{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:46:31Z","timestamp":1768527991474,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:00:00Z","timestamp":1745971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Presidential Foundation of CAEP","award":["No. YZJJZQ2023026"],"award-info":[{"award-number":["No. YZJJZQ2023026"]}]},{"name":"Presidential Foundation of CAEP","award":["No. YZJJZQ2023026"],"award-info":[{"award-number":["No. YZJJZQ2023026"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01978-x","type":"journal-article","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T01:52:20Z","timestamp":1745977940000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-enhanced deep learning inference acceleration towards third-party cloud based on trusted execution environment"],"prefix":"10.1007","volume":"18","author":[{"given":"Yulong","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yubing","family":"Duan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhi","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mingyong","family":"Yin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guoxin","family":"Zhong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"1978_CR1","doi-asserted-by":"crossref","unstructured":"Abusaimeh H (2020) Virtual machine escape in cloud computing services. Int J Advan Comput Sci Appl 11(7)","DOI":"10.14569\/IJACSA.2020.0110743"},{"key":"1978_CR2","unstructured":"Arnautov S, Trach B, Gregor F, et\u00a0al (2016) $$\\{$$SCONE$$\\}$$: secure linux containers with intel $$\\{$$SGX$$\\}$$. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp 689\u2013703"},{"key":"1978_CR3","unstructured":"Babar MF, Hasan M (2024) Deeptrust$$\\hat{\\phantom{0}}$$\u00a0rt: confidential deep neural inference meets real-time! In: 36th Euromicro Conference on Real-Time Systems (ECRTS 2024), Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik, pp 13\u20131"},{"issue":"7","key":"1978_CR4","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/3448250","volume":"64","author":"Y Bengio","year":"2021","unstructured":"Bengio Y, Lecun Y, Hinton G (2021) Deep learning for ai. Commun ACM 64(7):58\u201365","journal-title":"Commun ACM"},{"issue":"5","key":"1978_CR5","doi-asserted-by":"publisher","first-page":"4510","DOI":"10.1109\/TDSC.2024.3353827","volume":"21","author":"D Chen","year":"2024","unstructured":"Chen D, Liao Z, Chen R et al (2024) Privacy-preserving anomaly detection of encrypted smart contract for blockchain-based data trading. IEEE Trans Dependable Secure Comput 21(5):4510\u20134525","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1978_CR6","doi-asserted-by":"crossref","unstructured":"Chen D, Liao Z, Xie Z, et\u00a0al (2024b) Mfsse: multi-keyword fuzzy ranked symmetric searchable encryption with pattern hidden in mobile cloud computing. IEEE Trans Cloud Comput","DOI":"10.1109\/TCC.2024.3430237"},{"key":"1978_CR7","unstructured":"Costan V, Devadas S (2016) Intel sgx explained. Cryptology ePrint Archive"},{"issue":"1","key":"1978_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3322205.3311076","volume":"3","author":"T Dinh Ngoc","year":"2019","unstructured":"Dinh Ngoc T, Bui B, Bitchebe S et al (2019) Everything you should know about intel sgx performance on virtualized systems. Proc ACM Measure Anal Comput Syst 3(1):1\u201321","journal-title":"Proc ACM Measure Anal Comput Syst"},{"issue":"5","key":"1978_CR9","doi-asserted-by":"publisher","first-page":"3476","DOI":"10.1007\/s12083-024-01752-5","volume":"17","author":"Y Fang","year":"2024","unstructured":"Fang Y, Yang X, Zhu H et al (2024) Enhancing paillier to fully homomorphic encryption with semi-honest tee. Peer-to-Peer Netw Appl 17(5):3476\u20133488","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1978_CR10","unstructured":"Google (2022) Cloud automl. https:\/\/cloud.google.com\/automl. Accessed 22 Oct 2022"},{"issue":"6","key":"1978_CR11","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1007\/s11263-021-01453-z","volume":"129","author":"J Gou","year":"2021","unstructured":"Gou J, Yu B, Maybank SJ et al (2021) Knowledge distillation: A survey. Int J Comput Vision 129(6):1789\u20131819","journal-title":"Int J Comput Vision"},{"key":"1978_CR12","unstructured":"Gu Z, Huang H, Zhang J, et\u00a0al (2018) Securing