{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T09:46:15Z","timestamp":1775382375740,"version":"3.50.1"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,3]]},"DOI":"10.1109\/comsnets59351.2024.10427509","type":"proceedings-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T18:55:32Z","timestamp":1708109732000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Empowering SMPC: Bridging the Gap Between Scalability, Memory Efficiency and Privacy in Neural Network Inference"],"prefix":"10.1109","author":[{"given":"Ramya","family":"Burra","sequence":"first","affiliation":[{"name":"CBR, IISc&#x002A;"}]},{"given":"Anshoo","family":"Tandon","sequence":"additional","affiliation":[{"name":"IUDX Program Unit, SID, IISe"}]},{"given":"Srishti","family":"Mittal","sequence":"additional","affiliation":[{"name":"IUDX Program Unit, SID, IISe"}]}],"member":"263","reference":[{"key":"ref2","volume-title":"Fundamental right to privacy","year":"2021"},{"key":"ref3","article-title":"Secure medical image analysis with cryptflow","author":"Alvarez-Valle","year":"2020","journal-title":"arXiv"},{"key":"ref4","volume-title":"Improving cloud security using secure enclaves","author":"Beekman","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"ref6","article-title":"A generic hybrid 2PC framework with application to private inference of unmodified neural networks (extended abstract)","volume-title":"NeurIPS 2021 Workshop Privacy in Machine Learning","author":"Braun","year":"2021"},{"key":"ref7","author":"Lapets","year":"2015","journal-title":"Web-based multi-party computation with application to anonymous aggregate compensation analytics"},{"key":"ref8","first-page":"35","article-title":"ABY3: A mixed protocol frame-work for machine learning","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 18","author":"Mohassel"},{"key":"ref9","first-page":"2165","article-title":"ABY2.0: Improved Mixed-Protocol secure Two-Party computation","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Patra"},{"key":"ref10","volume-title":"tf-encrypted","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2429117"}],"event":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","location":"Bengaluru, India","start":{"date-parts":[[2024,1,3]]},"end":{"date-parts":[[2024,1,7]]}},"container-title":["2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426746\/10426785\/10427509.pdf?arnumber=10427509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T14:24:22Z","timestamp":1709475862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/comsnets59351.2024.10427509","relation":{},"subject":[],"published":{"date-parts":[[2024,1,3]]}}}