{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:51:04Z","timestamp":1761396664160,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819979684"},{"type":"electronic","value":"9789819979691"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7969-1_1","type":"book-chapter","created":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:04:14Z","timestamp":1700179454000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SecureQNN: Introducing a\u00a0Privacy-Preserving Framework for\u00a0QNNs at\u00a0the\u00a0Deep Edge"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2046-4569","authenticated-orcid":false,"given":"Miguel","family":"Costa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4071-9015","authenticated-orcid":false,"given":"Tiago","family":"Gomes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9954-9746","authenticated-orcid":false,"given":"Jorge","family":"Cabral","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3287-3995","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Monteiro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8316-6927","authenticated-orcid":false,"given":"Adriano","family":"Tavares","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4580-7484","authenticated-orcid":false,"given":"Sandro","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,17]]},"reference":[{"issue":"6","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1093\/bib\/bbx044","volume":"19","author":"R Miotto","year":"2017","unstructured":"Miotto, R., et al.: Deep learning for healthcare: review, opportunities and challenges. Briefings Bioinf. 19(6), 1236\u20131246 (2017)","journal-title":"Briefings Bioinf."},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"101646","DOI":"10.1016\/j.ribaf.2022.101646","volume":"61","author":"S Ahmed","year":"2022","unstructured":"Ahmed, S., et al.: Artificial intelligence and machine learning in finance: a bibliometric review. Res. Int. Bus. Financ. 61, 101646 (2022)","journal-title":"Res. Int. Bus. Financ."},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"247","DOI":"10.2478\/jaiscr-2019-0007","volume":"9","author":"M Costa","year":"2019","unstructured":"Costa, M., et al.: Detecting driver\u2019s fatigue, distraction and activity using a non-intrusive AI-based monitoring system. J. Artif. Intell. Soft Comput. Res. 9(4), 247\u2013266 (2019)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"issue":"8","key":"1_CR4","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1109\/TNNLS.2020.3015992","volume":"32","author":"Y Li","year":"2021","unstructured":"Li, Y., et al.: Deep learning for lidar point clouds in autonomous driving: a review. IEEE Trans. Neural Netw. Learn. Syst. 32(8), 3412\u20133432 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"9","key":"1_CR5","doi-asserted-by":"publisher","first-page":"4653","DOI":"10.3390\/app12094653","volume":"12","author":"D Costa","year":"2022","unstructured":"Costa, D., et al.: Train me if you can: decentralized learning on the deep edge. Appl. Sci. 12(9), 4653 (2022)","journal-title":"Appl. Sci."},{"issue":"8","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469029","volume":"54","author":"MGS Murshed","year":"2021","unstructured":"Murshed, M.G.S., et al.: Machine learning at the network edge: a survey. ACM Comput. Surv. 54(8), 1\u201337 (2021)","journal-title":"ACM Comput. Surv."},{"key":"1_CR7","unstructured":"Rigaki, M., et al.: A survey of privacy attacks in machine learning, CoRR (2020)"},{"issue":"11s","key":"1_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3523273","volume":"54","author":"H Hu","year":"2022","unstructured":"Hu, H., et al.: Membership inference attacks on machine learning: a survey. ACM Comput. Surv. 54(11s), 1\u201337 (2022)","journal-title":"ACM Comput. Surv."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Li, G., et al.: TensorFI: a configurable fault injector for tensorflow applications. In: 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) (2018)","DOI":"10.1109\/ISSREW.2018.00024"},{"key":"1_CR10","unstructured":"Chen, Z., et al.: BinFI: an efficient fault injector for safety-critical machine learning systems. In: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (2019)"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"23913","DOI":"10.1109\/ACCESS.2022.3152781","volume":"10","author":"D Oliveira","year":"2022","unstructured":"Oliveira, D., et al.: uTango: an open-source TEE for IoT devices. IEEE Access 10, 23913\u201323930 (2022)","journal-title":"IEEE Access"},{"key":"1_CR12","unstructured":"Costan, V., et al.: Intel SGX explained (2016). https:\/\/eprint.iacr.org\/2016\/086"},{"issue":"6","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3291047","volume":"51","author":"S Pinto","year":"2019","unstructured":"Pinto, S., et al.: Demystifying ARM TrustZone: a comprehensive survey. ACM Comput. Surv. 51(6), 1\u201336 (2019)","journal-title":"ACM Comput. Surv."