{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:03:40Z","timestamp":1775815420656,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T00:00:00Z","timestamp":1570752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,11]]},"DOI":"10.1145\/3300061.3345447","type":"proceedings-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T15:16:45Z","timestamp":1570807005000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":101,"title":["Occlumency"],"prefix":"10.1145","author":[{"given":"Taegyeong","family":"Lee","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Zhiqi","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Saumay","family":"Pushp","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"given":"Caihua","family":"Li","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Youngki","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"given":"Fengyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"given":"Chenren","family":"Xu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Lintao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Junehwa","family":"Song","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"General Data Protection Regulation. Retrieved July 18 2019 from https:\/\/eugdpr.org  General Data Protection Regulation. Retrieved July 18 2019 from https:\/\/eugdpr.org"},{"key":"e_1_3_2_1_2_1","unstructured":"Monsoon Power Monitor. Retrieved July 18 2019 from https:\/\/www. msoon.com\/online-store  Monsoon Power Monitor. Retrieved July 18 2019 from https:\/\/www. msoon.com\/online-store"},{"key":"e_1_3_2_1_3_1","unstructured":"ONNX Open Source Model Zoo. Retrieved July 18 2019 from https: \/\/github.com\/onnx\/models  ONNX Open Source Model Zoo. Retrieved July 18 2019 from https: \/\/github.com\/onnx\/models"},{"key":"e_1_3_2_1_4_1","unstructured":"The Microsoft Cognitive Toolkit. Retrieved July 18 2019 from https: \/\/www.microsoft.com\/en-us\/cognitive-toolkit  The Microsoft Cognitive Toolkit. Retrieved July 18 2019 from https: \/\/www.microsoft.com\/en-us\/cognitive-toolkit"},{"key":"e_1_3_2_1_5_1","volume-title":"AC1900","year":"2019","unstructured":"TP-Link AC1900 . Retrieved July 18, 2019 from https:\/\/www.tplink. com\/us\/products\/details\/cat-9_Archer-C9.html TP-Link AC1900. Retrieved July 18, 2019 from https:\/\/www.tplink. com\/us\/products\/details\/cat-9_Archer-C9.html"},{"key":"e_1_3_2_1_6_1","unstructured":"Protocol Buffers. Retrieved July 18 2019 from http:\/\/code.google.com\/ apis\/protocolbuffers\/  Protocol Buffers. Retrieved July 18 2019 from http:\/\/code.google.com\/ apis\/protocolbuffers\/"},{"key":"e_1_3_2_1_7_1","unstructured":"ARM Security Technology: Building a Secure System using TrustZone\u00ae Technology. http:\/\/infocenter.arm.com\/ help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC- 009492C_trustzone_security_whitepaper.pdf  ARM Security Technology: Building a Secure System using TrustZone\u00ae Technology. http:\/\/infocenter.arm.com\/ help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC- 009492C_trustzone_security_whitepaper.pdf"},{"key":"e_1_3_2_1_8_1","unstructured":"xxHash. Retrieved July 18 2019 from https:\/\/cyan4973.github.io\/ xxHash\/  xxHash. Retrieved July 18 2019 from https:\/\/cyan4973.github.io\/ xxHash\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Intel Software Guard Extensions (Intel SGX). Retrieved July 18 2019 from https:\/\/software.intel.com\/en-us\/sgx  Intel Software Guard Extensions (Intel SGX). Retrieved July 18 2019 from https:\/\/software.intel.com\/en-us\/sgx"},{"key":"e_1_3_2_1_10_1","unstructured":"Intel Software Guard Extensions (Intel SGX) SDK. Retrieved July 18 2019 from https:\/\/software.intel.com\/en-us\/sgx-sdk  Intel Software Guard Extensions (Intel SGX) SDK. Retrieved July 18 2019 from https:\/\/software.intel.com\/en-us\/sgx-sdk"},{"key":"e_1_3_2_1_11_1","unstructured":"Caffe Model Zoo. Retrieved July 18 2019 from http:\/\/caffe. berkeleyvision.org\/model_zoo.html  Caffe Model Zoo. Retrieved July 18 2019 from http:\/\/caffe. berkeleyvision.org\/model_zoo.html"},{"key":"e_1_3_2_1_12_1","unstructured":"OpenBLAS. Retrieved July 18 2019 from https:\/\/www.openblas.net\/  OpenBLAS. Retrieved July 18 2019 from https:\/\/www.openblas.net\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Enclave Keystone","year":"2019","unstructured":"Keystone Enclave : An Open-Source Secure Enclave for RISC-V . Retrieved July 18, 2019 from https:\/\/docs.keystone-enclave.org\/en\/latest\/ Keystone Enclave: An Open-Source Secure Enclave for RISC-V. Retrieved July 18, 2019 from https:\/\/docs.keystone-enclave.org\/en\/latest\/"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","year":"2019","unstructured":"TensorFlow : An open source machine learning framework for everyone . Retrieved July 18, 2019 from https:\/\/www.tensorflow.org\/ TensorFlow: An open