{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:05:02Z","timestamp":1769281502487,"version":"3.49.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031383175","type":"print"},{"value":"9783031383182","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-38318-2_36","type":"book-chapter","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T06:02:33Z","timestamp":1690264953000},"page":"365-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Privacy with\u00a0Homomorphic Encryption in\u00a0Neural Networks Training and\u00a0Inference"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6102-6165","authenticated-orcid":false,"given":"Ivone","family":"Amorim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7381-3462","authenticated-orcid":false,"given":"Pedro","family":"Barbosa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,26]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., et\u00a0al.: A state-of-the-art survey on deep learning theory and architectures. Electronics 8(3) (2019)","DOI":"10.3390\/electronics8030292"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme. Cryptology ePrint Archive, Paper 2013\/075 (2013)","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Chen, H., et\u00a0al.: Logistic regression over encrypted data from fully homomorphic encryption. Cryptology ePrint Archive, Paper 2018\/462 (2018)","DOI":"10.1186\/s12920-018-0397-z"},{"key":"36_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Crawford, J.L.H., et\u00a0al.: Doing real work with FHE: the case of logistic regression. In: WAHC Proceedings, pp. 1\u201312. WAHC \u201918, Association for Computing Machinery, New York, NY, USA (2018)","DOI":"10.1145\/3267973.3267974"},{"key":"36_CR6","unstructured":"Gentry, C.: A Fully Homomorphic Encryption Scheme. PhD Thesis, Stanford University, Stanford, CA, USA (2009). iSBN: 9781109444506"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Ghimes, A.M., Vladuta, V.A., Patriciu, V.V., Ioni\u0163\u0103, A.: Applying neural network approach to homomorphic encrypted data. In: ECAI 2018, pp. 1\u20136 (2018)","DOI":"10.1109\/ECAI.2018.8679085"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M., Jones, C.: Privacy-preserving machine learning in cloud, pp. 39\u201343. Association for Computing Machinery, Inc. (2017)","DOI":"10.1145\/3140649.3140655"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P.: An introduction to computing with neural nets. SIGARCH Comput. Archit. News 16(1), 7\u201325 (1988)","DOI":"10.1145\/44571.44572"},{"key":"36_CR10","unstructured":"Lou, Q., Feng, B., Fox, G.C., Jiang, L.: Glyph: fast and accurately training deep neural networks on encrypted data. Neural Inf. Process. Syst. Found. (2020)"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., et\u00a0al.: Towards deep neural network training on encrypted data, vol. 2019-June, pp. 40\u201348. IEEE Computer Society (2019)","DOI":"10.1109\/CVPRW.2019.00011"},{"key":"36_CR12","doi-asserted-by":"publisher","first-page":"819","DOI":"10.3390\/make3040041","volume":"3","author":"G Onoufriou","year":"2021","unstructured":"Onoufriou, G., Mayfield, P., Leontidis, G.: Fully homomorphically encrypted deep learning as a service. Mach. Learn. Knowl. Extr. 3, 819\u2013834 (2021)","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"36_CR13","doi-asserted-by":"publisher","first-page":"117477","DOI":"10.1109\/ACCESS.2022.3219049","volume":"10","author":"R Podschwadt","year":"2022","unstructured":"Podschwadt, R., et al.: A survey of deep learning architectures for privacy-preserving machine learning with fully homomorphic encryption. IEEE Access 10, 117477\u2013117500 (2022)","journal-title":"IEEE Access"},{"key":"36_CR14","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1007\/s12083-021-01076-8","volume":"14","author":"B Pulido-Gaytan","year":"2021","unstructured":"Pulido-Gaytan, B., et al.: Privacy-preserving neural networks with homomorphic encryption: challenges and opportunities. Peer-to-Peer Netw. Appl. 14, 1666\u20131691 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Shamseer, L., et\u00a0al.: Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015: elaboration and explanation 349 (2015)","DOI":"10.1136\/bmj.g7647"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Yoo, J.S., Yoon, J.W.: T-BMPNet: trainable bitwise multilayer perceptron neural network over fully homomorphic encryption scheme 2021 (2021)","DOI":"10.1155\/2021\/7621260"}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, Special Sessions I, 20th International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-38318-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T06:14:10Z","timestamp":1690265650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-38318-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031383175","9783031383182"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-38318-2_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guimaraes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}