input data of deep learning inference systems via partitioned enclave execution. arXiv:1807.00969"},{"issue":"12","key":"1978_CR13","doi-asserted-by":"publisher","first-page":"9706","DOI":"10.1109\/JIOT.2020.3022358","volume":"8","author":"Z He","year":"2020","unstructured":"He Z, Zhang T, Lee RB (2020) Attacking and protecting data privacy in edge-cloud collaborative inference systems. IEEE Internet Things J 8(12):9706\u20139716","journal-title":"IEEE Internet Things J"},{"key":"1978_CR14","unstructured":"Hinton G, Vinyals O, Dean J (2015) Distilling the knowledge in a neural network. arXiv:1503.02531"},{"issue":"4","key":"1978_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3231594","volume":"35","author":"T Hunt","year":"2018","unstructured":"Hunt T, Zhu Z, Xu Y et al (2018) Ryoan: a distributed sandbox for untrusted computation on secret data. ACM Transactions on Computer Systems (TOCS) 35(4):1\u201332","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"1978_CR16","doi-asserted-by":"crossref","unstructured":"Kim K, Kim CH, Rhee JJ, et\u00a0al (2020) Vessels: efficient and scalable deep learning prediction on trusted processors. In: Proceedings of the 11th ACM symposium on cloud computing, pp 462\u2013476","DOI":"10.1145\/3419111.3421282"},{"key":"1978_CR17","unstructured":"Knauth T, Steiner M, Chakrabarti S, et\u00a0al (2018) Integrating remote attestation with transport layer security. arXiv:1801.05863"},{"key":"1978_CR18","first-page":"4961","volume":"34","author":"B Knott","year":"2021","unstructured":"Knott B, Sea Venkataraman (2021) Crypten: Secure multi-party computation meets machine learning. Adv Neural Inf Process Syst 34:4961\u20134973","journal-title":"Adv Neural Inf Process Syst"},{"key":"1978_CR19","unstructured":"Krizhevsky A (2009) Learning multiple layers of features from tiny images. Master\u2019s thesis, University of Tront"},{"key":"1978_CR20","unstructured":"Lee H, Lee JS (2021) Students are the best teacher: exit-ensemble distillation with multi-exits. arXiv:2104.00299"},{"key":"1978_CR21","doi-asserted-by":"crossref","unstructured":"Lee T, Lin Z, Pushp S, et\u00a0al (2019) Occlumency: privacy-preserving remote deep-learning inference using sgx. In: The 25th Annual international conference on mobile computing and networking, pp 1\u201317","DOI":"10.1145\/3300061.3345447"},{"key":"1978_CR22","doi-asserted-by":"crossref","unstructured":"Li Y, Zeng D, Gu L, et\u00a0al (2021) Lasagna: accelerating secure deep learning inference in sgx-enabled edge cloud. In: Proceedings of the ACM symposium on cloud computing, pp 533\u2013545","DOI":"10.1145\/3472883.3486988"},{"key":"1978_CR23","doi-asserted-by":"crossref","unstructured":"Lin X, Lei L, Wang Y, et\u00a0al (2018) A measurement study on linux container security: attacks and countermeasures. In: Proceedings of the 34th annual computer security applications conference, pp 418\u2013429","DOI":"10.1145\/3274694.3274720"},{"key":"1978_CR24","doi-asserted-by":"crossref","unstructured":"McKeen F, Alexandrovich I, Berenzon A, et\u00a0al (2013) Innovative instructions and software model for isolated execution. Hasp@ isca 10(1)","DOI":"10.1145\/2487726.2488368"},{"key":"1978_CR25","unstructured":"McMahan B, Moore E, Ramage D, et\u00a0al (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR. pp 1273\u20131282"},{"key":"1978_CR26","doi-asserted-by":"crossref","unstructured":"Mohassel P, Zhang Y (2017) Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE symposium on Security and Privacy (SP), IEEE. pp 19\u201338","DOI":"10.1109\/SP.2017.12"},{"key":"1978_CR27","unstructured":"Ohrimenko O, Schuster F, Fournet C, et\u00a0al (2016) Oblivious $$\\{$$Multi-Party$$\\}$$ machine learning on trusted processors. In: 25th USENIX Security Symposium (USENIX Security 16), pp 619\u2013636"},{"key":"1978_CR28","doi-asserted-by":"crossref","unstructured":"Orenbach M, Lifshits P, Minkin M, et\u00a0al (2017) Eleos: exitless os services for sgx enclaves. In: Proceedings of the twelfth european conference on computer systems, pp 238\u2013253","DOI":"10.1145\/3064176.3064219"},{"issue":"2","key":"1978_CR29","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/s12083-024-01893-7","volume":"18","author":"B Rao","year":"2025","unstructured":"Rao B, Zhu G, Ding Q et al (2025) A steganographic backdoor attack scheme on encrypted traffic. Peer-to-Peer Netw Appl 18(2):72","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1978_CR30","doi-asserted-by":"crossref","unstructured":"Sabt M, Achemlal M, Bouabdallah A (2015) Trusted execution environment: what it is, and what it is not. