{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:52:45Z","timestamp":1730292765463,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,19]]},"DOI":"10.1109\/rivf51545.2021.9642089","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T16:08:09Z","timestamp":1640102889000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secure Inference via Deep Learning as a Service without Privacy Leakage"],"prefix":"10.1109","author":[{"given":"Anh-Tu","family":"Tran","sequence":"first","affiliation":[]},{"given":"The-Dung","family":"Luong","sequence":"additional","affiliation":[]},{"given":"Cong-Chieu","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Duc-Tho","family":"Hoang","sequence":"additional","affiliation":[]},{"given":"Thi-Luong","family":"Tran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2017.07.005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106384"},{"key":"ref12","article-title":"A survey on deep learning: Algorithms, techniques, and applications","volume":"51","author":"pouyanfar","year":"2018","journal-title":"ACM Comput Surv"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEET.2012.6203873"},{"key":"ref14","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"dowlin","year":"2016","journal-title":"Tech Rep MSR-TR-2016-3"},{"journal-title":"Faster CryptoNets Leveraging sparsity for real-world encrypted inference","year":"2018","author":"chou","key":"ref15"},{"key":"ref16","first-page":"35","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"chabanne","year":"2017","journal-title":"IACR Cryptology"},{"journal-title":"CryptoDL Deep neural networks over encrypted data","year":"2017","author":"hesamifard","key":"ref17"},{"journal-title":"Tapas Tricks to accelerate (encrypted) prediction as a service","year":"2018","author":"sanyal","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94463-0"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"37i","DOI":"10.1093\/bioinformatics\/btx228","article-title":"Deep learning with word embeddings improves biomedical named entity recognition","volume":"33","author":"habibi","year":"2017","journal-title":"Bioinformatics"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00104"},{"key":"ref6","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume":"28","author":"zhang","year":"2015","journal-title":"Advances in neural information processing systems"},{"year":"0","key":"ref29","article-title":"Covid-19 image dataset"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbw068"},{"key":"ref8","first-page":"1","article-title":"A survey of the usages of deep learning for natural language processing","author":"otter","year":"2020","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref7","first-page":"855","article-title":"Node2vec: Scalable feature learning for networks","author":"grover","year":"0"},{"key":"ref2","article-title":"Rethinking the inception architecture for computer vision","volume":"abs 1512 567","author":"szegedy","year":"2015","journal-title":"CoRR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.02.056"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref24","first-page":"1651","article-title":"{GAZELLE}: A low latency framework for secure neural network inference","author":"juvekar","year":"0","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553453"},{"article-title":"Securenn: Efficient and private neural network training","year":"0","author":"wagh","key":"ref25"}],"event":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","start":{"date-parts":[[2021,8,19]]},"location":"Hanoi, Vietnam","end":{"date-parts":[[2021,8,21]]}},"container-title":["2021 RIVF International Conference on Computing and Communication Technologies (RIVF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9642022\/9642065\/09642089.pdf?arnumber=9642089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:54:55Z","timestamp":1652187295000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9642089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,19]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/rivf51545.2021.9642089","relation":{},"subject":[],"published":{"date-parts":[[2021,8,19]]}}}