{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:37:29Z","timestamp":1729651049222,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966080","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:41:30Z","timestamp":1499722890000},"page":"1887-1894","source":"Crossref","is-referenced-by-count":0,"title":["Neural networks and the search for a quadratic residue detector"],"prefix":"10.1109","author":[{"given":"Michael","family":"Potter","sequence":"first","affiliation":[]},{"given":"Leon","family":"Reznik","sequence":"additional","affiliation":[]},{"given":"Stanislaw","family":"Radziszowski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cryptography Theory and Practice","year":"2006","author":"stinson","key":"ref10"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"ref11"},{"key":"ref12","article-title":"The generic hardness of subset membership problems under the factoring assumption","author":"jager","year":"2008","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/3-540-57332-1_36","article-title":"ch. Cryptography and machine learning","author":"rivest","year":"1993","journal-title":"Advances in Cryptology - ASIACRYPT '91 International Conference on the Theory and Application of Cryptology Fujiyosida Japan November 1991 Proceedings"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/174644.174647"},{"journal-title":"An Introduction to Cryptography","year":"2001","author":"mollin","key":"ref15"},{"journal-title":"Are &#x2018;strong&#x2019; primes needed for RSA","year":"2001","author":"rivest","key":"ref16"},{"key":"ref17","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"dowlin","year":"2016","journal-title":"Tech Rep"},{"key":"ref4","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume":"25","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref6","volume":"abs 1310 1531","author":"donahue","year":"2013","journal-title":"Decaf A Deep Convolutional Activation Feature for Generic Visual Recognition"},{"key":"ref5","volume":"abs 1411 1792","author":"yosinski","year":"2014","journal-title":"How transferable are features in deep neural networks?"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551274"},{"key":"ref7","volume":"abs 1403 6382","author":"razavian","year":"2014","journal-title":"CNN Features Off-the-shelf An Astounding Baseline for Recognition"},{"key":"ref2","volume":"abs 1509 1549","author":"lai","year":"2015","journal-title":"Giraffe Using deep reinforcement learning to play chess"},{"journal-title":"Elementary Number Theory and Its Applications","year":"2011","author":"rosen","key":"ref1"},{"key":"ref9","volume":"abs 1312 6184","author":"ba","year":"2013","journal-title":"Do Deep Nets Really Need to Be Deep?"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2017,5,14]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966080.pdf?arnumber=7966080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T10:17:19Z","timestamp":1569752239000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966080","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}