{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:07:45Z","timestamp":1767704865173,"version":"3.37.3"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012389","name":"NAVER Cloud Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012389","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korean Government through Institute of Information & communications Technology Planning & Evaluation","award":["RS-2022-II220688","2022-0-01199","RS-2023-00229400","RS-2024-00419073","RS-2024-00436936"],"award-info":[{"award-number":["RS-2022-II220688","2022-0-01199","RS-2023-00229400","RS-2024-00419073","RS-2024-00436936"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3438996","type":"journal-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T17:57:27Z","timestamp":1722880647000},"page":"109323-109341","source":"Crossref","is-referenced-by-count":5,"title":["UniHENN: Designing Faster and More Versatile Homomorphic Encryption-Based CNNs Without im2col"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0486-9582","authenticated-orcid":false,"given":"Hyunmin","family":"Choi","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Seoul, Republic of Korea"}]},{"given":"Jihun","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Sungkyunkwan University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8097-2845","authenticated-orcid":false,"given":"Seungho","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Seoul, Republic of Korea"}]},{"given":"Seonhye","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1938-1955","authenticated-orcid":false,"given":"Jeongyong","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9599-9467","authenticated-orcid":false,"given":"Wonbin","family":"Choi","sequence":"additional","affiliation":[{"name":"NAVER Cloud Security Dev., Seongnam-si, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1605-3866","authenticated-orcid":false,"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"volume-title":"Helib","year":"2022","key":"ref1"},{"volume-title":"SEAL-Python","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384740"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3021238"},{"key":"ref7","article-title":"TenSEAL: A library for encrypted tensor operations using homomorphic encryption","author":"Benaissa","year":"2021","journal-title":"arXiv:2104.03152"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554799"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref11","article-title":"Faster CryptoNets: Leveraging sparsity for real-world encrypted inference","author":"Chou","year":"2018","journal-title":"arXiv:1811.09953"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207619"},{"key":"ref16","first-page":"16961","article-title":"CryptoNAS: Private inference on a ReLU budget","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ghodsi"},{"key":"ref17","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/34.291440"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378372"},{"key":"ref21","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp. (USENIX Security)","author":"Juvekar"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106848"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0401-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3201585"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4195852"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2015.7318926"},{"issue":"4","key":"ref27","first-page":"1","volume-title":"CIFAR-10 (Canadian Institute for Advanced Research)","volume":"5","author":"Krizhevsky","year":"2010"},{"article-title":"Handwritten digit recognition with a back-propagation network","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"LeCun","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3318433"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3287564"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"volume-title":"Fully Homomorphic Encryption Without Bootstrapping","year":"2011","author":"Masahiro","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/51.932724"},{"key":"ref38","first-page":"64","article-title":"Lattigo: A multiparty homomorphic encryption library in go","volume-title":"Proc. 8th Workshop Encrypted Comput. Appl. Homomorphic Cryptogr.","author":"Mouchet"},{"volume-title":"Differential Privacy: Future Work & Open Challenges","year":"2022","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265583"},{"key":"ref41","article-title":"AESPA: Accuracy preserving low-degree polynomial activation for fast private inference","author":"Park","year":"2022","journal-title":"arXiv:2201.06699"},{"volume-title":"Server","year":"2023","key":"ref42"},{"key":"ref43","article-title":"Privacy-preserving similarity calculation of speaker features using fully homomorphic encryption","author":"Rahulamathavan","year":"2022","journal-title":"arXiv:2202.07994"},{"volume-title":"Microsoft SEAL (Release 4.1)","year":"2023","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938778"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3146489"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2023.128771"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.007"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/s23073566"},{"key":"ref50","article-title":"Opacus: User-friendly differential privacy library in PyTorch","author":"Yousefpour","year":"2021","journal-title":"arXiv:2109.12298"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407599"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00355"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i20.30200"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1145\/3627673.3680017","article-title":"Blind-Match: Efficient homomorphic encryption-based 1:N matching for privacy-preserving biometric identification","volume-title":"Proc. ACM Int. Conf. Inf. Knowl. Manag.","author":"Choi"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10623483.pdf?arnumber=10623483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T02:09:28Z","timestamp":1732586968000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10623483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3438996","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}