{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:00:08Z","timestamp":1776106808467,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61825203"],"award-info":[{"award-number":["61825203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Plan of China","doi-asserted-by":"publisher","award":["2020YFB1005600"],"award-info":[{"award-number":["2020YFB1005600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Program of Guangdong Basic and Applied Research Project","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"name":"Guangdong Provincial Science and Technology Project","award":["2021A0505030033"],"award-info":[{"award-number":["2021A0505030033"]}]},{"name":"National Joint Engineering Research Center of Network Security Detection and Protection Technology"},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving"},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B0101090004"],"award-info":[{"award-number":["2020B0101090004"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B0101360001"],"award-info":[{"award-number":["2020B0101360001"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021ZD0112802"],"award-info":[{"award-number":["2021ZD0112802"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072215"],"award-info":[{"award-number":["62072215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102166"],"award-info":[{"award-number":["62102166"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032025"],"award-info":[{"award-number":["62032025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Science and Technology Project","award":["2020A1515111175"],"award-info":[{"award-number":["2020A1515111175"]}]},{"name":"Science and Technology Major Project of Tibet Autonomous Region","award":["XZ202201ZD0006G"],"award-info":[{"award-number":["XZ202201ZD0006G"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102165"],"award-info":[{"award-number":["62102165"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3262932","type":"journal-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T19:00:12Z","timestamp":1680116412000},"page":"2218-2233","source":"Crossref","is-referenced-by-count":42,"title":["pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5876-7875","authenticated-orcid":false,"given":"Jiasi","family":"Weng","sequence":"first","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"given":"Gui","family":"Tang","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7958-6571","authenticated-orcid":false,"given":"Anjia","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0874-5010","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3140-2320","authenticated-orcid":false,"given":"Jia-Nan","family":"Liu","sequence":"additional","affiliation":[{"name":"Pazhou Laboratory, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850320"},{"key":"ref3","volume-title":"A Google Self-Driving Car Caused a Crash for the First Time","year":"2016"},{"key":"ref4","volume-title":"The Two-Year Fight to Stop Amazon From Selling Face Recognition to the Police","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89960-2_22"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00041"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238202"},{"key":"ref8","first-page":"1","article-title":"Benchmarking neural network robustness to common corruptions and perturbations","volume-title":"Proc. ICLR","author":"Hendrycks"},{"key":"ref9","volume-title":"Uncovering Unknown Unknowns in Machine Learning","author":"Aroyo","year":"2021"},{"key":"ref10","first-page":"1","article-title":"SafetyNets: Verifiable execution of deep neural networks on an untrusted cloud","volume-title":"Proc. NIPS","author":"Ghodsi"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VTS48691.2020.9107564"},{"key":"ref12","volume-title":"vCNN: Verifiable Convolutional Neural Network","author":"Lee","year":"2020"},{"key":"ref13","volume-title":"ZEN: An Optimizing Compiler for Verifiable, Zero-Knowledge Neural Network Inferences","author":"Feng","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3068195"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61638-0_17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485379"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339820"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3074869"},{"key":"ref24","volume-title":"BVLC\/Caffe","year":"2019"},{"key":"ref25","volume-title":"Data Science Competition Platform","year":"2010"},{"key":"ref26","volume-title":"Machine Learning Solutions"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359824"},{"key":"ref29","first-page":"1","article-title":"Partially encrypted machine learning using functional encryption","volume-title":"Proc. NIPS","author":"Ryffel"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref31","author":"Alesiani","year":"2021","journal-title":"Method for Verifying Information"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_10"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484767"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2699436"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3035591"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417278"},{"key":"ref37","first-page":"501","article-title":"Mystique: Efficient conversions for zero-knowledge proofs with applications to machine learning","volume-title":"Proc. USENIX Security","author":"Weng"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23199"},{"key":"ref39","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. ICML","author":"Gilad-Bachrach"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419418"},{"key":"ref42","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. USENIX Security","author":"Juvekar"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2913362"},{"key":"ref45","article-title":"CryptoDL: Deep neural networks over encrypted data","author":"Hesamifard","year":"2017","journal-title":"arXiv:1711.05189"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573770"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536601"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2816656"},{"key":"ref49","volume-title":"Quadratic Span Programs and Succinct NIZKs Without PCPs","author":"Gennaro","year":"2012"},{"key":"ref50","volume-title":"Somewhat Practical Fully Homomorphic Encryption","author":"Fan","year":"2012"},{"key":"ref51","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv:1712.05526"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427232"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00486"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3106169"},{"key":"ref55","first-page":"1","article-title":"Cache telepathy: Leveraging shared resource attacks to learn DNN architectures","volume-title":"Proc. USENIX Security","author":"Yan"},{"key":"ref56","first-page":"1379","article-title":"MIRAGE: Mitigating conflict-based cache attacks with a practical fully-associative design","volume-title":"Proc. USENIX Security","author":"Saileshwar"},{"key":"ref57","first-page":"765","article-title":"TRUESET: Faster verifiable set computations","volume-title":"Proc. USENIX Security","author":"Kosba"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10086653.pdf?arnumber=10086653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:19:16Z","timestamp":1709457556000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10086653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3262932","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}