{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:09:40Z","timestamp":1771517380494,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3140649.3140655","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"39-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Privacy-preserving Machine Learning in Cloud"],"prefix":"10.1145","author":[{"given":"Ehsan","family":"Hesamifard","sequence":"first","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Hassan","family":"Takabi","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Mehdi","family":"Ghasemi","sequence":"additional","affiliation":[{"name":"University of Saskatchewan, Saskatchewan, Canada"}]},{"given":"Catherine","family":"Jones","sequence":"additional","affiliation":[{"name":"Meredith College, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16)","author":"Abadi Martin"},{"key":"e_1_3_2_1_2_1","unstructured":"Louis J. M. Aslett Pedro M. Esperan\u00e7a and Chris C. Holmes. 2015. Encrypted statistical machine learning: new privacy preserving methods. CoRR Vol. abs\/1508.06845 (2015).  Louis J. M. Aslett Pedro M. Esperan\u00e7a and Chris C. Holmes. 2015. Encrypted statistical machine learning: new privacy preserving methods. CoRR Vol. abs\/1508.06845 (2015)."},{"key":"e_1_3_2_1_3_1","unstructured":"L. J. M. Aslett P. M. Esperan\u00e7a and C. C. Holmes. 2015. A review of homomorphic encryption and software tools for encrypted statistical machine learning. Technical Report. University of Oxford.  L. J. M. Aslett P. M. Esperan\u00e7a and C. C. Holmes. 2015. A review of homomorphic encryption and software tools for encrypted statistical machine learning. Technical Report. University of Oxford."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Raphael Bost Raluca Ada Popa Stephen Tu and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data 22nd Annual Network and Distributed System Security Symposium NDSS San Diego California USA.  Raphael Bost Raluca Ada Popa Stephen Tu and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data 22nd Annual Network and Distributed System Security Symposium NDSS San Diego California USA.","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_7_1","unstructured":"Google 2017. Google Prediction API. (2017). https:\/\/cloud.google.com\/prediction\/  Google 2017. Google Prediction API. (2017). https:\/\/cloud.google.com\/prediction\/"},{"key":"e_1_3_2_1_8_1","volume-title":"ML Confidential: Machine Learning on Encrypted Data Proceedings of the 15th International Conference on Information Security and Cryptology (ICISC'12)","author":"Graepel Thore","year":"2013"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings, Part I. 554--571","author":"Halevi Shai","year":"2014"},{"key":"e_1_3_2_1_10_1","unstructured":"Ehsan Hesamifard Hassan Takabi and Mehdi Ghasemi. 2016. CryptoDL: Towards Deep Learning over Encrypted Data Annual Computer Security Applications Conference (ACSAC).  Ehsan Hesamifard Hassan Takabi and Mehdi Ghasemi. 2016. CryptoDL: Towards Deep Learning over Encrypted Data Annual Computer Security Applications Conference (ACSAC)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.05.079"},{"key":"e_1_3_2_1_12_1","unstructured":"Ersatz Labs. 2017. Ersatz. (2017). http:\/\/www.ersatzlabs.com\/  Ersatz Labs. 2017. Ersatz. (2017). http:\/\/www.ersatzlabs.com\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/  Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_1_14_1","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository. (2013). http:\/\/archive.ics.uci.edu\/ml  M. Lichman. 2013. UCI Machine Learning Repository. (2013). http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_15_1","unstructured":"Microsft. 2017. Microsoft Azure Machine Learning. (2017). https:\/\/azure.microsoft.com\/en-us\/services\/machine-learning\/  Microsft. 2017. Microsoft Azure Machine Learning. (2017). https:\/\/azure.microsoft.com\/en-us\/services\/machine-learning\/"},{"key":"e_1_3_2_1_16_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning 2017 IEEE Symposium on Security and Privacy (SP). 19--38","author":"Mohassel P."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"e_1_3_2_1_18_1","volume-title":"NIPS 2016 Workshop.","author":"Takabi Hassan","year":"2016"},{"key":"e_1_3_2_1_19_1","unstructured":"Turi. 2017. GraphLab. (2017). http:\/\/www.select.cs.cmu.edu\/code\/graphlab\/  Turi. 2017. GraphLab. (2017). http:\/\/www.select.cs.cmu.edu\/code\/graphlab\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Pengtao Xie Misha Bilenko Tom Finley Ran Gilad-Bachrach Kristin E. Lauter and Michael Naehrig. 2014. Crypto-Nets: Neural Networks over Encrypted Data. CoRR Vol. abs\/1412.6181 (2014).  Pengtao Xie Misha Bilenko Tom Finley Ran Gilad-Bachrach Kristin E. Lauter and Michael Naehrig. 2014. Crypto-Nets: Neural Networks over Encrypted Data. CoRR Vol. abs\/1412.6181 (2014)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Yuan Xu. 2001. Orthogonal Polynomials of Several Variables. Encyclopedia of Mathematics and its Applications Vol. 81 (2001).  Yuan Xu. 2001. Orthogonal Polynomials of Several Variables. Encyclopedia of Mathematics and its Applications Vol. 81 (2001).","DOI":"10.1090\/chel\/340\/03"},{"key":"e_1_3_2_1_22_1","volume-title":"Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012","author":"Yuan J.","year":"2012"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140649.3140655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140649.3140655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:21Z","timestamp":1750212681000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140649.3140655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":20,"alternative-id":["10.1145\/3140649.3140655","10.1145\/3140649"],"URL":"https:\/\/doi.org\/10.1145\/3140649.3140655","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}