{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:21:44Z","timestamp":1740133304660,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62104097"],"award-info":[{"award-number":["62104097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research Plan of Jiangsu Province of China","award":["BE2022098"],"award-info":[{"award-number":["BE2022098"]}]},{"name":"High-Level Personnel Project of Jiangsu Province","award":["JSSCBS20210034"],"award-info":[{"award-number":["JSSCBS20210034"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1109\/tvlsi.2022.3197895","type":"journal-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T19:46:08Z","timestamp":1661283968000},"page":"1691-1704","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Homomorphic Convolution Designs on FPGA for Secure Inference"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7668-4689","authenticated-orcid":false,"given":"Xiao","family":"Hu","sequence":"first","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"given":"Minghao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"given":"Jing","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7227-4786","authenticated-orcid":false,"given":"Zhongfeng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/nature21056"},{"key":"ref2","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"arXiv:1810.04805","author":"Devlin","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2017.2716578"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465894"},{"key":"ref6","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","volume":"48","author":"Gilad-Bachrach"},{"key":"ref7","article-title":"Faster CryptoNets: Leveraging sparsity for real-world encrypted inference","volume-title":"arXiv:1811.09953","author":"Chou","year":"2018"},{"key":"ref8","first-page":"1651","article-title":"Gazelle: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp. (USENIX Security)","author":"Juvekar"},{"key":"ref9","first-page":"812","article-title":"Low latency privacy preserving inference","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Brutzkus"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/547"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/671"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00942"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS50809.2020.9301698"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_20"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"volume-title":"The PALISADE Lattice Cryptography Library (Release 1.10.4)","year":"2020","author":"Rohloff","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03101-5_16"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3076123"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00027"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988765"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC43674.2020.9286219"},{"article-title":"High performance convolutional neural networks for document processing","volume-title":"Proc. 10th Int. Workshop Frontiers Handwriting Recognit.","author":"Chellapilla","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM53951.2022.9786115"},{"key":"ref29","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2019.00045"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116470"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_19"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"issue":"7","key":"ref36","first-page":"595","article-title":"Multiplication of multidigit numbers on automata","volume":"7","author":"Karatsuba","year":"1963","journal-title":"Sov. Phys. Doklady"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.70-95"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"ref41","first-page":"46","article-title":"Posix threads programming","volume":"5","author":"Barney","year":"2009","journal-title":"Nat. Lab. Dispon\u00edvel em"},{"article-title":"OpenMP application program interface version 4.5","volume-title":"OpenMP Architecture Review Boards, ARB","year":"2015","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021745"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2800788"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-14-25"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2488551.2488587"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/9925603\/09866023.pdf?arnumber=9866023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:43:26Z","timestamp":1706791406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9866023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":46,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2022.3197895","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"type":"print","value":"1063-8210"},{"type":"electronic","value":"1557-9999"}],"subject":[],"published":{"date-parts":[[2022,11]]}}}