{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:14:25Z","timestamp":1770819265043,"version":"3.50.1"},"reference-count":43,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100018531","name":"Major Science and Technology Projects in Yunnan Province","doi-asserted-by":"publisher","award":["202302AG050009"],"award-info":[{"award-number":["202302AG050009"]}],"id":[{"id":"10.13039\/501100018531","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471205"],"award-info":[{"award-number":["62471205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Communications and Networks"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.dcan.2025.04.009","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T12:10:23Z","timestamp":1745928623000},"page":"86-100","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secformer: Privacy-preserving atomic-level componentized transformer-like model with MPC"],"prefix":"10.1016","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1475-333X","authenticated-orcid":false,"given":"Chi","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1273-7950","authenticated-orcid":false,"given":"Tao","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2505-0288","authenticated-orcid":false,"given":"Fenhua","family":"Bai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2662-1596","authenticated-orcid":false,"given":"Kai","family":"Zeng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5057-6372","authenticated-orcid":false,"given":"Xiaohui","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3164-535X","authenticated-orcid":false,"given":"Bin","family":"Cao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"7","key":"10.1016\/j.dcan.2025.04.009_br0010","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","article-title":"A fast learning algorithm for deep belief nets","volume":"18","author":"Hinton","year":"2006","journal-title":"Neural Comput."},{"key":"10.1016\/j.dcan.2025.04.009_br0020","series-title":"Proceedings of the 2017 Advances in Neural Information Processing Systems 30","first-page":"5998","article-title":"Attention is all you need","author":"Vaswani","year":"2017"},{"issue":"11","key":"10.1016\/j.dcan.2025.04.009_br0030","doi-asserted-by":"crossref","first-page":"8309","DOI":"10.1007\/s00521-020-05101-4","article-title":"Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data","volume":"34","author":"Uzma","year":"2022","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"10.1016\/j.dcan.2025.04.009_br0040","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1007\/s11517-021-02368-0","article-title":"Imagined character recognition through eeg signals using deep convolutional neural network","volume":"59","author":"Ullah","year":"2021","journal-title":"Med. Biol. Eng. Comput."},{"issue":"9","key":"10.1016\/j.dcan.2025.04.009_br0050","doi-asserted-by":"crossref","first-page":"2457","DOI":"10.1007\/s10115-022-01709-1","article-title":"Graph attention-based collaborative filtering for user-specific recommender system using knowledge graph and deep neural networks","volume":"64","author":"Elahi","year":"2022","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.dcan.2025.04.009_br0060","series-title":"Proceedings of the 2019 of Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, ACL","first-page":"4171","article-title":"Bert: pre-training of deep bidirectional transformers for language understanding","author":"Chang","year":"2019"},{"key":"10.1016\/j.dcan.2025.04.009_br0070","series-title":"Proceedings of the 2020 Advances in Neural Information Processing Systems 33","first-page":"1877","article-title":"Language models are few-shot learners","author":"Brown","year":"2020"},{"issue":"1","key":"10.1016\/j.dcan.2025.04.009_br0080","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1109\/COMST.2022.3204702","article-title":"Blockchain systems, technologies, and applications: a methodology perspective","volume":"25","author":"Cao","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"10.1016\/j.dcan.2025.04.009_br0090","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/MNET.2023.3321546","article-title":"Web3 technologies: challenges and opportunities","volume":"38","author":"Liu","year":"2024","journal-title":"IEEE Netw."},{"issue":"1","key":"10.1016\/j.dcan.2025.04.009_br0100","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1109\/TDSC.2024.3417531","article-title":"Distributed and parallel blockchain: towards a multi-chain system with enhanced security","volume":"22","author":"Liu","year":"2025","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10.1016\/j.dcan.2025.04.009_br0110","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/MNET.001.2300140","article-title":"Gradient leakage attacks in federated learning: research frontiers, taxonomy and future directions","volume":"38","author":"Yang","year":"2024","journal-title":"IEEE Netw."