{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T08:01:23Z","timestamp":1768636883120,"version":"3.49.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,17]]},"DOI":"10.1109\/ic-nidc54101.2021.9660566","type":"proceedings-article","created":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T15:36:16Z","timestamp":1641310576000},"page":"445-449","source":"Crossref","is-referenced-by-count":0,"title":["An Online Solution for Secured Deep Learning Models Based on Crowd Sourced SGX"],"prefix":"10.1109","author":[{"given":"Xuaner","family":"Wu","sequence":"first","affiliation":[{"name":"BUPT,School of Artificial Intelligence,Beijing,China,100876"}]},{"given":"Konglin","family":"Zhu","sequence":"additional","affiliation":[{"name":"BUPT,School of Artificial Intelligence,Beijing,China,100876"}]},{"given":"Yuyang","family":"Peng","sequence":"additional","affiliation":[{"name":"Macau University of Science and Technology,Faculty of Information Technology,Taipa,China,999078"}]},{"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[{"name":"BUPT,School of Artificial Intelligence,Beijing,China,100876"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref10","author":"kleinberg","year":"2006","journal-title":"Algorithm Design"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref11","year":"2020","journal-title":"MS Azure Confidential Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref12","year":"2020","journal-title":"IBM Cloud Data Shield"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3309697.3331480"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322470"},{"key":"ref9","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","author":"tramer","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345447"}],"event":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","location":"Beijing, China","start":{"date-parts":[[2021,11,17]]},"end":{"date-parts":[[2021,11,19]]}},"container-title":["2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9660393\/9660398\/09660566.pdf?arnumber=9660566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:48:49Z","timestamp":1768596529000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,17]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ic-nidc54101.2021.9660566","relation":{},"subject":[],"published":{"date-parts":[[2021,11,17]]}}}