{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:25:23Z","timestamp":1755926723526},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/mmsp55362.2022.9949982","type":"proceedings-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T16:39:16Z","timestamp":1669135156000},"page":"01-06","source":"Crossref","is-referenced-by-count":4,"title":["HEKWS: Privacy-Preserving Convolutional Neural Network-based Keyword Spotting with a Ciphertext Packing Technique"],"prefix":"10.1109","author":[{"given":"Daniel L.","family":"Elworth","sequence":"first","affiliation":[{"name":"University of Washington,Division of Engineering and Mathematics,Bothell,WA,USA,98011"}]},{"given":"Sunwoong","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Washington,Division of Engineering and Mathematics,Bothell,WA,USA,98011"}]}],"member":"263","reference":[{"journal-title":"Simple encrypted arithmetic library v2 3 0","year":"0","author":"chen","key":"ref33"},{"journal-title":"Deep Learning with Keras","year":"2017","author":"gulli","key":"ref32"},{"key":"ref31","article-title":"Speech Commands: A Dataset for Limited-vocabulary Speech Recognition","author":"warden","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref30","first-page":"2017\/035","article-title":"Privacy-preserving Classification on Deep Neural Network","author":"chabanne","year":"2017","journal-title":"Cryptology ePrint Archive"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3310132"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref14","article-title":"Somewhat Practical Fully Homomorphic Encryption","author":"fan","year":"2012","journal-title":"Cryptology ePrint Archive Report 2012\/144"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"journal-title":"AES proposal Rijndael","year":"1999","author":"daemen","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA52859.2021.00016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530338"},{"journal-title":"Microsoft SEAL (Release 3 6)","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462688"},{"key":"ref27","article-title":"Tensorflow: A System for Large-scale Machine Learning","author":"abadi","year":"0","journal-title":"Proc OSDI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854370"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-352"},{"journal-title":"PALISADE Lattice Cryptography Library (release 1 11 5)","year":"0","key":"ref29"},{"key":"ref5","article-title":"Honk: A Pytorch Reimplementation of Convolutional Neural Networks for Keyword Spotting","author":"tang","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1990.115555"},{"key":"ref7","article-title":"Hello Edge: Keyword Spotting on Microcontrollers","author":"zhang","year":"2017","journal-title":"ArXiv Preprint"},{"journal-title":"Why It's Critical to Keep IoT Security Top-of-Mind","year":"0","key":"ref2"},{"journal-title":"Voice User Interface Design","year":"2004","author":"cohen","key":"ref9"},{"journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach","year":"2011","author":"lee","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00017"},{"key":"ref22","article-title":"Cryptonets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy","author":"gilad-bachrach","year":"0","journal-title":"Proc ICML"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994793"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"ref26","article-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference","author":"juvekar","year":"0","journal-title":"Proc Usenix Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1"}],"event":{"name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","start":{"date-parts":[[2022,9,26]]},"location":"Shanghai, China","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9948698\/9948704\/09949982.pdf?arnumber=9949982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T14:54:42Z","timestamp":1670856882000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9949982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/mmsp55362.2022.9949982","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}