{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:54:53Z","timestamp":1778345693276,"version":"3.51.4"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2024YFB3108700"],"award-info":[{"award-number":["2024YFB3108700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372195"],"award-info":[{"award-number":["62372195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62462054"],"award-info":[{"award-number":["62462054"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62166047"],"award-info":[{"award-number":["62166047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation Project of Jiangxi Province","award":["20232BAB202007"],"award-info":[{"award-number":["20232BAB202007"]}]},{"DOI":"10.13039\/501100001809","name":"CCF-Huawei Populus Grove Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3526063","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T19:17:36Z","timestamp":1735931856000},"page":"1149-1162","source":"Crossref","is-referenced-by-count":41,"title":["Panther: Practical Secure Two-Party Neural Network Inference"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9917-1819","authenticated-orcid":false,"given":"Jun","family":"Feng","sequence":"first","affiliation":[{"name":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Yefan","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hainan University, Haikou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9578-5688","authenticated-orcid":false,"given":"Hong","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Economics, Wuhan Textile University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7139-9974","authenticated-orcid":false,"given":"Shunli","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5233-9637","authenticated-orcid":false,"given":"Debin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Artificial Intelligence, Zhengzhou University, Zhengzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10450-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3368048"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3236868"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP60621.2024.00031"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3446759"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3474969"},{"key":"ref7","first-page":"201","article-title":"CRYPTONETS: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3435493"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref10","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp. (USENIX Secur.)","author":"Juvekar"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419418"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref13","first-page":"809","article-title":"Cheetah: Lean and fast secure Two-Party deep neural network inference","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Huang"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1602.07360"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623136"},{"key":"ref18","article-title":"Fully homomorphic encryption without bootstrapping","author":"Brakerski","year":"2011","journal-title":"Cryptol. ePrint Arch., Paper"},{"key":"ref19","first-page":"2165","article-title":"ABY2.0: Improved mixed-protocol secure two-party computation","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Patra"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00086"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00063"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530680"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3262149"},{"key":"ref24","first-page":"177","article-title":"CryptoDL: Predicting dyslexia biomarkers from encrypted neuroimaging dataset using energy-efficient residue number system and deep convolutional neural network","volume-title":"Proc. ACSAC","author":"Usman"},{"key":"ref25","first-page":"812","article-title":"Low latency privacy preserving inference","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Brutzkus"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref28","article-title":"RRNet: Towards ReLU-reduced neural network for two-party computation based private inference","author":"Peng","year":"2023","journal-title":"arXiv:2302.02292"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.118966"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0109"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0107"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465894"},{"key":"ref34","first-page":"1501","article-title":"XONN: XNOR-based oblivious deep neural network inference","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Secur.)","author":"Riazi"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17143-7_14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265342"},{"key":"ref38","first-page":"15718","article-title":"Iron: Private inference on transformers","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hao"},{"key":"ref39","article-title":"CipherGPT: Secure two-party GPT inference","author":"Hou","year":"2023","journal-title":"Cryptol. ePrint Arch., Paper"},{"key":"ref40","article-title":"BOLT: Privacy-preserving, accurate and efficient inference for transformers","author":"Pang","year":"2023","journal-title":"Cryptol. ePrint Arch., Paper"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833697"},{"key":"ref43","first-page":"6329","article-title":"Secure floating-point training","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur.)","author":"Rathee"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583272"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref46","first-page":"35","article-title":"ABY3: A mixed protocol framework for machine learning","volume-title":"Proc. 218 ACM SIGSAC Conf. Comput. Commun.","author":"Mohassel"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0077"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00098"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0011"},{"key":"ref51","first-page":"4961","article-title":"CrypTen: Secure multi-party computation meets machine learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Knott"},{"key":"ref52","first-page":"2651","article-title":"SWIFT: Super-fast and robust privacy-preserving machine learning","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Koti"},{"key":"ref53","first-page":"2183","article-title":"Fantastic Four: Honest-majority four-party secure computation with malicious security","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Secur.)","author":"Dalskov"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417276"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84252-9_17"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2881452"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.180-201"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10824864.pdf?arnumber=10824864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:43:53Z","timestamp":1737398633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10824864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3526063","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}