{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:59:09Z","timestamp":1774025949650,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T00:00:00Z","timestamp":1718064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T00:00:00Z","timestamp":1718064000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,11]]},"DOI":"10.1109\/meco62516.2024.10577883","type":"proceedings-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T17:26:54Z","timestamp":1720027614000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity"],"prefix":"10.1109","author":[{"given":"Jose Luis","family":"Cano Garcia","sequence":"first","affiliation":[{"name":"Kadir Has University,T&#x00FC;rkiye"}]},{"given":"Izuchukwu","family":"Patrick Udechukwu","sequence":"additional","affiliation":[{"name":"Kadir Has University,T&#x00FC;rkiye"}]},{"given":"Isiaq Bolaji","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Kadir Has University,T&#x00FC;rkiye"}]},{"given":"Ikechukwu","family":"John Chukwu","sequence":"additional","affiliation":[{"name":"Kadir Has University,T&#x00FC;rkiye"}]},{"given":"Hasan","family":"Da\u011f","sequence":"additional","affiliation":[{"name":"Kadir Has University,T&#x00FC;rkiye"}]},{"given":"Vesna","family":"Dimitrova","sequence":"additional","affiliation":[{"name":"Cyril and Methodius University,North Macedonia"}]},{"given":"Elissa","family":"Mollakuqe","sequence":"additional","affiliation":[{"name":"Kadir Has University,T&#x00FC;rkiye"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1615","article-title":"Turning your weakness into a strength: watermarking deep neural networks by backdooring","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918)","author":"Adi"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2023.1226990"},{"key":"ref3","first-page":"I-647","article-title":"DeCAF: a deep convolutional activation feature for generic visual recognition","volume-title":"Proceedings of the 31st International Conference on International Conference on Machine Learning - Volume 32 (ICML\u201914)","author":"Donahue"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2006.246654"},{"key":"ref5","first-page":"549","article-title":"Firke and Ranjan Bala Jain. 2021. Convolutional Neural Network for Diabetic Retinopathy Detection","volume-title":"2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS)","author":"N"},{"key":"ref6","first-page":"201","article-title":"CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy","volume-title":"Proceedings of The 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research)","author":"Gilad-Bachrach","year":"2016"},{"key":"ref7","volume-title":"Single Cloud TPU Device Pricing","year":"2024"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The elements of statistical learning: data mining, inference and prediction","author":"Hastie","year":"2009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196105"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-7138-7","volume-title":"An Introduction to Statistical Learning: with Applications in R","author":"James","year":"2013"},{"key":"ref11","article-title":"Approximate Homomorphic Encryption with Reduced Approximation Error. Cryptology ePrint Archive","author":"Kim","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010749"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2020.3018403"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.03.153"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s22176662"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016911203"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.081141"},{"key":"ref18","article-title":"Neural Networks and Deep Learning","author":"Nielsen","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/asru.2013.6707749"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/bdicn55575.2022.00043"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.aasri.2014.05.013"},{"key":"ref22","article-title":"Deep Neural Networks for Object Detection","volume-title":"Advances in Neural Information Processing Systems","author":"Szegedy","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/inista.2017.8001188"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/wcsp.2016.7752726"},{"key":"ref25","article-title":"Stochastic Pooling for Regularization of Deep Convolutional Neural Networks","author":"Zeiler","year":"2013","journal-title":"In: ICLR"},{"key":"ref26","first-page":"7","article-title":"Derivation of Backpropagation in Convolutional Neural Network (CNN)","author":"Zhang","year":"2016"}],"event":{"name":"2024 13th Mediterranean Conference on Embedded Computing (MECO)","location":"Budva, Montenegro","start":{"date-parts":[[2024,6,11]]},"end":{"date-parts":[[2024,6,14]]}},"container-title":["2024 13th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10577658\/10577767\/10577883.pdf?arnumber=10577883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T05:35:17Z","timestamp":1720330517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10577883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/meco62516.2024.10577883","relation":{},"subject":[],"published":{"date-parts":[[2024,6,11]]}}}