{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:48:11Z","timestamp":1767084491458,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Shanghai Key Laboratory of Scalable Computing and Systems;"},{"name":"Internet of Things Special Subject Program;"},{"name":"China Institute of loT"},{"name":"Wuxi loT Innovation Promotion Center;"},{"name":"Eighth Research Institute of China Aerospace Science and Technology Group Co., Ltd","award":["USCAST2022-17"],"award-info":[{"award-number":["USCAST2022-17"]}]},{"name":"Jiangsu Key Laboratory of Media Design and Software Technology, Jiangnan University, through the Open Project","award":["21ST0101"],"award-info":[{"award-number":["21ST0101"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tcss.2023.3262289","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T17:39:28Z","timestamp":1680802768000},"page":"3012-3020","source":"Crossref","is-referenced-by-count":10,"title":["GUARDIAN: A Hardware-Assisted Distributed Framework to Enhance Deep Learning Security"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9373-8474","authenticated-orcid":false,"given":"Zinuo","family":"Cai","sequence":"first","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Bojun","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9592-8490","authenticated-orcid":false,"given":"Ruhui","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4714-7400","authenticated-orcid":false,"given":"Haibing","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4849-5535","authenticated-orcid":false,"given":"Mengke","family":"Tian","sequence":"additional","affiliation":[{"name":"Beijing Microelectronics Technology Institute, Beijing, China"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Microelectronics Technology Institute, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01431160600746456"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2023.3238524"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1177352.1177355"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1253"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tcbb.2022.3188148"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3549939"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.11.028"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/83"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2200\/s00960ed2v01y201910aim043"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref14","first-page":"374","article-title":"Towards federated learning at scale: System design","volume-title":"Proc. Mach. Learn. Syst.","volume":"1","author":"Bonawitz"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3486990"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8_2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898027"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363205"},{"key":"ref21","first-page":"1","article-title":"Intel SGX explained","volume":"2016","author":"Costan","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref22","first-page":"645","article-title":"Graphene-SGX: A practical Library OS for unmodified applications on SGX","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Tsai"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"volume-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"ref29","article-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and0.5MB model size","author":"Iandola","year":"2016","journal-title":"arXiv:1602.07360"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415530"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741965"},{"key":"ref32","article-title":"Measuring the effects of data parallelism on neural network training","author":"Shallue","year":"2018","journal-title":"arXiv:1811.03600"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00216"},{"key":"ref34","article-title":"Megatron-LM: Training multi-billion parameter language models using model parallelism","author":"Shoeybi","year":"2019","journal-title":"arXiv:1909.08053"},{"key":"ref35","first-page":"1","article-title":"GPipe: Efficient training of giant neural networks using pipeline parallelism","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Huang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359646"},{"key":"ref37","first-page":"1","article-title":"Communication efficient distributed machine learning with the parameter server","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Li"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_17"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3394658"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref43","article-title":"Cloud programming simplified: A Berkeley view on serverless computing","author":"Jonas","year":"2019","journal-title":"arXiv:1902.03383"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5026-8_1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3508360"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JCC49151.2020.00023"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"ref49","first-page":"1","article-title":"Scalable memory protection in the PENGLAI enclave","volume-title":"Proc. USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Feng"},{"key":"ref50","first-page":"1","article-title":"SCONE: Secure Linux containers with Intel SGX","volume-title":"Proc. USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Arnautov"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-9096-y"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3384217.3386399"},{"key":"ref53","first-page":"1","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. USENIX Secur. Symp. (USENIX Security)","author":"Ohrimenko"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064219"},{"key":"ref55","article-title":"TensorSCONE: A secure tensorflow framework using Intel SGX","author":"Kunkel","year":"2019","journal-title":"arXiv:1902.04413"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10352175\/10093889.pdf?arnumber=10093889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:08:32Z","timestamp":1705021712000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10093889\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":55,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2023.3262289","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}