source machine learning framework for everyone. Retrieved July 18, 2019 from https:\/\/www.tensorflow.org\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Facebook Security Breach Exposes Accounts of 50 Million Users. Retrieved July 18 2019 from https:\/\/www.nytimes.com\/2018\/09\/28\/ technology\/facebook-hack-data-breach.html  Facebook Security Breach Exposes Accounts of 50 Million Users. Retrieved July 18 2019 from https:\/\/www.nytimes.com\/2018\/09\/28\/ technology\/facebook-hack-data-breach.html"},{"key":"e_1_3_2_1_16_1","unstructured":"Google Cloud TPU. Retrieved July 18 2019 from https:\/\/cloud.google. com\/tpu  Google Cloud TPU. Retrieved July 18 2019 from https:\/\/cloud.google. com\/tpu"},{"key":"e_1_3_2_1_17_1","unstructured":"Huawei Kirin 970 - HiSilicon. Retrieved July 18 2019 from https: \/\/en.wikichip.org\/wiki\/hisilicon\/kirin\/970  Huawei Kirin 970 - HiSilicon. Retrieved July 18 2019 from https: \/\/en.wikichip.org\/wiki\/hisilicon\/kirin\/970"},{"key":"e_1_3_2_1_18_1","unstructured":"Microsoft Azure Cognitive Services. Retrieved July 18 2019 from https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/  Microsoft Azure Cognitive Services. Retrieved July 18 2019 from https:\/\/azure.microsoft.com\/en-us\/services\/cognitive-services\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS '01)","author":"Agrawal Dakshi","unstructured":"Dakshi Agrawal and Charu C. Aggarwal . 2001. On the Design and Quantification of Privacy Preserving Data Mining Algorithms . In Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS '01) . ACM, New York, NY, USA, 247--255. https:\/\/doi.org\/10.1145\/375551.375602 10.1145\/375551.375602 Dakshi Agrawal and Charu C. Aggarwal. 2001. On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS '01). ACM, New York, NY, USA, 247--255. https:\/\/doi.org\/10.1145\/375551.375602"},{"key":"e_1_3_2_1_20_1","volume-title":"William Lewis, Mu Li, Shujie Liu, Tie-Yan Liu, Renqian Luo, Arul Menezes, Tao Qin, Frank Seide, Xu Tan, Fei Tian, Lijun Wu, ShuangzhiWu, Yingce Xia, Dongdong Zhang, Zhirui Zhang, and Ming Zhou.","author":"Anthony Aue Hany Hassan","year":"2018","unstructured":"Hany Hassan amd Anthony Aue , Chang Chen , Vishal Chowdhary , Jonathan Clark , Christian Federmann , Marcin Junczys-Dowmunt Xuedong Huang , William Lewis, Mu Li, Shujie Liu, Tie-Yan Liu, Renqian Luo, Arul Menezes, Tao Qin, Frank Seide, Xu Tan, Fei Tian, Lijun Wu, ShuangzhiWu, Yingce Xia, Dongdong Zhang, Zhirui Zhang, and Ming Zhou. 2018 . Achieving Human Parity on Automatic Chinese to English News Translation . (March 2018). https:\/\/www.microsoft.com\/enus\/ research\/uploads\/prod\/2018\/03\/final-achieving-human.pdf Hany Hassan amd Anthony Aue, Chang Chen, Vishal Chowdhary, Jonathan Clark, Christian Federmann, Marcin Junczys-Dowmunt Xuedong Huang, William Lewis, Mu Li, Shujie Liu, Tie-Yan Liu, Renqian Luo, Arul Menezes, Tao Qin, Frank Seide, Xu Tan, Fei Tian, Lijun Wu, ShuangzhiWu, Yingce Xia, Dongdong Zhang, Zhirui Zhang, and Ming Zhou. 2018. Achieving Human Parity on Automatic Chinese to English News Translation. (March 2018). https:\/\/www.microsoft.com\/enus\/ research\/uploads\/prod\/2018\/03\/final-achieving-human.pdf"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keeffe , Mark L. Stillwell , David Goltzsche , David Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX . In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16) . USENIX Association, Berkeley, CA, USA, 689--703. http:\/\/dl.acm.org\/ citation.cfm?id=3026877.3026930 Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16). USENIX Association, Berkeley, CA, USA, 689--703. http:\/\/dl.acm.org\/ citation.cfm?id=3026877.3026930"},{"key":"e_1_3_2_1_22_1","volume-title":"Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs\/1702.07521","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs\/1702.07521 ( 2017 ). arXiv:1702.07521 http:\/\/arxiv.org\/abs\/1702.07521 Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. CoRR abs\/1702.07521 (2017). arXiv:1702.07521 http:\/\/arxiv.org\/abs\/1702.07521"},{"key":"e_1_3_2_1_23_1","volume-title":"High Performance Convolutional Neural Networks for Document Processing. In Tenth International Workshop on Frontiers in Handwriting Recognition, Guy Lorette (Ed.). Universit\u00e9 de Rennes 1","author":"Chellapilla Kumar","year":"2006","unstructured":"Kumar Chellapilla , Sidd Puri , and Patrice Simard . 2006 . High Performance Convolutional Neural Networks for Document Processing. In Tenth International Workshop on Frontiers in Handwriting Recognition, Guy Lorette (Ed.). Universit\u00e9 de Rennes 1 , Suvisoft, La Baule (France). https:\/\/hal.inria.fr\/inria-00112631 Kumar Chellapilla, Sidd Puri, and Patrice Simard. 