{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T06:47:48Z","timestamp":1773038868172,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,20]]},"DOI":"10.1109\/iwbf55382.2022.9794535","type":"proceedings-article","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T17:09:23Z","timestamp":1655140163000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Preserving Convolutional Neural Networks Using Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Tatjana","family":"Wingarz","sequence":"first","affiliation":[{"name":"Universit&#x00E4;t Hamburg,Hamburg,Germany"}]},{"given":"Marta","family":"Gomez-Barrero","sequence":"additional","affiliation":[{"name":"Hochschule Ansbach,Ansbach,Germany"}]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[{"name":"Hochschule Darmstadt,Darmstadt,Germany"}]},{"given":"Mathias","family":"Fischer","sequence":"additional","affiliation":[{"name":"Universit&#x00E4;t Hamburg,Hamburg,Germany"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/37343"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref12","article-title":"Faster cryptonets: Leveraging sparsity for real-world encrypted inference","author":"chou","year":"2018"},{"key":"ref13","article-title":"She: A fast and accurate deep neural network for encrypted data","author":"lou","year":"2019","journal-title":"NeurIPS"},{"key":"ref14","first-page":"2505","article-title":"Delphi: A cryptographic inference service for neural networks","author":"mishra","year":"2020","journal-title":"29th USENIX Security Symposium"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref16","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"fan","year":"2012","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref17","article-title":"Dorefa-net: Training low bitwidth convolutional neural networks with low bitwidth gradients","author":"zhou","year":"2016"},{"key":"ref18","article-title":"Cryptodl: Deep neural networks over encrypted data","author":"hesamifard","year":"2017"},{"key":"ref19","article-title":"Microsoft SEAL (release 3.5)","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"ref27","article-title":"Memory Management in Python","author":"golubin","year":"0"},{"key":"ref3","year":"2011","journal-title":"Information Technology - Security Techniques -Biometric Information Protection"},{"key":"ref6","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"ICML"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2009.5.2.041"},{"key":"ref8","article-title":"The alexnet moment for homomorphic encryption: Hcnn, the first homomorphic cnn on encrypted data with gpus","author":"badawi","year":"2018"},{"key":"ref7","first-page":"35","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"chabanne","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","year":"2018","journal-title":"Regulation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378372"},{"key":"ref1","author":"jain","year":"2007","journal-title":"Handbook of Biometrics"},{"key":"ref20","article-title":"SEAL-Python (release 3.3.2.1)","year":"2020"},{"key":"ref22","article-title":"Homomorphic encryption security standard","author":"albrecht","year":"2018","journal-title":"Tech Rep"},{"key":"ref21","article-title":"Simple encrypted arithmetic library 2.3. 1","author":"laine","year":"2017"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TPAMI.2005.92","article-title":"Acquiring linear subspaces for face recognition under variable lighting","volume":"27","author":"lee","year":"2005","journal-title":"IEEE PAMI"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/34.927464"},{"key":"ref26","article-title":"Memory Management in Python","author":"vantol","year":"2021"},{"key":"ref25","article-title":"Tensorpack","author":"wu","year":"2016"}],"event":{"name":"2022 International Workshop on Biometrics and Forensics (IWBF)","location":"Salzburg, Austria","start":{"date-parts":[[2022,4,20]]},"end":{"date-parts":[[2022,4,21]]}},"container-title":["2022 International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9794456\/9794465\/09794535.pdf?arnumber=9794535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T16:00:39Z","timestamp":1657555239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9794535\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,20]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iwbf55382.2022.9794535","relation":{},"subject":[],"published":{"date-parts":[[2022,4,20]]}}}