{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:31:08Z","timestamp":1777653068368,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T00:00:00Z","timestamp":1556582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,30]]},"DOI":"10.1145\/3310273.3323047","type":"proceedings-article","created":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T14:11:36Z","timestamp":1557324696000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":125,"title":["nGraph-HE"],"prefix":"10.1145","author":[{"given":"Fabian","family":"Boemer","sequence":"first","affiliation":[{"name":"Intel AI Research"}]},{"given":"Yixing","family":"Lao","sequence":"additional","affiliation":[{"name":"Intel AI Research"}]},{"given":"Rosario","family":"Cammarota","sequence":"additional","affiliation":[{"name":"Intel AI Research"}]},{"given":"Casimir","family":"Wierzynski","sequence":"additional","affiliation":[{"name":"Intel AI Research"}]}],"member":"320","published-online":{"date-parts":[[2019,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. XLA Overview. Retrieved 2019-03-25 from https:\/\/www.tensorflow.org\/xla\/overview  2019. XLA Overview. Retrieved 2019-03-25 from https:\/\/www.tensorflow.org\/xla\/overview"},{"key":"e_1_3_2_1_2_1","first-page":"265","article-title":"Tensorflow: a system for large-scale machine learning","volume":"16","author":"Abadi Mart\u00edn","year":"2016","journal-title":"OSDI"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_3_2_1_4_1","volume-title":"RAMPARTS: RApid Machine-learning Processing Applications and Reconfigurable Targeting of Security. Retrieved 2019-03-25 from https:\/\/galois.com\/project\/ramparts\/","author":"Archer David","year":"2018"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 423--442","author":"Bajard Jean-Claude","year":"2016"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_2_1_7_1","first-page":"314","article-title":"Post-quantum cryptography-dealing with the fallout of physics success","volume":"2017","author":"Bernstein Daniel J.","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","first-page":"758","article-title":"Chimera: a unified framework for B\/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning","volume":"2018","author":"Boura Christina","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_9_1","volume-title":"Annual cryptology conference","author":"Brakerski Zvika"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243786"},{"key":"e_1_3_2_1_13_1","unstructured":"Sergiu Carpov et al. 2018. Cingulata. Retrieved 2019-03-25 from https:\/\/github.com\/CEA-LIST\/Cingulata  Sergiu Carpov et al. 2018. Cingulata. Retrieved 2019-03-25 from https:\/\/github.com\/CEA-LIST\/Cingulata"},{"key":"e_1_3_2_1_14_1","unstructured":"Avijit Chakraborty Adam Proctor etal 2018. Intel(R) nGraph(TM) Compiler and runtime for TensorFlow*. Retrieved 2019-03-25 from https:\/\/github.com\/NervanaSystems\/ngraph-tf  Avijit Chakraborty Adam Proctor et al. 2018. Intel(R) nGraph(TM) Compiler and runtime for TensorFlow*. Retrieved 2019-03-25 from https:\/\/github.com\/NervanaSystems\/ngraph-tf"},{"key":"e_1_3_2_1_16_1","unstructured":"Tianqi Chen Mu Li Yutian Li Min Lin Naiyan Wang Minjie Wang Tianjun Xiao Bing Xu Chiyuan Zhang and Zheng Zhang. 2015. MXNet: A flexible and efficient machine learning library for heterogeneous distributed systems. arXiv preprint arXiv:1512.01274 (2015).  Tianqi Chen Mu Li Yutian Li Min Lin Naiyan Wang Minjie Wang Tianjun Xiao Bing Xu Chiyuan Zhang and Zheng Zhang. 2015. MXNet: A flexible and efficient machine learning library for heterogeneous distributed systems. arXiv preprint arXiv:1512.01274 (2015)."},{"key":"e_1_3_2_1_17_1","volume-title":"TVM: An Automated End-to-End Optimizing Compiler for Deep Learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Chen Tianqi","year":"2018"},{"key":"e_1_3_2_1_18_1","first-page":"931","article-title":"A Full RNS Variant of Approximate Homomorphic Encryption","volume":"2018","author":"Cheon Jung Hee","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_21_1","unstructured":"Edward Chou Josh Beal Daniel Levy Serena Yeung Albert Haque and Li Fei-Fei. 2018. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. arXiv preprint arXiv:1811.09953 (2018).  Edward Chou Josh Beal Daniel Levy Serena Yeung Albert Haque and Li Fei-Fei. 2018. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. arXiv preprint arXiv:1811.09953 (2018)."},{"key":"e_1_3_2_1_22_1","volume-title":"Binaryconnect: Training deep neural networks with binary weights during propagations. In Advances in neural information processing systems. 