{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:47:16Z","timestamp":1771922836785,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,1,31]]},"DOI":"10.1109\/cgo68049.2026.11395232","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:46:32Z","timestamp":1771879592000},"page":"57-69","source":"Crossref","is-referenced-by-count":0,"title":["PriTran: Privacy-Preserving Inference for Transformer-Based Language Models under Fully Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Yuechen","family":"Mu","sequence":"first","affiliation":[{"name":"University of New South Wales,School of Computer Science and Engineering,Sydney,Australia"}]},{"given":"Guangli","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences University of Chinese Academy of Sciences,SKLP, Institute of Computing Technology,Beijing,China"}]},{"given":"Shiping","family":"Chen","sequence":"additional","affiliation":[{"name":"Commonwealth Scientific and Industrial Research Organisation,Data61,Sydney,Australia"}]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[{"name":"University of New South Wales,School of Computer Science and Engineering,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref5","first-page":"1","article-title":"Fully homomorphic encryption without bootstrapping","volume-title":"Proceedings of the 31st Annual International Cryptology Conference (CRYPTO)","author":"Brakerski"},{"key":"ref6","first-page":"Paper 2012\/144","article-title":"Somewhat practical fully homomorphic encryption","volume-title":"Cryptology ePrint Archive","author":"Fan","year":"2012"},{"key":"ref7","first-page":"Paper 2018\/421","article-title":"TFHE: Fast fully homomorphic encryption over the torus","volume-title":"Cryptology ePrint Archive","author":"Chillotti","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3656382"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3696443.3708924"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3669940.3707276"},{"key":"ref14","first-page":"6993","article-title":"DaCapo: Automatic bootstrapping management for efficient fully homomorphic encryption","volume-title":"Proceedings of the 33rd USENIX Security Symposium (USENIX Security)","author":"Cheon"},{"key":"ref15","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security)","author":"Juvekar"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3643651.3659893"},{"key":"ref17","first-page":"Paper 2022\/1361","article-title":"OpenFHE: Open-source fully homomorphic encryption library","volume-title":"Cryptology ePrint Archive","author":"Curtis","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3560810.3565290"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3669940.3707260"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1101"},{"key":"ref25","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proceedings of the 33rd International Conference on Machine Learning (ICML)","author":"Gilad-Bachrach"},{"key":"ref26","first-page":"Paper 2021\/811","article-title":"A general purpose transpiler for fully homomorphic encryption","volume-title":"Cryptology ePrint Archive","author":"Gorantala","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref28","article-title":"HECO: Automatic code optimizations for efficient fully homomorphic encryption","author":"Viand","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3676641.3716008"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3763095"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CGO68049.2026.11395213"},{"key":"ref32","article-title":"Tenseal: A tensor library for homomorphic encryption","author":"Frederiksen","year":"2021"},{"key":"ref33","article-title":"Crypten: Secure multiparty computation for privacy-preserving machine learning","author":"Bellet","year":"2021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00130"},{"key":"ref35","first-page":"Paper 2024\/136","article-title":"Secure transformer inference made non-interactive","volume-title":"Cryptology ePrint Archive","author":"Zhang","year":"2024"},{"issue":"1429","key":"ref36","article-title":"Powerformer: Efficient privacy-preserving transformer with batch rectifier-power max function and optimized homomorphic attention","volume-title":"IACR Cryptology ePrint Archive","author":"Park","year":"2024"}],"event":{"name":"2026 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","location":"Sydney, Australia","start":{"date-parts":[[2026,1,31]]},"end":{"date-parts":[[2026,2,4]]}},"container-title":["2026 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11395173\/11394837\/11395232.pdf?arnumber=11395232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:42:08Z","timestamp":1771918928000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11395232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,31]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cgo68049.2026.11395232","relation":{},"subject":[],"published":{"date-parts":[[2026,1,31]]}}}