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, IEEE, pp 57\u201364","DOI":"10.1109\/Trustcom.2015.357"},{"issue":"5","key":"1978_CR31","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1007\/s12559-020-09734-4","volume":"12","author":"S Scardapane","year":"2020","unstructured":"Scardapane S, Scarpiniti M, Baccarelli E et al (2020) Why should we add early exits to neural networks? Cogn Comput 12(5):954\u2013966","journal-title":"Cogn Comput"},{"key":"1978_CR32","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, et\u00a0al (2017) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on Security and Privacy (SP), IEEE. pp 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"1978_CR33","doi-asserted-by":"crossref","unstructured":"Taassori M, Shafiee A, Balasubramonian R (2018) Vault: reducing paging overheads in sgx with efficient integrity verification structures. In: Proceedings of the twenty-third international conference on architectural support for programming languages and operating systems, pp 665\u2013678","DOI":"10.1145\/3173162.3177155"},{"key":"1978_CR34","doi-asserted-by":"crossref","unstructured":"Teerapittayanon S, McDanel B, Kung HT (2016) Branchynet: fast inference via early exiting from deep neural networks. In: 2016 23rd International Conference on Pattern Recognition (ICPR), IEEE. pp 2464\u20132469","DOI":"10.1109\/ICPR.2016.7900006"},{"key":"1978_CR35","unstructured":"Tramer F, Boneh D (2018) Slalom: fast, verifiable and private execution of neural networks in trusted hardware. arXiv:1806.03287"},{"key":"1978_CR36","unstructured":"Tsai CC, Porter DE, Vij M (2017) $$\\{$$Graphene-SGX$$\\}$$: a practical library $$\\{$$OS$$\\}$$ for unmodified applications on $$\\{$$SGX$$\\}$$. In: 2017 USENIX Annual Technical Conference (USENIX ATC 17), pp 645\u2013658"},{"key":"1978_CR37","doi-asserted-by":"crossref","unstructured":"Wang Y, Deng K, Meng F, et\u00a0al (2023) Branchy-tee: deep learning security inference acceleration using trusted execution environment. In: SEKE, pp 499\u2013504","DOI":"10.18293\/SEKE2023-131"},{"key":"1978_CR38","doi-asserted-by":"crossref","unstructured":"Xie X, Wang H, Jian Z, et\u00a0al (2024) Memory-efficient and secure dnn inference on trustzone-enabled consumer iot devices. In: IEEE INFOCOM 2024-IEEE conference on computer communications, IEEE. pp 2009\u20132018","DOI":"10.1109\/INFOCOM52122.2024.10621088"},{"key":"1978_CR39","doi-asserted-by":"crossref","unstructured":"Xin J, Tang R, Lee J, et\u00a0al (2020) Deebert: dynamic early exiting for accelerating bert inference. arXiv:2004.12993","DOI":"10.18653\/v1\/2020.acl-main.204"},{"key":"1978_CR40","unstructured":"Zhang Z, Wang N, Zhang Z, et\u00a0al (2024) Groupcover: a secure, efficient and scalable inference framework for on-device model protection based on tees. In: Forty-first international conference on machine learning"},{"key":"1978_CR41","first-page":"1","volume":"15","author":"W Zheng","year":"2021","unstructured":"Zheng W, Wu Y, Wu X et al (2021) A survey of intel sgx and its applications. Front Comp Sci 15:1\u201315","journal-title":"Front Comp Sci"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01978-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01978-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01978-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:33:00Z","timestamp":1746844380000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01978-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,30]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1978"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01978-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,30]]},"assertion":[{"value":"22 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of this article declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The authors of this article declare that this article does not contain any studies with human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"162"}}