{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:03:15Z","timestamp":1775638995955,"version":"3.50.1"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802412"],"award-info":[{"award-number":["61802412"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2021,9,1]]},"DOI":"10.1109\/tpds.2021.3059108","type":"journal-article","created":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T20:55:36Z","timestamp":1613163336000},"page":"2262-2276","source":"Crossref","is-referenced-by-count":39,"title":["An Efficient Parallel Secure Machine Learning Framework on GPUs"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1983-7321","authenticated-orcid":false,"given":"Feng","family":"Zhang","sequence":"first","affiliation":[{"name":"Key Laboratory of Data Engineering and Knowledge Engineering (MOE), and the School of Information, Renmin University of China, Beijing, China"}]},{"given":"Zheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data Engineering and Knowledge Engineering (MOE), and the School of Information, Renmin University of China, Beijing, China"}]},{"given":"Chenyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data Engineering and Knowledge Engineering (MOE), and the School of Information, Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8343-2367","authenticated-orcid":false,"given":"Amelie Chi","family":"Zhou","sequence":"additional","affiliation":[{"name":"Guangdong Province Engineering Center of China-Made High Performance Data Computing System, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7656-6428","authenticated-orcid":false,"given":"Jidong","family":"Zhai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"given":"Xiaoyong","family":"Du","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data Engineering and Knowledge Engineering (MOE), and the School of Information, Renmin University of China, Beijing, China"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-019-00100-5"},{"key":"ref72","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0446-0"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/2304764"},{"key":"ref38","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2908175"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.01.013"},{"key":"ref31","article-title":"Fairplay-secure two-party computation system","author":"malkhi","year":"2004","journal-title":"Proc Usenix Secur Symp"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3021084"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2766-4_12"},{"key":"ref35","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"Proc 12th USENIX Conf Operating Syst Des Implementation"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3343737.3343745"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2016.45"},{"key":"ref62","article-title":"Similarity learning with higher-order proximity for brain network analysis","author":"ma","year":"2018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-013-0241-1"},{"key":"ref28","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref63","first-page":"53","article-title":"OO-VR: NUMA friendly object-oriented VR rendering framework for future NUMA-based multi-GPU systems","author":"xie","year":"2019","journal-title":"Proc 46th Int Symp Comput Archit"},{"key":"ref27","article-title":"Nist special database 4","volume":"17","author":"watson","year":"1992","journal-title":"Fingerprint Database Nat'l Inst of Standards and Technology"},{"key":"ref64","year":"2008"},{"key":"ref65","article-title":"Arcene data set","author":"guyon","year":"2004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2975652"},{"key":"ref66","article-title":"Secure multi-party computation","author":"goldreich","year":"1998"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_12"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0177-2"},{"key":"ref2","year":"2020"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy090"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/72.159058"},{"key":"ref22","author":"kleinbaum","year":"2002","journal-title":"Logistic Regression"},{"key":"ref21","volume":"936","author":"seber","year":"2012","journal-title":"Linear Regression Analysis"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"ref23","first-page":"1045","article-title":"Recurrent neural network based language model","author":"mikolov","year":"2010","journal-title":"Proc 11th Annu Conf Int Speech Commun Assoc"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref25","article-title":"The MNIST database of handwritten digits","author":"lecun","year":"1998"},{"key":"ref50","year":"2020"},{"key":"ref51","article-title":"MXNet: A flexible and efficient machine learning library for heterogeneous distributed systems","author":"chen","year":"2015"},{"key":"ref59","article-title":"ImageNet\/ResNet-50 training in 224 seconds","author":"mikami","year":"2018"},{"key":"ref58","article-title":"Towards the first adversarially robust neural network model on MNIST","author":"schott","year":"2018"},{"key":"ref57","first-page":"188","article-title":"Automated fingerprint identification system (AFIS) benchmarking using the national institute of standards and technology (NIST) special database 4","author":"shen","year":"1994","journal-title":"Proc IEEE Int Carnahan Conf Secur Technol"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30754-7_3"},{"key":"ref55","first-page":"997","article-title":"Fast training support vector machines using parallel sequential minimal optimization","author":"zeng","year":"2008","journal-title":"Proc 3rd Int Conf Intell Syst Knowl Eng"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2018.00091"},{"key":"ref52","article-title":"Caffe2: Portable high-performance deep learning framework from Facebook","author":"markham","year":"2017","journal-title":"NVIDIA Corporation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref40","article-title":"Deep learning using rectified linear units (ReLU)","author":"agarap","year":"2018"},{"key":"ref11","article-title":"Private nearest neighbors classification in federated databases","volume":"2018","author":"schoppmann","year":"2018","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744808"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/3393527.3393535","article-title":"Privacy-preserving collaborative machine learning on genomic data using tensorflow","author":"hong","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.11.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2017.8068684"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3404397.3404399"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2018.00091"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/72.554195"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref3","year":"2020"},{"key":"ref6","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-018-8106-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"ref7","article-title":"Secure linear regression on vertically partitioned datasets","volume":"2016","author":"gasc\u00f3n","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref9","first-page":"35","article-title":"ABY 3: A mixed protocol framework for machine learning","author":"mohassel","year":"2018","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.105"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040988"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e88-d.12.2876"},{"key":"ref47","article-title":"Efficient sparse matrix-vector multiplication on CUDA","author":"bell","year":"2008"},{"key":"ref42","article-title":"Machine Learning, Neural and Statistical Classification","author":"michie","year":"1994"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2586074"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2940184"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/9380848\/09354058.pdf?arnumber=9354058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:32:05Z","timestamp":1705354325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9354058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":73,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2021.3059108","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,1]]}}}