_CR12","unstructured":"Li M, Chow SS, Hu S, Yan Y, Chao S, Wang Q (2020) Optimizing privacy-preserving outsourced convolutional neural network predictions. IEEE Transactions on dependable and secure computing"},{"key":"11738_CR13","unstructured":"Podschwadt R, Takabi D (2020) Classification of encrypted word embeddings using recurrent neural networks. In: PrivateNLP@ WSDM, pp 27\u201331"},{"key":"11738_CR14","doi-asserted-by":"crossref","unstructured":"Podschwadt R, Takabi D (2021) Non-interactive privacy preserving recurrent neural network prediction with homomorphic encryption. In: 2021 IEEE 14th international conference on cloud computing (CLOUD), pp 65\u201370. IEEE","DOI":"10.1109\/CLOUD53861.2021.00019"},{"key":"11738_CR15","doi-asserted-by":"crossref","unstructured":"Bakshi M, Last M (2020) Cryptornn-privacy-preserving recurrent neural networks using homomorphic encryption. In: International symposium on cyber security cryptography and machine learning, pp 245\u2013253. Springer","DOI":"10.1007\/978-3-030-49785-9_16"},{"key":"11738_CR16","doi-asserted-by":"crossref","unstructured":"Gaid ML, Fakhr MW, Selim GI (2018) Secure translation using fully homomorphic encryption and sequence-to-sequence neural networks. In: 2018 28th international conference on computer theory and applications (ICCTA), pp 30\u201334. IEEE","DOI":"10.1109\/ICCTA45985.2018.9499157"},{"issue":"1","key":"11738_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti I, Gama N, Georgieva M, Izabach\u00e8ne M (2020) TFHE: fast fully homomorphic encryption over the torus. J Cryptol 33(1):34\u201391","journal-title":"J Cryptol"},{"key":"11738_CR18","unstructured":"Lou Q, Jiang L (2019) She: a fast and accurate deep neural network for encrypted data. In: Advances in neural information processing systems 32"},{"key":"11738_CR19","doi-asserted-by":"crossref","unstructured":"Feng B, Lou Q, Jiang L, Fox GC (2020) Cryptogru: low latency privacy-preserving text analysis with gru. arXiv preprint arXiv:2010.11796","DOI":"10.18653\/v1\/2021.emnlp-main.156"},{"key":"11738_CR20","doi-asserted-by":"publisher","first-page":"226544","DOI":"10.1109\/ACCESS.2020.3045465","volume":"8","author":"A Al Badawi","year":"2020","unstructured":"Al Badawi A, Hoang L, Mun CF, Laine K, Aung KMM (2020) Privft: private and fast text classification with homomorphic encryption. IEEE Access 8:226544\u2013226556","journal-title":"IEEE Access"},{"key":"11738_CR21","unstructured":"Comi D (2021) Herbert: a privacy-preserving natural language processing solution for text classification"},{"key":"11738_CR22","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"key":"11738_CR23","doi-asserted-by":"crossref","unstructured":"Lee G, Kim M, Park JH, Hwang S-W, Cheon JH (2022) Privacy-preserving text classification on bert embeddings with homomorphic encryption. arXiv preprint arXiv:2210.02574","DOI":"10.18653\/v1\/2022.naacl-main.231"},{"key":"11738_CR24","unstructured":"Walch R, Sousa S, Helminger L, Lindstaedt S, Rechberger C, Tr\u00fcgler A (2022) Cryptotl: private, efficient and secure transfer learning. arXiv preprint arXiv:2205.11935"},{"key":"11738_CR25","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser \u0141, Polosukhin I (2017) Attention is all you need. Advances in neural information processing systems, 30"},{"key":"11738_CR26","unstructured":"Sanh V, Debut L, Chaumond J, Wolf T (2019) Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter. arXiv preprint arXiv:1910.01108"},{"key":"11738_CR27","unstructured":"Yang Z, Dai Z, Yang Y, Carbonell J, Salakhutdinov RR, Le QV (2019) Xlnet: generalized autoregressive pretraining for language understanding. Advances in neural information processing systems, 32"},{"key":"11738_CR28","doi-asserted-by":"crossref","unstructured":"Dai Z, Yang Z, Yang Y, Carbonell J, Le QV, Salakhutdinov R (2019) Transformer-xl: attentive language models beyond a fixed-length context. arXiv preprint arXiv:1901.02860","DOI":"10.18653\/v1\/P19-1285"},{"key":"11738_CR29","doi-asserted-by":"crossref","unstructured":"Riazi MS, Weinert C, Tkachenko O, Songhori EM, Schneider T, Koushanfar F (2018) Chameleon: a hybrid secure computation framework for machine learning applications. In: Proceedings of the 2018 on Asia conference on computer and communications security, pp 707\u2013721","DOI":"10.1145\/3196494.3196522"},{"key":"11738_CR30","doi-asserted-by":"crossref","unstructured":"Wagh S, Tople S, Benhamouda F, Kushilevitz E, Mittal P, Rabin T (2020) Falcon: honest-majority maliciously secure framework for private deep learning. arXiv preprint arXiv:2004.02229","DOI":"10.2478\/popets-2021-0011"},{"issue":"3","key":"11738_CR31","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht MR, Player R, Scott S (2015) On the concrete hardness of learning with errors. J Math Cryptol 9(3):169\u2013203","journal-title":"J Math Cryptol"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11738-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-025-11738-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-025-11738-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T16:58:34Z","timestamp":1745427514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-025-11738-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,14]]},"references-count":31,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["11738"],"URL":"https:\/\/doi.org\/10.1007\/s11063-025-11738-w","relation":{},"ISSN":["1573-773X"],"issn-type":[{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,14]]},"assertion":[{"value":"25 May 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"29"}}