{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:08:07Z","timestamp":1771063687078,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/dac56929.2023.10247964","type":"proceedings-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T17:31:31Z","timestamp":1694799091000},"page":"1-6","source":"Crossref","is-referenced-by-count":32,"title":["Privacy-Preserving DNN Training with Prefetched Meta-Keys on Heterogeneous Neural Network Accelerators"],"prefix":"10.1109","author":[{"given":"Qiushi","family":"Li","sequence":"first","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]},{"given":"Ju","family":"Ren","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Agricultural University"}]},{"given":"Chengru","family":"Song","sequence":"additional","affiliation":[{"name":"Kuaishou Technology"}]},{"given":"Yiqiao","family":"Liao","sequence":"additional","affiliation":[{"name":"Kuaishou Technology"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University,Department of Computer Science and Technology"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Cryptodl: Deep neural networks over encrypted data","author":"hesamifard","year":"2017"},{"key":"ref12","article-title":"Split computing and early exiting for deep learning applications: Survey","author":"matsubara","year":"2022","journal-title":"ACM Comput Surv"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/508172.508174"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68035-0_9"},{"key":"ref20","article-title":"Modelling and automatically analysing privacy properties for honest-but-curious adversaries","author":"paverd","year":"2014","journal-title":"Tech Rep"},{"key":"ref11","article-title":"Split learning for health: Distributed deep learning without sharing raw patient data","author":"vepakomma","year":"2018","journal-title":"CoRR"},{"key":"ref22","article-title":"SCONE: Secure linux containers with intel SGX","author":"arnautov","year":"0","journal-title":"OSDI '16"},{"key":"ref10","article-title":"Asymml: An asymmetric decomposition framework for privacy-preserving DNN training and inference","author":"niu","year":"2021","journal-title":"CoRR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2020.01.007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-020-00168-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref16","article-title":"Aby3: A mixed protocol framework for machine learning","author":"mohassel","year":"0","journal-title":"ser CCS &#x2018;18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-9096-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480112"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29172-7_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i17.17746"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101635"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080246"},{"key":"ref6","article-title":"She: A fast and accurate deep neural network for encrypted data","volume":"32","author":"lou","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref5","article-title":"A survey on homomorphic encryption schemes: Theory and implementation","author":"acar","year":"2018","journal-title":"ACM Computing Surveys"}],"event":{"name":"2023 60th ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,7,9]]},"end":{"date-parts":[[2023,7,13]]}},"container-title":["2023 60th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10247654\/10247655\/10247964.pdf?arnumber=10247964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T17:42:10Z","timestamp":1696268530000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10247964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dac56929.2023.10247964","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}