{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T16:50:48Z","timestamp":1770483048663,"version":"3.49.0"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/mc.2025.3600630","type":"journal-article","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T20:54:35Z","timestamp":1770152075000},"page":"28-38","source":"Crossref","is-referenced-by-count":0,"title":["Trust, but Verify"],"prefix":"10.1109","volume":"59","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1345-8136","authenticated-orcid":false,"given":"Michael J.","family":"Yuan","sequence":"first","affiliation":[{"name":"Linux Foundation\/Cloud Native Computing Foundation, ByteTrade Labs, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6448-7702","authenticated-orcid":false,"given":"Carlos","family":"Lospoy","sequence":"additional","affiliation":[{"name":"Nolais &amp; Co\/Labs, New York, NY, USA"}]},{"given":"Sydney","family":"Lai","sequence":"additional","affiliation":[{"name":"Gaia Foundation, New York, NY, USA"}]},{"given":"James","family":"Snewin","sequence":"additional","affiliation":[{"name":"Eigen Labs, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4564-0402","authenticated-orcid":false,"given":"Ju","family":"Long","sequence":"additional","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A survey of large language models","author":"Zhao","year":"2025"},{"key":"ref2","article-title":"Performances are plateauing, lets make the leaderboard steep again","author":"Fourrier","year":"2024","journal-title":"HuggingFace"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3747588"},{"key":"ref4","volume-title":"GaiaNet: GenAI agent network","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670334"},{"key":"ref7","article-title":"Trust the process: Zero-knowledge machine learning to enhance trust in generative AI interactions","author":"Ganescu","year":"2024"},{"key":"ref8","article-title":"Evaluating the performance of the DeepSeek model in confidential computing environment","author":"Dong","year":"2025"},{"key":"ref9","article-title":"Confidential computing on NVIDIA H100 GPUs for secure and trustworthy AI","author":"Apsey","year":"2023","journal-title":"NVIDIA Developer Blog"},{"key":"ref10","article-title":"A cup of TEE, please. But how do we know its the right flavor?","year":"2025","journal-title":"Oasis"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.550"},{"key":"ref12","volume-title":"EigenLayer: The restaking collective","year":"2023"},{"key":"ref13","volume-title":"EIGEN: The universal intersubjective work token","year":"2024"},{"key":"ref14","volume-title":"Verifiable inference  Gaia Foundation.","year":"2025"},{"key":"ref15","article-title":"The Llama 3 herd of models","author":"Grattafiori","year":"2024"},{"key":"ref16","article-title":"Gemma: Open models based on Gemini research and technology","author":"Mesnard","year":"2024"},{"key":"ref17","volume-title":"Gaia nodes with long-term knowledge.","year":"2025"},{"key":"ref18","volume-title":"Paris."},{"key":"ref19","volume-title":"London.","year":"2025"},{"key":"ref20","article-title":"Nomic embed: Training a reproducible long context text embedder","author":"Nussbaum","year":"2025"},{"key":"ref21","volume-title":"Paris knowledge base","author":"Yuan","year":"2024"},{"key":"ref22","volume-title":"London knowledge base","author":"Yuan","year":"2024"},{"key":"ref23","article-title":"Qwen2 technical report","author":"Yang","year":"2024"},{"key":"ref24","volume-title":"What is EigenDA?","year":"2025"},{"key":"ref25","article-title":"Introducing verifiable agents on EigenLayer","year":"2025","journal-title":"EigenCloud"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2\/11370800\/11370980.pdf?arnumber=11370980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T20:48:30Z","timestamp":1770410910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11370980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":25,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mc.2025.3600630","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}