2006. High Performance Convolutional Neural Networks for Document Processing. In Tenth International Workshop on Frontiers in Handwriting Recognition, Guy Lorette (Ed.). Universit\u00e9 de Rennes 1, Suvisoft, La Baule (France). https:\/\/hal.inria.fr\/inria-00112631"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning (ICML '17)","volume":"70","author":"Cho Minsik","year":"2017","unstructured":"Minsik Cho and Daniel Brand . 2017 . MEC: Memory-efficient Convolution for Deep Neural Network . In Proceedings of the 34th International Conference on Machine Learning (ICML '17) , Vol. 70 . PMLR, Sydney, NSW, Australia, 815--824. http:\/\/proceedings.mlr.press\/v70\/cho17a. html Minsik Cho and Daniel Brand. 2017. MEC: Memory-efficient Convolution for Deep Neural Network. In Proceedings of the 34th International Conference on Machine Learning (ICML '17), Vol. 70. PMLR, Sydney, NSW, Australia, 815--824. http:\/\/proceedings.mlr.press\/v70\/cho17a. html"},{"key":"e_1_3_2_1_25_1","volume-title":"IACR Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX Explained. IACR Cryptology ePrint Archive ( 2016 ), 86. http:\/\/eprint.iacr.org\/2016\/086 Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive (2016), 86. http:\/\/eprint.iacr.org\/2016\/086"},{"key":"e_1_3_2_1_26_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security '16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia A. Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security '16) . USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/ usenixsecurity16\/technical-sessions\/presentation\/costan Victor Costan, Ilia A. Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security '16). USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/ usenixsecurity16\/technical-sessions\/presentation\/costan"},{"key":"e_1_3_2_1_27_1","unstructured":"Tom Woller David Kaplan Jeremy Powell. AMD memory encryption. http:\/\/amd-dev.wpengine.netdna-cdn.com\/wordpress\/media\/ 2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf  Tom Woller David Kaplan Jeremy Powell. AMD memory encryption. http:\/\/amd-dev.wpengine.netdna-cdn.com\/wordpress\/media\/ 2013\/12\/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of The 33rd International Conference on Machine Learning (ICML '16)","volume":"48","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy . In Proceedings of The 33rd International Conference on Machine Learning (ICML '16) , Vol. 48 . PMLR, New York, NY, USA, 201--210. http:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of The 33rd International Conference on Machine Learning (ICML '16), Vol. 48. PMLR, New York, NY, USA, 201--210. http:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html"},{"key":"e_1_3_2_1_29_1","volume-title":"Bourdev","author":"Gong Yunchao","year":"2014","unstructured":"Yunchao Gong , Liu Liu , Ming Yang , and Lubomir D . Bourdev . 2014 . Compressing Deep Convolutional Networks using Vector Quantization. CoRR abs\/1412.6115 (2014). arXiv:1412.6115 http:\/\/arxiv.org\/abs\/ 1412.6115 Yunchao Gong, Liu Liu, Ming Yang, and Lubomir D. Bourdev. 2014. Compressing Deep Convolutional Networks using Vector Quantization. CoRR abs\/1412.6115 (2014). arXiv:1412.6115 http:\/\/arxiv.org\/abs\/ 1412.6115"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_31_1","volume-title":"Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. CoRR abs\/1807.00969","author":"Gu Zhongshu","year":"2018","unstructured":"Zhongshu Gu , Heqing Huang , Jialong Zhang , Dong Su , Ankita Lamba , Dimitrios Pendarakis , and Ian Molloy . 2018. Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. CoRR abs\/1807.00969 ( 2018 ). arXiv:1807.00969 http:\/\/arxiv.org\/abs\/ 1807.00969 Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ankita Lamba, Dimitrios Pendarakis, and Ian Molloy. 2018. Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. CoRR abs\/1807.00969 (2018). arXiv:1807.00969 http:\/\/arxiv.org\/abs\/ 1807.00969"},{"key":"e_1_3_2_1_33_1","volume-title":"High- Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference (ATC '17)","author":"H\u00e4hnel Marcus","year":"2017","unstructured":"Marcus H\u00e4hnel , Weidong Cui , and Marcus Peinado . 2017 . High- Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference (ATC '17) . USENIX Association, Santa Clara, CA, 299--312. https:\/\/www.usenix.org\/conference\/atc17\/ technical-sessions\/presentation\/hahnel Marcus H\u00e4hnel, Weidong Cui, and Marcus Peinado. 2017. High- Resolution Side Channels for Untrusted Operating Systems. In 2017 USENIX Annual Technical Conference (ATC '17). USENIX Association, Santa Clara, CA, 299--312. https:\/\/www.usenix.org\/conference\/atc17\/ technical-sessions\/presentation\/hahnel"},{"key":"e_1_3_2_1_34_1","volume-title":"Dally","author":"Han Song","year":"2015","unstructured":"Song Han , Huizi Mao , and William J . Dally . 2015 . Deep Compression : Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. CoRR abs\/1510.00149 (2015). arXiv:1510.00149 http:\/\/arxiv.org\/abs\/1510.00149 Song Han, Huizi Mao, and William J. Dally. 