{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:10:31Z","timestamp":1764785431467,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4501500","2022YFB4501501"],"award-info":[{"award-number":["2022YFB4501500","2022YFB4501501"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030","62302360"],"award-info":[{"award-number":["U22B2030","62302360"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2023-ZDLGY-35"],"award-info":[{"award-number":["2023-ZDLGY-35"]}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2022JM-477","2023-JC-QN-0699"],"award-info":[{"award-number":["2022JM-477","2023-JC-QN-0699"]}]},{"DOI":"10.13039\/501100001321","name":"HUAWEI Research Fund","doi-asserted-by":"publisher","award":["TC20220429023"],"award-info":[{"award-number":["TC20220429023"]}],"id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3435493","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T19:20:34Z","timestamp":1722280834000},"page":"7335-7348","source":"Crossref","is-referenced-by-count":4,"title":["ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8948-9516","authenticated-orcid":false,"given":"Wei","family":"Xu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5853-633X","authenticated-orcid":false,"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4534-5670","authenticated-orcid":false,"given":"Yandong","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6886-8258","authenticated-orcid":false,"given":"Fengwei","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]},{"given":"Jiafeng","family":"Hua","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company, Beijing, China"}]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-7169","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3003468"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3029899"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954330"},{"issue":"6","key":"ref5","first-page":"1","article-title":"Application progress of SGX in trusted computing area","volume":"7","author":"Bo","year":"2021","journal-title":"Chin. J. Netw. Inf. Secur."},{"key":"ref6","article-title":"Toward scalable fully homomorphic encryption through light trusted computing assistance","author":"Wang","year":"2019","journal-title":"arXiv:1905.07766"},{"key":"ref7","first-page":"1155","article-title":"GPS: Integration of graphene, palisade, and SGX for large-scale aggregations of distributed data","volume-title":"Proc. IACR","author":"Takeshita"},{"key":"ref8","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Ohrimenko"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419420"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00077"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD55607.2022.00059"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3413630"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278683"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_34"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00013"},{"key":"ref17","article-title":"Chiron: Privacy-preserving machine learning as a service","author":"Hunt","year":"2018","journal-title":"arXiv:1803.05961"},{"key":"ref18","first-page":"557","article-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing","volume-title":"Proc. USENIX Secur. Symp.","author":"Lee"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831171"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623136"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3396384"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3376084"},{"key":"ref25","first-page":"1","article-title":"High performance convolutional neural networks for document processing","volume-title":"Proc. 10th Int. Workshop Frontiers Handwriting Recognit.","author":"Chellapilla"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"issue":"7","key":"ref27","first-page":"1","article-title":"Innovative technology for cpu based attestation and sealing","volume-title":"Proc. 2nd Int. Workshop Hardw. Architectural Support Secur. privacy","volume":"13","author":"Anati"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24173"},{"volume-title":"Intel(R) Software Guard Extensions SDK","year":"2019","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3263631"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3231785"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2913362"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262149"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_15"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0015"},{"key":"ref42","first-page":"809","article-title":"Cheetah: Lean and fast secure two-party deep neural network inference","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Security)","author":"Huang"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3287072"},{"key":"ref44","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10614182.pdf?arnumber=10614182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T17:32:27Z","timestamp":1723051947000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10614182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3435493","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}