{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T22:40:49Z","timestamp":1769640049054,"version":"3.49.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,5]]},"DOI":"10.1109\/iscc53001.2021.9631509","type":"proceedings-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T20:46:50Z","timestamp":1639601210000},"page":"1-7","source":"Crossref","is-referenced-by-count":14,"title":["Blind Faith: Privacy-Preserving Machine Learning using Function Approximation"],"prefix":"10.1109","author":[{"given":"Tanveer","family":"Khan","sequence":"first","affiliation":[{"name":"Tampere University,Department of Computing Sciences,Tampere,Finland"}]},{"given":"Alexandros","family":"Bakas","sequence":"additional","affiliation":[{"name":"Tampere University,Department of Computing Sciences,Tampere,Finland"}]},{"given":"Antonis","family":"Michalas","sequence":"additional","affiliation":[{"name":"Tampere University,Department of Computing Sciences,Tampere,Finland"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00146"},{"key":"ref38","first-page":"111","article-title":"(f) unctional sifting: A privacy-preserving reputation system through multi-input functional encryption","author":"bakas","year":"2020","journal-title":"Secure IT Systems 25th Nordic Conference NordSec 2020 Virtual Event"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"ref32","author":"lecun","year":"2010","journal-title":"MNIST Handwritten Digit Database"},{"key":"ref31","author":"hesamifard","year":"2017","journal-title":"CryptoDL Deep neural networks over encrypted data"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"ref36","year":"2019","journal-title":"Microsoft seal (release 3 2)"},{"key":"ref35","article-title":"On the coefficients of cyclotomic polynomials","author":"thangadurai","year":"2000","journal-title":"Cyclotomic fields and related topics (Pune 1999)"},{"key":"ref34","author":"schlessman","year":"2002","journal-title":"Approximation of the sigmoid function and its derivative using a minimax approach"},{"key":"ref10","author":"thaine","year":"0","journal-title":"Perfectly Privacy-Preserving AI"},{"key":"ref11","author":"garge","year":"2018","journal-title":"Neural networks for encrypted data using homomorphic encryption"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267974"},{"key":"ref13","article-title":"Cryptodl: towards deep learning over encrypted data","author":"hesamifard","year":"2016","journal-title":"Annual Computer Security Applications Conference"},{"key":"ref14","first-page":"35","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"chabanne","year":"2017","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref15","author":"chou","year":"2018","journal-title":"Faster CryptoNets Leveraging sparsity for real-world encrypted inference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315306"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0073-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2622218"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref3","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"ref6","author":"cloud","year":"0","journal-title":"Google Prediction API"},{"key":"ref5","article-title":"Secure signal processing using fully homomorphic encryption","author":"shortell","year":"2019","journal-title":"1ET Information Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.058"},{"key":"ref8","author":"labs","year":"0","journal-title":"Ersatz labs"},{"key":"ref7","author":"azure","year":"0","journal-title":"Azure Machine Learning"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2014.7001843"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.05.079"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref22","article-title":"Privacy-preservation for stochastic gradient descent application to secure logistic regression","author":"wu","year":"2013","journal-title":"The 27th Annual Conference of the Japanese Society for Artificial Intelligence"},{"key":"ref21","first-page":"1651","article-title":"{GAZELLE}: A low latency framework for secure neural network inference","author":"juvekar","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref24","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref23","first-page":"1","article-title":"M1 confidential: Machine learning on encrypted data","author":"graepel","year":"2012","journal-title":"International Conference on Information Security and Cryptology"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","article-title":"The use of multiple measurements in taxonomic problems","volume":"7","author":"fisher","year":"1936","journal-title":"Annals of Eugenics"},{"key":"ref25","author":"duda","year":"2006","journal-title":"Pattern Classification"}],"event":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","location":"Athens, Greece","start":{"date-parts":[[2021,9,5]]},"end":{"date-parts":[[2021,9,8]]}},"container-title":["2021 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631377\/9631248\/09631509.pdf?arnumber=9631509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T22:59:39Z","timestamp":1659481179000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,5]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/iscc53001.2021.9631509","relation":{},"subject":[],"published":{"date-parts":[[2021,9,5]]}}}