{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:35:40Z","timestamp":1773246940337,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014553","name":"Samsung Advanced Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014553","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1109\/iccad57390.2023.10323815","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T18:58:45Z","timestamp":1701370725000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service"],"prefix":"10.1109","author":[{"given":"Jaewoo","family":"Park","sequence":"first","affiliation":[{"name":"Ulsan National Institute of Science and Technology (UNIST),Department of Computer Science and Engineering,Ulsan,Korea"}]},{"given":"Chenghao","family":"Quan","sequence":"additional","affiliation":[{"name":"Ulsan National Institute of Science and Technology (UNIST),Department of Electrical Engineering,Ulsan,Korea"}]},{"given":"Hyungon","family":"Moon","sequence":"additional","affiliation":[{"name":"Ulsan National Institute of Science and Technology (UNIST),Department of Electrical Engineering,Ulsan,Korea"}]},{"given":"Jongeun","family":"Lee","sequence":"additional","affiliation":[{"name":"Ulsan National Institute of Science and Technology (UNIST),Department of Computer Science and Engineering,Ulsan,Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"12403","article-title":"Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions","volume-title":"Proceedings of the 39th International Conference on Machine Learning, ser. Proceedings of Machine Learning Research","volume":"162","author":"Lee"},{"key":"ref2","first-page":"201","article-title":"CryptoNets: Applying neural networks to en-crypted data with high throughput and accuracy","volume-title":"Proceedings of The 33rd International Conference on Machine Learning, ser. Proceedings of Machine Learning Research","volume":"48","author":"Gilad-Bachrach"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179382"},{"key":"ref5","first-page":"699","article-title":"Voltpillager: Hardware-based fault injection attacks against intel sgx enclaves using the svid voltage scaling interface","volume-title":"USENIX Security Symposium","author":"Chen","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"ref8","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neu-ral network inference","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"ref10","article-title":"F1: A fast and programmable accelerator for fully homomorphic encryption (extended version)","author":"Feldmann","year":"2021","journal-title":"arXiv preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247747"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-009-9009-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892281"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531761"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI51109.2021.00026"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3508352.3549437"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BIOCAS.2018.8584751"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116397"},{"key":"ref19","article-title":"Molehd: Drug discovery using brain-inspired hyperdi-mensional computing","author":"Ma","year":"2021","journal-title":"arXiv preprint"},{"key":"ref20","article-title":"Microsoft SEAL (release 4.1)","volume-title":"Microsoft Research, Redmond, WA","year":"2023"},{"key":"ref21","volume-title":"Faster CryptoNets: Leveraging sparsity for real-world encrypted inference","author":"Chou","year":"2018"},{"key":"ref22","volume-title":"Low latency privacy preserving inference","author":"Brutzkus","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300044"},{"key":"ref25","volume-title":"Tenseal: A library for encrypted tensor operations using homomorphic encryption","author":"Benaissa","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3472634.3472652"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3480958"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9473987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICRC.2017.8123650"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/biocas.2019.8918974"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474107"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586235"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218493"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICRC.2016.7738683"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2016.7838428"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12664"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3139318"}],"event":{"name":"2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,10,28]]},"end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323590\/10323543\/10323815.pdf?arnumber=10323815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T22:10:48Z","timestamp":1709417448000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/iccad57390.2023.10323815","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]}}}