{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:29:04Z","timestamp":1769732944776,"version":"3.49.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Development and Library Implementation of Fully Homomorphic Machine Learning Algorithms Supporting Neural Network Learning Over Encrypted Data","award":["2020-0-00840"],"award-info":[{"award-number":["2020-0-00840"]}]},{"DOI":"10.13039\/100004358","name":"Samsung","doi-asserted-by":"publisher","award":["IO201209-07883-01"],"award-info":[{"award-number":["IO201209-07883-01"]}],"id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tdsc.2024.3448406","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T19:10:04Z","timestamp":1724872204000},"page":"1674-1685","source":"Crossref","is-referenced-by-count":10,"title":["Batch Inference on Deep Convolutional Neural Networks With Fully Homomorphic Encryption Using Channel-By-Channel Convolutions"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7085-2220","authenticated-orcid":false,"given":"Jung Hee","family":"Cheon","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2125-5043","authenticated-orcid":false,"given":"Minsik","family":"Kang","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9947-0377","authenticated-orcid":false,"given":"Taeseong","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6118-5933","authenticated-orcid":false,"given":"Junyoung","family":"Jung","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3826-4636","authenticated-orcid":false,"given":"Yongdong","family":"Yeo","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3014636"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3287564"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref6","first-page":"12403","article-title":"Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions","volume-title":"Proc. 39th Int. Conf. Mach. Learn.","author":"Lee"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3263631"},{"key":"ref8","first-page":"1","article-title":"CryptoDL: Towards deep learning over encrypted data","volume-title":"Proc. Annu. Comput. Secur. Appl. Conf.","author":"Hesamifard"},{"key":"ref9","article-title":"Faster cryptonets: Leveraging sparsity for real-world encrypted inference","author":"Chou","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"ref12","article-title":"Amazon personalize - developer guide; Getting batch recommendations and user segments","year":"2023"},{"key":"ref13","first-page":"36","article-title":"Hierarchical Galois key management systems for privacy preserving AIaaS with homomorphic encryption","author":"Lee","year":"2023","journal-title":"Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secur."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref19","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Conf. Secur. Symp.","author":"Juvekar"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref21","first-page":"218","article-title":"How to play any mental game","volume-title":"Proc. 19th ACM Symp. Theory Comput.","author":"Micali"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179483"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref25","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptol. ePrint Arch."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref27","first-page":"812","article-title":"Low latency privacy preserving inference","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Brutzkus"},{"key":"ref28","first-page":"2364","article-title":"Falcon: Fast spectral inference on encrypted data","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lou"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419418"},{"key":"ref30","first-page":"2147","article-title":"Gforce:GPU-friendly oblivious and rapid neural network inference","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Ng"},{"key":"ref31","first-page":"809","article-title":"Cheetah: Lean and fast secure two-party deep neural network inference","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Huang"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS59296.2023.10224890"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"ref34","first-page":"4490","article-title":"TAPAS: Tricks to accelerate (encrypted) prediction as a service","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sanyal"},{"key":"ref35","first-page":"1","article-title":"SHE: A fast and accurate deep neural network for encrypted data","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Lou"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95312-6_6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560696"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623086"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38551-3_3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-32168-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00086"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06944-4_19"},{"key":"ref45","article-title":"FHE-MP-CNN","year":"2022"},{"key":"ref46","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref47","article-title":"HEaaN","year":"2022"},{"key":"ref48","article-title":"Microsoft seal (release 4.1.1)","year":"2023"},{"key":"ref49","article-title":"Lattigo","year":"2022"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10925471\/10654756.pdf?arnumber=10654756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T21:20:34Z","timestamp":1742246434000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10654756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3448406","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}