{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T04:09:14Z","timestamp":1741838954151,"version":"3.38.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019014","name":"Chengdu Science and Technology Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,8]]},"DOI":"10.1109\/globecom52923.2024.10901297","type":"proceedings-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T17:30:35Z","timestamp":1741714235000},"page":"43-48","source":"Crossref","is-referenced-by-count":0,"title":["Benchmark GELU in Secure Multi-Party Computation"],"prefix":"10.1109","author":[{"given":"Rui","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Meng","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Hanxiao","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]},{"given":"Dianhua","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering"}]}],"member":"263","reference":[{"year":"2023","key":"ref1","article-title":"Gpt-4 technical report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560565"},{"key":"ref3","article-title":"Ciphergpt: Secure two-party gpt inference","author":"Hou","year":"2023","journal-title":"Cryptology ePrint Archive 2023\/1147"},{"article-title":"Puma: Secure inference of llama-7b in five minutes","year":"2023","author":"Dong","key":"ref4"},{"key":"ref5","article-title":"Sigma: Secure gpt inference with function secret sharing","author":"Gupta","year":"2023","journal-title":"Cryptology ePrint Archive 2023\/1269"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00086"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"article-title":"Gaussian error linear units (gelus)","year":"2016","author":"Hendrycks","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0065"},{"key":"ref10","article-title":"How to exchange secrets with oblivious transfer","author":"Rabin","year":"2005","journal-title":"Cryptology ePrint Archive 2005\/187"},{"issue":"1","key":"ref11","first-page":"163","article-title":"Survey of neural transfer functions","volume":"2","author":"Duch","year":"1999","journal-title":"Neural computing surveys"},{"article-title":"Mish: A self regularized non-monotonic activation function","year":"2019","author":"Misra","key":"ref12"},{"article-title":"Searching for activation functions","year":"2017","author":"Ramachandran","key":"ref13"},{"article-title":"Bert: Pretraining of deep bidirectional transformers for language understanding","year":"2018","author":"Devlin","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"issue":"8","key":"ref16","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00043"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"ref19","first-page":"4961","article-title":"Crypten: Secure multi-party computation meets machine learning","volume-title":"Proceedings of NeurIPS","volume":"34","author":"Knott"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1287\/opre.37.6.865"},{"key":"ref21","article-title":"Applications of division by convergence","volume-title":"Ph.D. dissertation","author":"Goldschmidt","year":"1964"}],"event":{"name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","start":{"date-parts":[[2024,12,8]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2024,12,12]]}},"container-title":["GLOBECOM 2024 - 2024 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10900933\/10900934\/10901297.pdf?arnumber=10901297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T06:09:35Z","timestamp":1741759775000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10901297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/globecom52923.2024.10901297","relation":{},"subject":[],"published":{"date-parts":[[2024,12,8]]}}}