},{"key":"1_CR14","unstructured":"Cerdeira, D., et al.: ReZone: disarming TrustZone with TEE privilege reduction. In: 31st USENIX Security Symposium (USENIX Security 22) (2022)"},{"key":"1_CR15","unstructured":"VanNostrand, P.M., et al.: Confidential deep learning: executing proprietary models on untrusted devices, CoRR (2019)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Mo, F., et al.: DarkneTZ: towards model privacy at the edge using trusted execution environments. In: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services (2020)","DOI":"10.1145\/3386901.3388946"},{"issue":"6","key":"1_CR17","doi-asserted-by":"publisher","first-page":"4270","DOI":"10.1109\/TDSC.2021.3126315","volume":"19","author":"J Hou","year":"2022","unstructured":"Hou, J., et al.: Model protection: real-time privacy-preserving inference service for model privacy at the edge. IEEE Trans. Dependable Secure Comput. 19(6), 4270\u20134284 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Liu, R., et al.: SecDeep: secure and performant on-device deep learning inference framework for mobile and IoT devices. In: Proceedings of the International Conference on Internet-of-Things Design and Implementation (2021)","DOI":"10.1145\/3450268.3453524"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Sun, Z., et al.: ShadowNet: a secure and efficient on-device model inference system for convolutional neural networks. In: 2023 IEEE Symposium on Security and Privacy (SP) (2023)","DOI":"10.1109\/SP46215.2023.10179382"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Nakai, T., et al.: Towards trained model confidentiality and integrity using trusted execution environments. In: Applied Cryptography and Network Security Workshops (2021)","DOI":"10.1007\/978-3-030-81645-2_10"},{"key":"1_CR21","unstructured":"Tramer, F., et al.: Slalom: fast, verifiable and private execution of neural networks in trusted hardware. In: International Conference on Learning Representations (2019)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Bayerl, S.P., et al.: Offline model guard: Secure and private ML on mobile devices. In: Proceedings of the 23rd Conference on Design, Automation and Test in Europe (2020)","DOI":"10.23919\/DATE48585.2020.9116560"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Hanzlik, L., et al.: MLCapsule: guarded offline deployment of machine learning as a service. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2021)","DOI":"10.1109\/CVPRW53098.2021.00368"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Lin, H.-Y., et al.: Bident structure for neural network model protection. In: ICISSP (2020)","DOI":"10.5220\/0008923403770384"},{"issue":"6","key":"1_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3544562","volume":"13","author":"M Costa","year":"2022","unstructured":"Costa, M., et al.: Shifting capsule networks from the cloud to the deep edge. ACM Trans. Intell. Syst. Technol. 13(6), 1\u201325 (2022)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"1_CR26","unstructured":"Yosinski, J., et al.: How Transferable are Features in Deep Neural Networks? MIT Press, Cambridge (2014)"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"45736","DOI":"10.1109\/ACCESS.2023.3274190","volume":"11","author":"MF Babar","year":"2023","unstructured":"Babar, M.F., et al.: Trusted deep neural execution - a survey. IEEE Access 11, 45736\u201345748 (2023)","journal-title":"IEEE Access"},{"key":"1_CR28","unstructured":"Banbury, C.R., et al.: Benchmarking TinyML systems: challenges and direction, CoRR (2020)"}],"container-title":["Communications in Computer and Information Science","Data Science and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7969-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:08:43Z","timestamp":1710263323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7969-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819979684","9789819979691"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7969-1_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Science and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangkok","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dsai2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdsai.cs.ait.ac.th\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}