2015. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. CoRR abs\/1510.00149 (2015). arXiv:1510.00149 http:\/\/arxiv.org\/abs\/1510.00149"},{"key":"e_1_3_2_1_35_1","volume-title":"Dally","author":"Han Song","year":"2015","unstructured":"Song Han , Jeff Pool , John Tran , and William J . Dally . 2015 . Learning both Weights and Connections for Efficient Neural Network. In Advances in Neural Information Processing Systems 28 (NIPS '15). Curran Associates, Inc., Montreal, Quebec, Canada , 1135-- 1143. http:\/\/papers.nips.cc\/paper\/5784-learning-both-weights-andconnections- for-efficient-neural-network Song Han, Jeff Pool, John Tran, and William J. Dally. 2015. Learning both Weights and Connections for Efficient Neural Network. In Advances in Neural Information Processing Systems 28 (NIPS '15). Curran Associates, Inc., Montreal, Quebec, Canada, 1135-- 1143. http:\/\/papers.nips.cc\/paper\/5784-learning-both-weights-andconnections- for-efficient-neural-network"},{"key":"e_1_3_2_1_36_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16)","author":"He Kaiming","year":"2016","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16) . Las Vegas, NV, USA, 770--778. https:\/\/doi.org\/10.1109\/CVPR. 2016.90 10.1109\/CVPR.2016.90 Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16). Las Vegas, NV, USA, 770--778. https:\/\/doi.org\/10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_37_1","volume-title":"CryptoDL: Deep Neural Networks over Encrypted Data. CoRR abs\/1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard , Hassan Takabi , and Mehdi Ghasemi . 2017. CryptoDL: Deep Neural Networks over Encrypted Data. CoRR abs\/1711.05189 ( 2017 ). arXiv:1711.05189 http:\/\/arxiv.org\/abs\/1711. 05189 Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. CryptoDL: Deep Neural Networks over Encrypted Data. CoRR abs\/1711.05189 (2017). arXiv:1711.05189 http:\/\/arxiv.org\/abs\/1711. 05189"},{"key":"e_1_3_2_1_38_1","volume-title":"Very Efficient Training of Convolutional Neural Networks using Fast Fourier Transform and Overlap-and-Add. CoRR abs\/1601.06815","author":"Highlander Tyler","year":"2016","unstructured":"Tyler Highlander and Andres Rodriguez . 2016. Very Efficient Training of Convolutional Neural Networks using Fast Fourier Transform and Overlap-and-Add. CoRR abs\/1601.06815 ( 2016 ). arXiv:1601.06815 http:\/\/arxiv.org\/abs\/1601.06815 Tyler Highlander and Andres Rodriguez. 2016. Very Efficient Training of Convolutional Neural Networks using Fast Fourier Transform and Overlap-and-Add. CoRR abs\/1601.06815 (2016). arXiv:1601.06815 http:\/\/arxiv.org\/abs\/1601.06815"},{"key":"e_1_3_2_1_39_1","volume-title":"MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. CoRR abs\/1704.04861","author":"Howard Andrew G.","year":"2017","unstructured":"Andrew G. Howard , Menglong Zhu , Bo Chen , Dmitry Kalenichenko , Weijun Wang , Tobias Weyand , Marco Andreetto , and Hartwig Adam . 2017. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. CoRR abs\/1704.04861 ( 2017 ). arXiv:1704.04861 http:\/\/arxiv.org\/abs\/1704.04861 Andrew G. Howard, Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig Adam. 2017. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. CoRR abs\/1704.04861 (2017). arXiv:1704.04861 http:\/\/arxiv.org\/abs\/1704.04861"},{"key":"e_1_3_2_1_40_1","volume-title":"Squeeze-and-Excitation Networks. In 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '18)","author":"Hu Jie","year":"2018","unstructured":"Jie Hu , Li Shen , and Gang Sun . 2018 . Squeeze-and-Excitation Networks. In 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '18) . Salt Lake City, UT, USA, 7132--7141. https:\/\/doi.org\/10. 1109\/CVPR. 2018.00745 Jie Hu, Li Shen, and Gang Sun. 2018. Squeeze-and-Excitation Networks. In 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '18). Salt Lake City, UT, USA, 7132--7141. https:\/\/doi.org\/10. 1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_41_1","volume-title":"Chiron: Privacy-preserving Machine Learning as a Service. CoRR abs\/1803.05961","author":"Hunt Tyler","year":"2018","unstructured":"Tyler Hunt , Congzheng Song , Reza Shokri , Vitaly Shmatikov , and Emmett Witchel . 2018 . Chiron: Privacy-preserving Machine Learning as a Service. CoRR abs\/1803.05961 (2018). arXiv:1803.05961 http: \/\/arxiv.org\/abs\/1803.05961 Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, and Emmett Witchel. 2018. Chiron: Privacy-preserving Machine Learning as a Service. CoRR abs\/1803.05961 (2018). arXiv:1803.05961 http: \/\/arxiv.org\/abs\/1803.05961"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16)","author":"Hunt Tyler","year":"2016","unstructured":"Tyler Hunt , Zhiting Zhu , Yuanzhong Xu , Simon Peter , and Emmett Witchel . 2016 . Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data . In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16) . USENIX Association, Berkeley, CA, USA, 533--549. http:\/\/dl.acm.org\/citation. cfm?id=3026877.3026919 Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. 2016. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16). USENIX Association, Berkeley, CA, USA, 533--549. http:\/\/dl.acm.org\/citation. cfm?id=3026877.3026919"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081360"},{"key":"e_1_3_2_1_44_1","volume-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size. CoRR abs\/1602.07360","author":"Iandola Forrest N.","year":"2016","unstructured":"Forrest N. Iandola , Matthew W. Moskewicz , Khalid Ashraf , Song Han , William J. Dally , and Kurt Keutzer . 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size. CoRR abs\/1602.07360 ( 2016 ). arXiv:1602.07360 http:\/\/arxiv.org\/abs\/1602. 07360 Forrest N. Iandola, Matthew W. Moskewicz, Khalid Ashraf, Song Han, William J. Dally, and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size. CoRR abs\/1602.07360 (2016). arXiv:1602.07360 http:\/\/arxiv.org\/abs\/1602. 07360"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.28.88"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243757"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_1_49_1","volume-title":"Compression of Deep Convolutional Neural Networks for Fast and Low Power Mobile Applications. CoRR abs\/1511.06530","author":"Kim Yong-Deok","year":"2015","unstructured":"Yong-Deok Kim , Eunhyeok Park , Sungjoo Yoo , Taelim Choi , Lu Yang , and Dongjun Shin . 2015. Compression of Deep Convolutional Neural Networks for Fast and Low Power Mobile Applications. CoRR abs\/1511.06530 ( 2015 ). arXiv:1511.06530 http:\/\/arxiv.org\/abs\/1511. 06530 Yong-Deok Kim, Eunhyeok Park, Sungjoo Yoo, Taelim Choi, Lu Yang, and Dongjun Shin. 2015. Compression of Deep Convolutional Neural Networks for Fast and Low Power Mobile Applications. CoRR abs\/1511.06530 (2015). arXiv:1511.06530 http:\/\/arxiv.org\/abs\/1511. 06530"},{"key":"e_1_3_2_1_50_1","volume-title":"Hinton","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey E . Hinton . 2012 . ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25 (NIPS '12). Curran Associates, Inc., Lake Tahoe, Nevada, USA , 1106-- 1114. http:\/\/papers.nips.cc\/paper\/4824-imagenet-classification-withdeep- convolutional-neural-networks Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25 (NIPS '12). Curran Associates, Inc., Lake Tahoe, Nevada, USA, 1106-- 1114. http:\/\/papers.nips.cc\/paper\/4824-imagenet-classification-withdeep- convolutional-neural-networks"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2959355.2959378"},{"key":"e_1_3_2_1_52_1","volume-title":"Fast Algorithms for Convolutional Neural Networks. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16)","author":"Lavin Andrew","year":"2016","unstructured":"Andrew Lavin and Scott Gray . 2016 . Fast Algorithms for Convolutional Neural Networks. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16) . Las Vegas, NV, USA, 4013--4021. https: \/\/doi.org\/10.1109\/CVPR. 2016.435 10.1109\/CVPR.2016.435 Andrew Lavin and Scott Gray. 2016. Fast Algorithms for Convolutional Neural Networks. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16). Las Vegas, NV, USA, 4013--4021. https: \/\/doi.org\/10.1109\/CVPR.2016.435"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"e_1_3_2_1_54_1","volume-title":"Pan","author":"Li Meng","year":"2017","unstructured":"Meng Li , Liangzhen Lai , Naveen Suda , Vikas Chandra , and David Z . Pan . 2017 . PrivyNet: A Flexible Framework for Privacy-Preserving Deep Neural Network Training with A Fine-Grained Privacy Control. CoRR abs\/1709.06161 (2017). arXiv:1709.06161 http:\/\/arxiv.org\/abs\/ 1709.06161 Meng Li, Liangzhen Lai, Naveen Suda, Vikas Chandra, and David Z. Pan. 2017. PrivyNet: A Flexible Framework for Privacy-Preserving Deep Neural Network Training with A Fine-Grained Privacy Control. CoRR abs\/1709.06161 (2017). arXiv:1709.06161 http:\/\/arxiv.org\/abs\/ 1709.06161"},{"key":"e_1_3_2_1_55_1","volume-title":"ROTE: Rollback Protection for Trusted Execution. In 26th USENIX Security Symposium (USENIX Security '17)","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic , Mansoor Ahmed , Kari Kostiainen , Aritra Dhar , David M. Sommer , Arthur Gervais , Ari Juels , and Srdjan Capkun . 2017 . ROTE: Rollback Protection for Trusted Execution. In 26th USENIX Security Symposium (USENIX Security '17) . USENIX Association, Vancouver, BC, 1289--1306. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/ technical-sessions\/presentation\/matetic Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback Protection for Trusted Execution. In 26th USENIX Security Symposium (USENIX Security '17). USENIX Association, Vancouver, BC, 1289--1306. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/ technical-sessions\/presentation\/matetic"},{"key":"e_1_3_2_1_56_1","volume-title":"Oblivious Multi- Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security '16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko , Felix Schuster , Cedric Fournet , Aastha Mehta , Sebastian Nowozin , Kapil Vaswani , and Manuel Costa . 2016 . Oblivious Multi- Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security '16) . USENIX Association, Austin, TX, 619--636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/ technical-sessions\/presentation\/ohrimenko Olga Ohrimenko, Felix Schuster, Cedric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi- Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security '16). USENIX Association, Austin, TX, 619--636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/ technical-sessions\/presentation\/ohrimenko"},{"key":"e_1_3_2_1_57_1","volume-title":"2018 USENIX Annual Technical Conference (ATC '18)","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko , Bohdan Trach , Robert Krahn , Mark Silberstein , and Christof Fetzer . 2018 . Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks . In 2018 USENIX Annual Technical Conference (ATC '18) . USENIX Association, Boston, MA, 227--240. https:\/\/www. usenix.org\/conference\/atc18\/presentation\/oleksenko Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In 2018 USENIX Annual Technical Conference (ATC '18). USENIX Association, Boston, MA, 227--240. https:\/\/www. usenix.org\/conference\/atc18\/presentation\/oleksenko"},{"key":"e_1_3_2_1_58_1","volume-title":"Learning and Transferring Mid-level Image Representations Using Convolutional Neural Networks. In 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '14)","author":"Oquab Maxime","year":"2014","unstructured":"Maxime Oquab , L\u00e9on Bottou , Ivan Laptev , and Josef Sivic . 2014 . Learning and Transferring Mid-level Image Representations Using Convolutional Neural Networks. In 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '14) . Columbus, OH, USA, 1717--1724. https:\/\/doi.org\/10.1109\/CVPR. 2014.222 10.1109\/CVPR.2014.222 Maxime Oquab, L\u00e9on Bottou, Ivan Laptev, and Josef Sivic. 2014. Learning and Transferring Mid-level Image Representations Using Convolutional Neural Networks. In 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '14). Columbus, OH, USA, 1717--1724. https:\/\/doi.org\/10.1109\/CVPR.2014.222"},{"key":"e_1_3_2_1_59_1","volume-title":"Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, and Hamed Haddadi.","author":"Ossia Seyed Ali","year":"2017","unstructured":"Seyed Ali Ossia , Ali Shahin Shamsabadi , Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, and Hamed Haddadi. 2017 . Privacy- Preserving Deep Inference for Rich User Data on The Cloud. CoRR abs\/1710.01727 (2017). arXiv:1710.01727 http:\/\/arxiv.org\/abs\/1710. 01727 Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, and Hamed Haddadi. 2017. Privacy- Preserving Deep Inference for Rich User Data on The Cloud. CoRR abs\/1710.01727 (2017). arXiv:1710.01727 http:\/\/arxiv.org\/abs\/1710. 01727"},{"key":"e_1_3_2_1_60_1","volume-title":"Ali Taheri, Hamid R. Rabiee, Nicholas D. Lane, and Hamed Haddadi.","author":"Ossia Seyed Ali","year":"2017","unstructured":"Seyed Ali Ossia , Ali Shahin Shamsabadi , Ali Taheri, Hamid R. Rabiee, Nicholas D. Lane, and Hamed Haddadi. 2017 . A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics. CoRR abs\/1703.02952 (2017). arXiv:1703.02952 http:\/\/arxiv.org\/abs\/1703. 02952 Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R. Rabiee, Nicholas D. Lane, and Hamed Haddadi. 2017. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics. CoRR abs\/1703.02952 (2017). arXiv:1703.02952 http:\/\/arxiv.org\/abs\/1703. 02952"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026922"},{"key":"e_1_3_2_1_62_1","volume-title":"Computer Vision - ECCV 2016 - 14th European Conference","author":"Rastegari Mohammad","unstructured":"Mohammad Rastegari , Vicente Ordonez , Joseph Redmon , and Ali Farhadi . 2016. XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks . In Computer Vision - ECCV 2016 - 14th European Conference , Amsterdam, The Netherlands. Springer International Publishing , Cham, 525--542. https:\/\/doi.org\/10.1007\/978--3--319- 46493-0_32 10.1007\/978--3--319- Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, and Ali Farhadi. 2016. XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks. In Computer Vision - ECCV 2016 - 14th European Conference, Amsterdam, The Netherlands. Springer International Publishing, Cham, 525--542. https:\/\/doi.org\/10.1007\/978--3--319- 46493-0_32"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_66_1","unstructured":"Boris Sch\u00e4ling. 2011. The boost C++ libraries. Boris Sch\u00e4ling.  