{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T05:24:10Z","timestamp":1776489850353,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,13]]},"DOI":"10.1145\/3292006.3300044","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:22:04Z","timestamp":1553170924000},"page":"97-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["Deep Neural Networks Classification over Encrypted Data"],"prefix":"10.1145","author":[{"given":"Ehsan","family":"Hesamifard","sequence":"first","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Hassan","family":"Takabi","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Mehdi","family":"Ghasemi","sequence":"additional","affiliation":[{"name":"University of Saskatchewan, Saskatoon, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Holmes","author":"Aslett Louis J. M.","year":"2015"},{"key":"e_1_3_2_1_2_1","unstructured":"L. J. M. Aslett P. M. Esperan\u00e7a and C. C. Holmes. 2015. A review of homomorphic encryption and software tools for encrypted statistical machine learning. Technical Report. University of Oxford.  L. J. M. Aslett P. M. Esperan\u00e7a and C. C. Holmes. 2015. A review of homomorphic encryption and software tools for encrypted statistical machine learning. Technical Report. University of Oxford."},{"key":"e_1_3_2_1_3_1","unstructured":"K. Atkinson and W. Han. 2009. Theoretical Numerical Analysis: A Functional Analysis Framework. Springer New York.  K. Atkinson and W. Han. 2009. Theoretical Numerical Analysis: A Functional Analysis Framework. Springer New York."},{"key":"e_1_3_2_1_4_1","volume-title":"Random Search for Hyper-parameter Optimization. J. Mach. Learn. Res. 13 (Feb","author":"Bergstra James","year":"2012"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.323"},{"key":"e_1_3_2_1_9_1","first-page":"1109","article-title":"EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation","volume":"2017","author":"Chandran Nishanth","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_11_1","unstructured":"Fran\u00e7ois Chollet et al. 2017. Keras. https:\/\/github.com\/fchollet\/keras.  Fran\u00e7ois Chollet et al. 2017. Keras. https:\/\/github.com\/fchollet\/keras."},{"key":"e_1_3_2_1_13_1","volume-title":"ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015","author":"Demmler Daniel","year":"2015"},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2017. Google Prediction API. (2017). https:\/\/cloud.google.com\/ prediction\/  Google. 2017. Google Prediction API. (2017). https:\/\/cloud.google.com\/ prediction\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings.","author":"Halevi Shai","year":"2014"},{"key":"e_1_3_2_1_19_1","volume-title":"Gazelle: A Low Latency Framework for Secure Neural Network Inference. CoRR abs\/1801.05507","author":"Juvekar Chiraag","year":"2018"},{"key":"e_1_3_2_1_20_1","volume-title":"A Convolutional Neural Network for Modelling Sentences. CoRR abs\/1404.2188","author":"Kalchbrenner Nal","year":"2014"},{"key":"e_1_3_2_1_23_1","volume-title":"www.cs.toronto.edu\/~kriz\/cifar.html","author":"Krizhevsky Alex","year":"2019"},{"key":"e_1_3_2_1_24_1","volume-title":"Advances in Neural Information Processing Systems 25","author":"Krizhevsky Alex"},{"key":"e_1_3_2_1_25_1","unstructured":"Ersatz Labs. 2017. Ersatz. (2017). http:\/\/www.ersatzlabs.com\/  Ersatz Labs. 2017. Ersatz. (2017). http:\/\/www.ersatzlabs.com\/"},{"key":"e_1_3_2_1_26_1","unstructured":"Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/  Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_28_1","volume-title":"On the Computational Efficiency of Training Neural Networks. CoRR","author":"Livni Roi","year":"2014"},{"key":"e_1_3_2_1_29_1","unstructured":"Microsft. 2017. Microsoft Azure Machine Learning. (2017). https:\/\/azure. microsoft.com\/en-us\/services\/machine-learning\/  Microsft. 2017. Microsoft Azure Machine Learning. (2017). https:\/\/azure. microsoft.com\/en-us\/services\/machine-learning\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Microsft. 2018. Simple encrypted arithmetic library - SEAL. (2018). https: \/\/sealcrypto.org  Microsft. 2018. Simple encrypted arithmetic library - SEAL. (2018). https: \/\/sealcrypto.org"},{"key":"e_1_3_2_1_31_1","volume-title":"SecureML: A System for Scalable Privacy- Preserving Machine Learning. In IEEE Symposium on Security and Privacy (SP).","author":"Mohassel P."},{"key":"e_1_3_2_1_32_1","volume-title":"Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In 17th International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT'99)","author":"Paillier Pascal","year":"1999"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_34_1","unstructured":"R.L. Rivest L. Adleman and M.L. Dertouzos. 1978. On data banks and privacy homomorphisms. In Foundations on Secure Computation Academia Press.  R.L. Rivest L. Adleman and M.L. Dertouzos. 1978. On data banks and privacy homomorphisms. In Foundations on Secure Computation Academia Press."},{"key":"e_1_3_2_1_35_1","volume-title":"accessed","author":"Rohloff Kurt","year":"2018"},{"key":"e_1_3_2_1_36_1","volume-title":"DeepSecure: Scalable Provably-Secure Deep Learning. CoRR abs\/1705.08963","author":"Rouhani Bita Darvish","year":"2017"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25903-1_9"},{"key":"e_1_3_2_1_38_1","unstructured":"Turi. 2017. GraphLab. (2017). http:\/\/www.select.cs.cmu.edu\/code\/graphlab\/  Turi. 2017. GraphLab. (2017). http:\/\/www.select.cs.cmu.edu\/code\/graphlab\/"},{"key":"e_1_3_2_1_39_1","volume-title":"Crypto-Nets: Neural Networks over Encrypted Data. CoRR","author":"Xie Pengtao","year":"2014"},{"key":"e_1_3_2_1_40_1","volume-title":"Orthogonal Polynomials of Several Variables. Encyclopedia of Mathematics and its Applications 81","author":"Yuan Xu.","year":"2001"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470255"}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","location":"Richardson Texas USA","acronym":"CODASPY '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292006.3300044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:51Z","timestamp":1750208271000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":34,"alternative-id":["10.1145\/3292006.3300044","10.1145\/3292006"],"URL":"https:\/\/doi.org\/10.1145\/3292006.3300044","relation":{},"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"2019-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}