3123--3131.","author":"Courbariaux Matthieu","year":"2015"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/99.660313"},{"key":"e_1_3_2_1_24_1","unstructured":"Morten Dahl Jason Mancuso Yann Dupis Ben Decoste Morgan Giraud Ian Livingstone Justin Patriquin and Gavin Uhma. 2018. Private Machine Learning in TensorFlow using Secure Computation. arXiv preprint arXiv:1810.08130 (2018).  Morten Dahl Jason Mancuso Yann Dupis Ben Decoste Morgan Giraud Ian Livingstone Justin Patriquin and Gavin Uhma. 2018. Private Machine Learning in TensorFlow using Secure Computation. arXiv preprint arXiv:1810.08130 (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"Chet: Compiler and runtime for homomorphic evaluation of tensor programs. arXiv preprint arXiv:1810.00845","author":"Dathathri Roshan","year":"2018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS.  Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_27_1","unstructured":"Craig Gentry and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. Stanford University Stanford.  Craig Gentry and Dan Boneh. 2009. A fully homomorphic encryption scheme. Vol. 20. Stanford University Stanford."},{"key":"e_1_3_2_1_28_1","volume-title":"International Conference on Machine Learning. 201--210","author":"Gilad-Bachrach Ran","year":"2016"},{"key":"e_1_3_2_1_29_1","volume-title":"Algorithms in HElib. In International Cryptology Conference. Springer, 554--571","author":"Halevi Shai","year":"2014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"e_1_3_2_1_31_1","unstructured":"Ehsan Hesamifard Hassan Takabi and Mehdi Ghasemi. 2017. CryptoDL: Deep Neural Networks over Encrypted Data. arXiv preprint arXiv:1711.05189 (2017).  Ehsan Hesamifard Hassan Takabi and Mehdi Ghasemi. 2017. CryptoDL: Deep Neural Networks over Encrypted Data. arXiv preprint arXiv:1711.05189 (2017)."},{"key":"e_1_3_2_1_32_1","unstructured":"Alan Turing Institute. 2018. SHEEP is a Homomorphic Encryption Evaluation Platform. Retrieved 2019-03-25 from https:\/\/github.com\/alan-turing-institute\/SHEEP  Alan Turing Institute. 2018. SHEEP is a Homomorphic Encryption Evaluation Platform. Retrieved 2019-03-25 from https:\/\/github.com\/alan-turing-institute\/SHEEP"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_1_34_1","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th (USENIX) Security Symposium (USENIX) Security 18)","author":"Juvekar Chiraag","year":"2018"},{"key":"e_1_3_2_1_35_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2014. The CIFAR-10 dataset. online: http:\/\/www.cs.toronto.edu\/kriz\/cifar.html (2014).  Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2014. The CIFAR-10 dataset. online: http:\/\/www.cs.toronto.edu\/kriz\/cifar.html (2014)."},{"key":"e_1_3_2_1_37_1","unstructured":"Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/ (1998).  Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/ (1998)."},{"key":"e_1_3_2_1_38_1","volume-title":"Cryptographers' Track at the RSA Conference","author":"Lindner Richard"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_41_1","unstructured":"Jason Mancuso. 2019. Privacy-Preserving Machine Learning 2018: A Year in Review. Retrieved 2019-03-25 from https:\/\/medium.com\/dropoutlabs\/privacy-preserving-machine-learning-2018-a-year-in-review-b6345a95ae0f  Jason Mancuso. 2019. Privacy-Preserving Machine Learning 2018: A Year in Review. Retrieved 2019-03-25 from https:\/\/medium.com\/dropoutlabs\/privacy-preserving-machine-learning-2018-a-year-in-review-b6345a95ae0f"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"key":"e_1_3_2_1_43_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. In NIPS-W.  Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. In NIPS-W."},{"key":"e_1_3_2_1_44_1","unstructured":"Ronald L. Rivest Len Adleman and Michael L. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4 11 (1978) 169--180.  Ronald L. Rivest Len Adleman and Michael L. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4 11 (1978) 169--180."},{"key":"e_1_3_2_1_45_1","unstructured":"Kurt Rohlof. 2018. The PALISADE Lattice Cryptography Library. Retrieved 2019-03-25 from https:\/\/git.njit.edu\/palisade\/PALISADE  Kurt Rohlof. 2018. The PALISADE Lattice Cryptography Library. Retrieved 2019-03-25 from https:\/\/git.njit.edu\/palisade\/PALISADE"},{"key":"e_1_3_2_1_46_1","unstructured":"Theo Ryffel Andrew Trask Morten Dahl Bobby Wagner Jason Mancuso Daniel Rueckert and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017 (2018).  Theo Ryffel Andrew Trask Morten Dahl Bobby Wagner Jason Mancuso Daniel Rueckert and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017 (2018)."