},{"issue":"6","key":"10.1016\/j.dcan.2025.04.009_br0120","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.2023.3318179","article-title":"Collusion-based poisoning attacks against blockchained federated learning","volume":"37","author":"Zhang","year":"2023","journal-title":"IEEE Netw."},{"key":"10.1016\/j.dcan.2025.04.009_br0130","series-title":"Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)","first-page":"392","article-title":"Privformer: privacy-preserving transformer with mpc","author":"Akimoto","year":"2023"},{"key":"10.1016\/j.dcan.2025.04.009_br0140","series-title":"Proceedings of the 2023 International Conference on Learning Representations (ICLR)","first-page":"1","article-title":"Mpcformer: fast, performant and private transformer inference with mpc","author":"Li","year":"2022"},{"key":"10.1016\/j.dcan.2025.04.009_br0150","series-title":"Proceedings of the 2022 Findings of the Association for Computational Linguistics, ACL","first-page":"3510","article-title":"The-x: privacy-preserving transformer inference with homomorphic encryption","author":"Chen","year":"2022"},{"key":"10.1016\/j.dcan.2025.04.009_br0160","series-title":"Proceedings of the 2023 60th ACM\/IEEE Design Automation Conference (DAC)","first-page":"1","article-title":"Primer: fast private transformer inference on encrypted data","author":"Zheng","year":"2023"},{"issue":"10","key":"10.1016\/j.dcan.2025.04.009_br0170","doi-asserted-by":"crossref","first-page":"13426","DOI":"10.1109\/TNNLS.2023.3269062","article-title":"Fedtp: federated learning by transformer personalization","volume":"35","author":"Li","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.dcan.2025.04.009_br0180","series-title":"Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","first-page":"182","article-title":"Privacy protection in transformer-based neural network","author":"Lang","year":"2019"},{"issue":"1","key":"10.1016\/j.dcan.2025.04.009_br0190","doi-asserted-by":"crossref","first-page":"3709","DOI":"10.1109\/TIFS.2020.2997134","article-title":"Securenlp: a system for multi-party privacy-preserving natural language processing","volume":"15","author":"Feng","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"10.1016\/j.dcan.2025.04.009_br0200","doi-asserted-by":"crossref","first-page":"4591","DOI":"10.1109\/TSC.2023.3332933","article-title":"Privacy-preserving and verifiable outsourcing linear inference computing framework","volume":"16","author":"Liu","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.dcan.2025.04.009_br0210","series-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1575","article-title":"Mp-spdz: a versatile framework for multi-party computation","author":"Keller","year":"2020"},{"key":"10.1016\/j.dcan.2025.04.009_br0220","series-title":"Proceedings of the 2021 Advances in Cryptology \u2013 CRYPTO","first-page":"244","article-title":"Atlas: efficient and scalable mpc in the honest majority setting","author":"Goyal","year":"2021"},{"key":"10.1016\/j.dcan.2025.04.009_br0230","series-title":"Proceedings of the 1982 23rd Annual Symposium on Foundations of Computer Science","first-page":"160","article-title":"Protocols for secure computations","author":"Yao","year":"1982"},{"key":"10.1016\/j.dcan.2025.04.009_br0240","series-title":"How to Play Any Mental Game, or a Completeness Theorem for Protocols with Honest Majority","author":"Goldreich","year":"2019"},{"key":"10.1016\/j.dcan.2025.04.009_br0250","series-title":"Proceedings of the 1990 Twenty-Second Annual ACM Symposium on Theory of Computing","first-page":"503","article-title":"The round complexity of secure protocols","author":"Beaver","year":"1990"},{"key":"10.1016\/j.dcan.2025.04.009_br0260","series-title":"Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium","first-page":"1","article-title":"Aby-a framework for efficient mixed-protocol secure two-party computation","author":"Demmler","year":"2015"},{"key":"10.1016\/j.dcan.2025.04.009_br0270","series-title":"Proceedings of the 2015 IEEE Symposium on Security and Privacy","first-page":"411","article-title":"Tinygarble: highly compressed and scalable sequential garbled circuits","author":"Songhori","year":"2015"},{"key":"10.1016\/j.dcan.2025.04.009_br0280","series-title":"Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP)","first-page":"1220","article-title":"Sok: general purpose compilers for secure multi-party computation","author":"Hastings","year":"2019"},{"key":"10.1016\/j.dcan.2025.04.009_br0290","series-title":"Proceedings of the 2019 IEEE Symposium on Security and Privacy","first-page":"724","article-title":"Helen: maliciously secure coopetitive learning for linear models","author":"Zheng","year":"2019"},{"key":"10.1016\/j.dcan.2025.04.009_br0300","series-title":"Proceedings of the 1986 18th Annual ACM Symposium on Theory of Computing","first-page":"364","article-title":"Limits on the security of coin flips when half the processors are faulty","author":"Cleve","year":"1986"},{"key":"10.1016\/j.dcan.2025.04.009_br0310","series-title":"Completeness Theorems for Non-cryptographic Fault-Tolerant Distributed Computation","author":"Ben-Or","year":"2019"},{"issue":"4","key":"10.1016\/j.dcan.2025.04.009_br0320","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1109\/TNET.2020.2991994","article-title":"Direct acyclic graph-based ledger for Internet of things: performance and security analysis","volume":"28","author":"Li","year":"2020","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"4","key":"10.1016\/j.dcan.2025.04.009_br0330","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1109\/TNNLS.2021.3105810","article-title":"Toward on-device federated learning: a direct acyclic graph-based blockchain approach","volume":"34","author":"Cao","year":"2023","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.dcan.2025.04.009_br0340","series-title":"Proceedings of the 2021 AAAI Conference on Artificial Intelligence","first-page":"11106","article-title":"Informer: beyond efficient transformer for long sequence time-series forecasting","author":"Zhou","year":"2021"},{"key":"10.1016\/j.dcan.2025.04.009_br0350","author":"OpenAI"},{"issue":"13","key":"10.1016\/j.dcan.2025.04.009_br0360","doi-asserted-by":"crossref","first-page":"10412","DOI":"10.1109\/JIOT.2021.3058638","article-title":"Privacy-preserving deep learning based on multiparty secure computation: a survey","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.dcan.2025.04.009_br0370","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2025.100300","article-title":"On protecting the data privacy of large language models (llms) and llm agents: a literature review","author":"Yan","year":"2025","journal-title":"High-Confid. Comput."},{"key":"10.1016\/j.dcan.2025.04.009_br0380","series-title":"Proceedings of the 2021 NeurIPS Workshop Privacy in Machine Learning","first-page":"1","article-title":"Characterizing and improving mpc-based private inference for transformer-based models","author":"Wang","year":"2021"},{"key":"10.1016\/j.dcan.2025.04.009_br0390","series-title":"Proceedings of the 2021 AAAI Conference on Artificial Intelligence, AAAI","first-page":"14138","article-title":"Nystr\u00f6mformer: a Nystr\u00f6m-based algorithm for approximating self-attention","author":"Xiong","year":"2021"},{"key":"10.1016\/j.dcan.2025.04.009_br0400","series-title":"Proceedings of the 2021 International Conference on System Science and Engineering","first-page":"215","article-title":"An analysis of state-of-the-art activation functions for supervised deep neural network","author":"Nguyen","year":"2021"},{"issue":"1","key":"10.1016\/j.dcan.2025.04.009_br0410","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","article-title":"Secure multi-party computation: theory, practice and applications","volume":"476","author":"Zhao","year":"2019","journal-title":"Inf. Sci."},{"issue":"11","key":"10.1016\/j.dcan.2025.04.009_br0420","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"10.1016\/j.dcan.2025.04.009_br0430","series-title":"Proceedings of the 2017 Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"225","article-title":"High-throughput secure three-party computation for malicious adversaries and an honest majority","author":"Furukawa","year":"2017"}],"container-title":["Digital Communications and Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2352864825000422?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2352864825000422?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:28:06Z","timestamp":1770816486000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2352864825000422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["S2352864825000422"],"URL":"https:\/\/doi.org\/10.1016\/j.dcan.2025.04.009","relation":{},"ISSN":["2352-8648"],"issn-type":[{"value":"2352-8648","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secformer: Privacy-preserving atomic-level componentized transformer-like model with MPC","name":"articletitle","label":"Article Title"},{"value":"Digital Communications and Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dcan.2025.04.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Chongqing University of Posts and Telecommunications. Publishing services by Elsevier B.V. on behalf of KeAi Communications Co. Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}]}}