{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:01:32Z","timestamp":1775016092842,"version":"3.50.1"},"reference-count":116,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2054968"],"award-info":[{"award-number":["2054968"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2118083"],"award-info":[{"award-number":["2118083"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004318","name":"Microsoft Faculty Fellowship Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3219049","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:58:49Z","timestamp":1667527129000},"page":"117477-117500","source":"Crossref","is-referenced-by-count":68,"title":["A Survey of Deep Learning Architectures for Privacy-Preserving Machine Learning With Fully Homomorphic Encryption"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2997-109X","authenticated-orcid":false,"given":"Robert","family":"Podschwadt","sequence":"first","affiliation":[{"name":"Department of Computer Science, Georgia State University, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0447-3641","authenticated-orcid":false,"given":"Daniel","family":"Takabi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Georgia State University, Atlanta, GA, USA"}]},{"given":"Peizhao","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Rochester Institute of Technology, Rochester, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4923-9584","authenticated-orcid":false,"given":"Mohammad H.","family":"Rafiei","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Georgia State University, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6017-975X","authenticated-orcid":false,"given":"Zhipeng","family":"Cai","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Georgia State University, Atlanta, GA, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref38","first-page":"35","article-title":"A guide to fully homomorphic encryption","volume":"45","author":"armknecht","year":"2015","journal-title":"Cryptology-eprint-archive"},{"key":"ref33","first-page":"1","article-title":"An off-chip attack on hardware enclaves via the memory bus","author":"lee","year":"2020","journal-title":"Proc 29th USENIX Secur Symp"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref31","year":"2019","journal-title":"Learn the Architecture&#x2014;TrustZone for AArch64"},{"key":"ref30","first-page":"1","article-title":"Partially encrypted deep learning using functional encryption","volume":"32","author":"ryffel","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref37","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1561\/9781680835090"},{"key":"ref22","author":"rabin","year":"1981","journal-title":"How to Exchange Secrets with Oblivious Transfer"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00873"},{"key":"ref23","article-title":"Impala: Low-latency, communication-efficient private deep learning inference","author":"choi","year":"2022","journal-title":"arXiv 2205 06437"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref26","first-page":"420","article-title":"Efficient multiparty protocols using circuit randomization","author":"beaver","year":"1991","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref58","year":"2021","journal-title":"Snucrypto\/HEAAN"},{"key":"ref57","year":"2020","journal-title":"Microsoft SEAL (Release 3 6)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref55","year":"2015","journal-title":"PALISADE Homomorphic Encryption Software Library&#x2014;An Open-Source Lattice Crypto Software Library"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref53","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"fan","year":"2012","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2730906"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref8","first-page":"63","article-title":"SoK: Cryptography for neural networks","author":"azraoui","year":"2019","journal-title":"IFIP International Summer School on Privacy and Identity Management"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2016.7924692"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335762"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009071"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_13"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_21"},{"key":"ref71","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","author":"juvekar","year":"2018","journal-title":"Proc 27th USENIX Secur Symp"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3523253"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4012"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_22"},{"key":"ref75","article-title":"Neural network training with homomorphic encryption","author":"mihara","year":"2020","journal-title":"arXiv 2012 13552"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"key":"ref79","article-title":"Bag of tricks for efficient text classification","author":"joulin","year":"2016","journal-title":"arXiv 1607 01759"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"ref62","first-page":"35","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"chabanne","year":"2017","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref61","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"dowlin","year":"2016","journal-title":"Proc 7th Int Conf Machine Learning"},{"key":"ref63","article-title":"CryptoDL: Deep neural networks over encrypted data","author":"hesamifard","year":"2017","journal-title":"arXiv 1711 05189"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683721"},{"key":"ref65","first-page":"10035","article-title":"SHE: A fast and accurate deep neural network for encrypted data","author":"lou","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref66","article-title":"Faster CryptoNets: Leveraging sparsity for real-world encrypted inference","author":"chou","year":"2018","journal-title":"arXiv 1811 09953"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31517-1_3"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref69","first-page":"812","article-title":"Low latency privacy preserving inference","author":"brutzkus","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref109","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"Proc 12th USENIX Symp Operating Syst Des Implement (OSDI)"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267974"},{"key":"ref108","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref94","volume":"13","author":"meinardus","year":"2012","journal-title":"Approximation of Functions Theory and Numerical Methods"},{"key":"ref107","author":"albrecht","year":"2018","journal-title":"Homomorphic Encryption Security Standard"},{"key":"ref93","author":"goldschmidt","year":"1964","journal-title":"Applications of division by convergence"},{"key":"ref106","year":"2016","journal-title":"Homomorphic Encryption Standardization&#x2014;An Open Industry \/ Government \/ Academic Consortium to Advance Secure Computation"},{"key":"ref92","article-title":"Minimax approximation of sign function by composite polynomial for homomorphic comparison","author":"lee","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref91","author":"rivlin","year":"2020","journal-title":"Chebyshev Polynomials"},{"key":"ref104","author":"krizhevsky","year":"2009","journal-title":"Learning multiple layers of features from tiny images"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.2307\/3029337"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883037"},{"key":"ref102","first-page":"37","article-title":"N-gram language models","author":"jurafsky","year":"2022","journal-title":"Speech and Language Processing"},{"key":"ref111","first-page":"12403","article-title":"Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions","author":"lee","year":"2022","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_27"},{"key":"ref110","first-page":"1","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"paszke","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.17216"},{"key":"ref99","first-page":"601","article-title":"Stealing machine learning models via prediction APIs","author":"tram\u00e8r","year":"2016","journal-title":"Proc 25th USENIX Secur Symp"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(96)00011-6"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_23"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01076-8"},{"key":"ref11","author":"mouris","year":"2022","journal-title":"New insights into fully homomorphic encryption libraries via standardized benchmarks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00068"},{"key":"ref13","first-page":"501","article-title":"Mystique: Efficient conversions for zero-knowledge proofs with applications to machine learning","author":"weng","year":"2021","journal-title":"Proc 30th USENIX Secur Symp"},{"key":"ref14","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"konen\u00fd","year":"2016","journal-title":"arXiv 1610 02527"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref82","first-page":"27","article-title":"Classification of encrypted word embeddings using recurrent neural networks","author":"podschwadt","year":"2020","journal-title":"Proc PrivateNLP WSDM"},{"key":"ref17","first-page":"1","article-title":"Neurocrypt: Machine learning over encrypted distributed neuroimaging data","volume":"20","author":"senanayake","year":"2021","journal-title":"Neuroinformatics"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3014636"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49785-9_16"},{"key":"ref19","article-title":"Scalable private learning with PATE","author":"papernot","year":"2018","journal-title":"arXiv 1802 08908"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00019"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_48"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010103"},{"key":"ref116","article-title":"Reducing ReLU count for privacy-preserving CNN speedup","author":"helbitz","year":"2021","journal-title":"arXiv 2101 11835"},{"key":"ref80","first-page":"347","article-title":"A full RNS variant of approximate homomorphic encryption","author":"cheon","year":"2018","journal-title":"Proc Int Conf Sel Areas Cryptogr"},{"key":"ref115","article-title":"HE-PEX: Efficient machine learning under homomorphic encryption using pruning, permutation and expansion","author":"aharoni","year":"2022","journal-title":"arXiv 2207 03384"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00011"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref88","article-title":"Incremental network quantization: Towards lossless CNNs with low-precision weights","author":"zhou","year":"2017","journal-title":"arXiv 1702 03044"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09936637.pdf?arnumber=9936637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:59:11Z","timestamp":1670875151000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9936637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":116,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3219049","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}