},{"key":"e_1_3_2_1_47_1","volume-title":"International Conference on Machine Learning. 4497--4506","author":"Sanyal Amartya","year":"2018"},{"key":"e_1_3_2_1_48_1","unstructured":"Sai Sri Sathya Praneeth Vepakomma Ramesh Raskar Ranjan Ramachandra and Santanu Bhattacharya. 2018. A Review of Homomorphic Encryption Libraries for Secure Computation. arXiv preprint arXiv:1812.02428 (2018).  Sai Sri Sathya Praneeth Vepakomma Ramesh Raskar Ranjan Ramachandra and Santanu Bhattacharya. 2018. A Review of Homomorphic Encryption Libraries for Secure Computation. arXiv preprint arXiv:1812.02428 (2018)."},{"key":"e_1_3_2_1_49_1","unstructured":"Arjun K. Bansal Scott Cyphers Anahita Bhiwandiwalla Jayaram Bobba Matthew Brookhart Avijit Chakraborty William Constable Christian Convey Leona Cook Omar Kanawi Robert Kimball Jason Knight Nikolay Korovaiko Varun Kumar Yixing Lao Christopher R. Lishka Jaikrishnan Menon Jennifer Myers Sandeep Aswath Narayana Adam Procter and Tristan J. Webb. 2018. Intel nGraph: An Intermediate Representation Compiler and Executor for Deep Learning. CoRR abs\/1801.08058 (2018). arXiv:1801.08058 http:\/\/arxiv.org\/abs\/1801.08058  Arjun K. Bansal Scott Cyphers Anahita Bhiwandiwalla Jayaram Bobba Matthew Brookhart Avijit Chakraborty William Constable Christian Convey Leona Cook Omar Kanawi Robert Kimball Jason Knight Nikolay Korovaiko Varun Kumar Yixing Lao Christopher R. Lishka Jaikrishnan Menon Jennifer Myers Sandeep Aswath Narayana Adam Procter and Tristan J. Webb. 2018. Intel nGraph: An Intermediate Representation Compiler and Executor for Deep Learning. CoRR abs\/1801.08058 (2018). arXiv:1801.08058 http:\/\/arxiv.org\/abs\/1801.08058"},{"key":"e_1_3_2_1_50_1","unstructured":"Nigel P. Smart and Fan Vercauteren. 2011. Fully Homomorphic SIMD Operations. Cryptology ePrint Archive Report 2011\/133. (2011). https:\/\/eprint.iacr.org\/2011\/133.  Nigel P. Smart and Fan Vercauteren. 2011. Fully Homomorphic SIMD Operations. Cryptology ePrint Archive Report 2011\/133. (2011). https:\/\/eprint.iacr.org\/2011\/133."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of workshop on machine learning systems (LearningSys) in the twenty-ninth annual conference on neural information processing systems (NIPS)","volume":"5","author":"Tokui Seiya","year":"2015"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_17"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Paul Voigt and Axel Von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR). Vol. 18. Springer.   Paul Voigt and Axel Von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR). Vol. 18. Springer.","DOI":"10.1007\/978-3-319-57959-7"},{"key":"e_1_3_2_1_55_1","unstructured":"Casimir Wierzynski and Abigail Wen. 2018. Advancing both A.I. and privacy is not a zero-sum game. Retrieved 2019-03-25 from http:\/\/fortune.com\/2018\/12\/27\/ai-privacy  Casimir Wierzynski and Abigail Wen. 2018. Advancing both A.I. and privacy is not a zero-sum game. Retrieved 2019-03-25 from http:\/\/fortune.com\/2018\/12\/27\/ai-privacy"},{"key":"e_1_3_2_1_56_1","unstructured":"Kyle Wiggers. 2018. A.I. Weekly: 8 takeaways from NeurIPS 2018. Retrieved 2019-03-25 from https:\/\/venturebeat.com\/2018\/12\/07\/ai-weekly-8-takeaways-from-neurips-2018\/  Kyle Wiggers. 2018. A.I. Weekly: 8 takeaways from NeurIPS 2018. Retrieved 2019-03-25 from https:\/\/venturebeat.com\/2018\/12\/07\/ai-weekly-8-takeaways-from-neurips-2018\/"},{"key":"e_1_3_2_1_57_1","unstructured":"Yu Yang Longfei Qiao etal 2018. Baidu Parallel Distributed Deep Learning. Retrieved 2019-03-25 from https:\/\/github.com\/PaddlePaddle\/Paddle  Yu Yang Longfei Qiao et al. 2018. Baidu Parallel Distributed Deep Learning. Retrieved 2019-03-25 from https:\/\/github.com\/PaddlePaddle\/Paddle"}],"event":{"name":"CF '19: Computing Frontiers Conference","location":"Alghero Italy","acronym":"CF '19","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 16th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3310273.3323047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3310273.3323047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:17Z","timestamp":1750212797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3310273.3323047"}},"subtitle":["a graph compiler for deep learning on homomorphically encrypted data"],"short-title":[],"issued":{"date-parts":[[2019,4,30]]},"references-count":53,"alternative-id":["10.1145\/3310273.3323047","10.1145\/3310273"],"URL":"https:\/\/doi.org\/10.1145\/3310273.3323047","relation":{},"subject":[],"published":{"date-parts":[[2019,4,30]]},"assertion":[{"value":"2019-04-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}