{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:40:51Z","timestamp":1770918051966,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302050"],"award-info":[{"award-number":["62302050"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372121"],"award-info":[{"award-number":["62372121"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tdsc.2025.3597394","type":"journal-article","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T17:46:04Z","timestamp":1754934364000},"page":"7479-7494","source":"Crossref","is-referenced-by-count":1,"title":["XGT: Fast and Secure Decision Tree Training and Inference on GPUs"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5304-7975","authenticated-orcid":false,"given":"Qifan","family":"Wang","sequence":"first","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8124-6800","authenticated-orcid":false,"given":"Shujie","family":"Cui","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5027-1234","authenticated-orcid":false,"given":"Lei","family":"Zhou","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2105-8047","authenticated-orcid":false,"given":"Ye","family":"Dong","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6468-629X","authenticated-orcid":false,"given":"Jianli","family":"Bai","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7256-4049","authenticated-orcid":false,"given":"Yun Sing","family":"Koh","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6987-0803","authenticated-orcid":false,"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-60750-472-6-i"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2196\/18585"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0042"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2980192"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3517197"},{"key":"ref13","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Secur. Symp. (USENIX Secur. 16)","author":"Ohrimenko","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419420"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517391"},{"key":"ref16","first-page":"2147","article-title":"GForce: GPU-Friendly oblivious and rapid neural network inference","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur. 21)","author":"Ng","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00098"},{"key":"ref18","first-page":"827","article-title":"Piranha: A $\\lbrace${GPU$\\rbrace$} platform for secure computation","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur. 22)","author":"Watson","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom63139.2024.00118"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17760\/d20323955"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00047"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00063"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0011"},{"key":"ref28","first-page":"6435","article-title":"Squirrel: A scalable secure two-party computation framework for training gradient boosting decision tree","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur. 23)","author":"Lu","year":"2023"},{"key":"ref29","first-page":"1039","article-title":"Visor: Privacy-preserving video analytics as a cloud service","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Poddar","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0026"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3202916"},{"key":"ref32","volume-title":"C4. 5: Programs for Machine Learning","author":"Quinlan","year":"2014"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50032-3"},{"key":"ref35","article-title":"Cutlass","author":"Thakkar","year":"2023"},{"key":"ref36","first-page":"17","article-title":"SecretFlow-SPU: A performant and user-friendly framework for privacy-preserving machine learning","volume-title":"Proc. 2023 USENIX Annu. Tech. Conf. (USENIX ATC 23)","author":"Ma","year":"2023"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-419-0-615"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-017-5642-8"},{"key":"ref39","first-page":"6","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","volume-title":"7th Int. Proc. Int. Conf. Learn. Representations","author":"Tramer","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i17.17746"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_12"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3617232.3624855"},{"key":"ref48","article-title":"MIZAR: Boosting secure three-party deep learning with co-designed sign-bit extraction and GPU acceleration","author":"Dong","year":"2025","journal-title":"Cryptol. ePrint Arch."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0090"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2025.3559346"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00096"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM57956.2023.00015"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2679189"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517413"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3040012"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11242243\/11122265.pdf?arnumber=11122265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:00:37Z","timestamp":1763154037000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11122265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":53,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3597394","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}