{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:55:09Z","timestamp":1775667309645,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T00:00:00Z","timestamp":1666137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,19]]},"DOI":"10.1109\/kse56063.2022.9953624","type":"proceedings-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T21:25:53Z","timestamp":1669065953000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Experimental Evaluation of Homomorphic Encryption in Cloud and Edge Machine Learning"],"prefix":"10.1109","author":[{"given":"Joe","family":"Hrzich","sequence":"first","affiliation":[{"name":"University of Winnipeg,Manitoba,Canada"}]},{"given":"Gunjan","family":"Basra","sequence":"additional","affiliation":[{"name":"University of Winnipeg,Manitoba,Canada"}]},{"given":"Talal","family":"Halabi","sequence":"additional","affiliation":[{"name":"Laval University,Quebec,Canada"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103215"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3185327"},{"key":"ref32","first-page":"1","article-title":"A hypercuboid-based machine learning algorithm for malware classification","author":"nguyen","year":"2021","journal-title":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2793998"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.003"},{"key":"ref36","first-page":"17","article-title":"Privacy preserving naive bayes classifier for horizontally partitioned data using secure division","volume":"11","author":"maradithaya","year":"6","journal-title":"International Journal of Network Security & Its Applications"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103635"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49049-6_29"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284566"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7752292"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app12020734"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131372"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44038-1_99"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5626\/JCSE.2015.9.3.119"},{"key":"ref18","first-page":"115","article-title":"A survey on privacy-preserving machine learning with fully homomorphic encryption","author":"pulido-gaytan","year":"2020","journal-title":"Latin American High Performance Computing Conference"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3575","DOI":"10.21817\/ijet\/2017\/v9i5\/170905312","article-title":"An overview of cryptanalysis of rsa public key system","volume":"9","author":"kulandei","year":"2017","journal-title":"International Journal of Engineering and Technology"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1206-1565"},{"key":"ref4","article-title":"A survey on security and privacy issues in edge computing-assisted internet of things","author":"alwarafy","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref27","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01778-6"},{"key":"ref6","first-page":"1","article-title":"Amazon sage-maker autopilot: a white box automl solution at scale","author":"das","year":"2020","journal-title":"Proceedings of the Fourth International Workshop on Data Management for Endto- End Machine Learning"},{"key":"ref29","article-title":"Support vector machine &#x2014; introduction to machine learning algorithms svm model from scratch","volume":"6","author":"gandhi","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/computers8020035"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/mca24040092"},{"key":"ref2","first-page":"2191","article-title":"Edge-cloud computing for internet of things data analytics: Embedding intelligence in the edge with deep learning","volume":"17","author":"ghosh","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63924-2_21"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.12.020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref45","article-title":"UCI machine learning repository","author":"dua","year":"2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AITC.2019.8921088"},{"key":"ref24","article-title":"6 easy steps to learn naive bayes algorithm with codes in python and r","volume":"9","author":"ray","year":"2017"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"104898","DOI":"10.1016\/j.engappai.2022.104898","article-title":"Value-based reinforcement learning approaches for task offloading in delay constrained vehicular edge computing","volume":"113","author":"binh","year":"2022","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"ref23","article-title":"What are the benefits of machine learning in the cloud?","volume":"8","author":"hummel","year":"2018"},{"key":"ref44","article-title":"Python paillier library","year":"2013"},{"key":"ref26","article-title":"Introduction to logistic regression","volume":"1","author":"pant","year":"2019"},{"key":"ref43","article-title":"Tenseal: A library for encrypted tensor operations using homomorphic encryption","author":"benaissa","year":"2021"},{"key":"ref25","article-title":"Decision tree classification n introduction to decision tree classifier","volume":"7","author":"ckakure","year":"2019"}],"event":{"name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","location":"Nha Trang, Vietnam","start":{"date-parts":[[2022,10,19]]},"end":{"date-parts":[[2022,10,21]]}},"container-title":["2022 14th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9953734\/9953612\/09953624.pdf?arnumber=9953624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:52:45Z","timestamp":1670874765000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9953624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,19]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/kse56063.2022.9953624","relation":{},"subject":[],"published":{"date-parts":[[2022,10,19]]}}}