Boris Sch\u00e4ling. 2011. The boost C++ libraries. Boris Sch\u00e4ling."},{"key":"e_1_3_2_1_67_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 ( 2014 ). arXiv:1409.1556 http:\/\/arxiv.org\/abs\/1409.1556 Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. CoRR abs\/1409.1556 (2014). arXiv:1409.1556 http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_69_1","unstructured":"Cheng Tai Tong Xiao Xiaogang Wang and Weinan E. 2015. Convolutional neural networks with low-rank regularization. CoRR abs\/1511.06067 (2015). arXiv:1511.06067 http:\/\/arxiv.org\/abs\/1511. 06067  Cheng Tai Tong Xiao Xiaogang Wang and Weinan E. 2015. Convolutional neural networks with low-rank regularization. CoRR abs\/1511.06067 (2015). arXiv:1511.06067 http:\/\/arxiv.org\/abs\/1511. 06067"},{"key":"e_1_3_2_1_70_1","volume-title":"Privado: Practical and Secure DNN Inference. CoRR abs\/1810.00602","author":"Tople Shruti","year":"2018","unstructured":"Shruti Tople , Karan Grover , Shweta Shinde , Ranjita Bhagwan , and Ramachandran Ramjee . 2018 . Privado: Practical and Secure DNN Inference. CoRR abs\/1810.00602 (2018). arXiv:1810.00602 http:\/\/arxiv. org\/abs\/1810.00602 Shruti Tople, Karan Grover, Shweta Shinde, Ranjita Bhagwan, and Ramachandran Ramjee. 2018. Privado: Practical and Secure DNN Inference. CoRR abs\/1810.00602 (2018). arXiv:1810.00602 http:\/\/arxiv. org\/abs\/1810.00602"},{"key":"e_1_3_2_1_71_1","volume-title":"Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. CoRR abs\/1806.03287","author":"Tram\u00e8r Florian","year":"2018","unstructured":"Florian Tram\u00e8r and Dan Boneh . 2018 . Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. CoRR abs\/1806.03287 (2018). arXiv:1806.03287 http:\/\/arxiv.org\/abs\/1806. 03287 Florian Tram\u00e8r and Dan Boneh. 2018. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. CoRR abs\/1806.03287 (2018). arXiv:1806.03287 http:\/\/arxiv.org\/abs\/1806. 03287"},{"key":"e_1_3_2_1_72_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'18)","author":"Volos Stavros","year":"2018","unstructured":"Stavros Volos , Kapil Vaswani , and Rodrigo Bruno . 2018 . Graviton: Trusted Execution Environments on GPUs . In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'18) . USENIX Association, Berkeley, CA, USA, 681--696. http: \/\/dl.acm.org\/citation.cfm?id=3291168.3291219 Stavros Volos, Kapil Vaswani, and Rodrigo Bruno. 2018. Graviton: Trusted Execution Environments on GPUs. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'18). USENIX Association, Berkeley, CA, USA, 681--696. http: \/\/dl.acm.org\/citation.cfm?id=3291168.3291219"},{"key":"e_1_3_2_1_73_1","volume-title":"High- Performance Computing on the Intel\u00ae Xeon Phi?","author":"Wang Endong","unstructured":"Endong Wang , Qing Zhang , Bo Shen , Guangyong Zhang , Xiaowei Lu , Qing Wu , and Yajuan Wang . 2014. Intel math kernel library . In High- Performance Computing on the Intel\u00ae Xeon Phi? . Springer , 167--188. Endong Wang, Qing Zhang, Bo Shen, Guangyong Zhang, Xiaowei Lu, Qing Wu, and Yajuan Wang. 2014. Intel math kernel library. In High- Performance Computing on the Intel\u00ae Xeon Phi?. Springer, 167--188."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503219"},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17)","author":"Wang Wenhao","unstructured":"Wenhao Wang , Guoxing Chen , Xiaorui Pan , Yinqian Zhang , XiaoFeng Wang , Vincent Bindschaedler , Haixu Tang , and Carl A. Gunter . 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side- Channel Hazards in SGX . In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17) .ACM, New York, NY, USA, 2421--2434. https:\/\/doi.org\/10.1145\/3133956.3134038 10.1145\/3133956.3134038 Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A. Gunter. 2017. Leaky Cauldron on the Dark Land: Understanding Memory Side- Channel Hazards in SGX. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17).ACM, New York, NY, USA, 2421--2434. https:\/\/doi.org\/10.1145\/3133956.3134038"},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 19th International Middleware Conference (Middleware '18)","author":"Aublin Pierre-Louis","year":"2018","unstructured":"NicoWeichbrodt, Pierre-Louis Aublin , and R\u00fcdiger Kapitza . 2018 . Sgxperf: A Performance Analysis Tool for Intel SGX Enclaves . In Proceedings of the 19th International Middleware Conference (Middleware '18) . ACM, New York, NY, USA, 201--213. https:\/\/doi.org\/10.1145\/3274808. 3274824 10.1145\/3274808 NicoWeichbrodt, Pierre-Louis Aublin, and R\u00fcdiger Kapitza. 2018. Sgxperf: A Performance Analysis Tool for Intel SGX Enclaves. In Proceedings of the 19th International Middleware Conference (Middleware '18). ACM, New York, NY, USA, 201--213. https:\/\/doi.org\/10.1145\/3274808. 3274824"},{"key":"e_1_3_2_1_77_1","volume-title":"Quantized Convolutional Neural Networks for Mobile Devices. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16)","author":"Wu Jiaxiang","year":"2016","unstructured":"Jiaxiang Wu , Cong Leng , Yuhang Wang , Qinghao Hu , and Jian Cheng . 2016 . Quantized Convolutional Neural Networks for Mobile Devices. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16) . Las Vegas, NV, USA, 4820--4828. https:\/\/doi.org\/10.1109\/ CVPR. 2016.521 Jiaxiang Wu, Cong Leng, Yuhang Wang, Qinghao Hu, and Jian Cheng. 2016. Quantized Convolutional Neural Networks for Mobile Devices. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR '16). Las Vegas, NV, USA, 4820--4828. https:\/\/doi.org\/10.1109\/ CVPR.2016.521"},{"key":"e_1_3_2_1_78_1","volume-title":"echnical Report]. (August","author":"Xiong Wayne","year":"2017","unstructured":"Wayne Xiong , Lingfeng Wu , Fil Alleva , Jasha Droppo , Xuedong Huang , and Andreas Stolcke . 2017. The Microsoft 2017 Conversational Speech Recognition System [ T echnical Report]. (August 2017 ). https:\/\/www.microsoft.com\/en-us\/research\/publication\/ microsoft-2017-conversational-speech-recognition-system\/ Wayne Xiong, Lingfeng Wu, Fil Alleva, Jasha Droppo, Xuedong Huang, and Andreas Stolcke. 2017. The Microsoft 2017 Conversational Speech Recognition System [Technical Report]. (August 2017). https:\/\/www.microsoft.com\/en-us\/research\/publication\/ microsoft-2017-conversational-speech-recognition-system\/"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313591"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241563"},{"key":"e_1_3_2_1_81_1","volume-title":"Controlled- Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 2015 IEEE Symposium on Security and Privacy (SP '15)","author":"Xu Yuanzhong","year":"2015","unstructured":"Yuanzhong Xu , Weidong Cui , and Marcus Peinado . 2015 . Controlled- Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 2015 IEEE Symposium on Security and Privacy (SP '15) . San Jose, CA, USA, 640--656. https:\/\/doi.org\/10.1109\/SP. 2015.45 10.1109\/SP.2015.45 Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled- Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 2015 IEEE Symposium on Security and Privacy (SP '15). San Jose, CA, USA, 640--656. https:\/\/doi.org\/10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_82_1","volume-title":"Advances in Neural Information Processing Systems 27 (NIPS '14). Curran Associates","author":"Yosinski Jason","unstructured":"Jason Yosinski , Jeff Clune , Yoshua Bengio , and Hod Lipson . 2014. How transferable are features in deep neural networks? . In Advances in Neural Information Processing Systems 27 (NIPS '14). Curran Associates , Inc., Montreal, Quebec, Canada , 3320--3328. http:\/\/papers.nips.cc\/paper\/ 5347-how-transferable-are-features-in-deep-neural-networks Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How transferable are features in deep neural networks?. In Advances in Neural Information Processing Systems 27 (NIPS '14). Curran Associates, Inc., Montreal, Quebec, Canada, 3320--3328. http:\/\/papers.nips.cc\/paper\/ 5347-how-transferable-are-features-in-deep-neural-networks"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081336"},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (ICML '18)","volume":"80","author":"Zhang Jiyuan","year":"2018","unstructured":"Jiyuan Zhang , Franz Franchetti , and Tze Meng Low . 2018 . High Performance Zero-Memory Overhead Direct Convolutions . In Proceedings of the 35th International Conference on Machine Learning (ICML '18) , Vol. 80 . PMLR, Stockholmsm\u00e4ssan, Stockholm Sweden, 5776--5785. http:\/\/proceedings.mlr.press\/v80\/zhang18d.html Jiyuan Zhang, Franz Franchetti, and Tze Meng Low. 2018. High Performance Zero-Memory Overhead Direct Convolutions. In Proceedings of the 35th International Conference on Machine Learning (ICML '18), Vol. 80. PMLR, Stockholmsm\u00e4ssan, Stockholm Sweden, 5776--5785. http:\/\/proceedings.mlr.press\/v80\/zhang18d.html"}],"event":{"name":"MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking","location":"Los Cabos Mexico","acronym":"MobiCom '19","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["The 25th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3345447","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3300061.3345447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:42Z","timestamp":1750204482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300061.3345447"}},"subtitle":["Privacy-preserving Remote Deep-learning Inference Using SGX"],"short-title":[],"issued":{"date-parts":[[2019,10,11]]},"references-count":82,"alternative-id":["10.1145\/3300061.3345447","10.1145\/3300061"],"URL":"https:\/\/doi.org\/10.1145\/3300061.3345447","relation":{},"subject":[],"published":{"date-parts":[[2019,10,11]]},"assertion":[{"value":"2019-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}