{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:30:47Z","timestamp":1752229847359,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011199","name":"European Research Council","doi-asserted-by":"publisher","award":["850990"],"award-info":[{"award-number":["850990"]}],"id":[{"id":"10.13039\/100011199","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hessisches Ministerium f\u00fcr Bildung und Kunst","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB"],"award-info":[{"award-number":["SFB"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["01IS18043B"],"award-info":[{"award-number":["01IS18043B"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411501.3419417","type":"proceedings-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T03:22:57Z","timestamp":1604460177000},"page":"9-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["CryptoSPN"],"prefix":"10.1145","author":[{"given":"Amos","family":"Treiber","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Alejandro","family":"Molina","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Christian","family":"Weinert","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Kristian","family":"Kersting","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09346-z"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2465955"},{"key":"e_1_3_2_1_3_1","unstructured":"Galen Andrew Steve Chien and Nicolas Papernot. 2019. TensorFlow Privacy. https:\/\/github.com\/tensorflow\/privacy.  Galen Andrew Steve Chien and Nicolas Papernot. 2019. TensorFlow Privacy. https:\/\/github.com\/tensorflow\/privacy."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9236-6"},{"key":"e_1_3_2_1_5_1","unstructured":"Assi Barak Daniel Escudero Anders Dalskov and Marcel Keller. 2019. Secure Evaluation of Quantized Neural Networks.  Assi Barak Daniel Escudero Anders Dalskov and Marcel Keller. 2019. Secure Evaluation of Quantized Neural Networks."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108650"},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Availability, Reliability and Security (ARES).","author":"Boemer Fabian","year":"2020","unstructured":"Fabian Boemer , Rosario Cammarota , Daniel Demmler , Thomas Schneider , and Hossein Yalame . 2020 . MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference . In International Conference on Availability, Reliability and Security (ARES). Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, and Hossein Yalame. 2020. MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference. In International Conference on Availability, Reliability and Security (ARES)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_3_2_1_10_1","volume-title":"On Relaxing Determinism in Arithmetic Circuits. In International Conference on Machine Learning (ICML).","author":"Choi Arthur","year":"2017","unstructured":"Arthur Choi and Adnan Darwiche . 2017 . On Relaxing Determinism in Arithmetic Circuits. In International Conference on Machine Learning (ICML). Arthur Choi and Adnan Darwiche. 2017. On Relaxing Determinism in Arithmetic Circuits. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_11_1","volume-title":"Yixing Lao, Christopher R. Lishka, Jaikrishnan Menon, Jennifer Myers, Sandeep Aswath Narayana, Adam Procter, and Tristan J. Webb.","author":"Cyphers Scott","year":"2018","unstructured":"Scott Cyphers , Arjun K. Bansal , Anahita Bhiwandiwalla , Jayaram Bobba , Matthew Brookhart , Avijit Chakraborty , William Constable , Christian Convey , Leona Cook , Omar Kanawi , Robert Kimball , Jason Knight , Nikolay Korovaiko , Varun Kumar Vijay , Yixing Lao, Christopher R. Lishka, Jaikrishnan Menon, Jennifer Myers, Sandeep Aswath Narayana, Adam Procter, and Tristan J. Webb. 2018 . Intel nGraph: An Intermediate Representation, Compiler, and Executor for Deep Learning . arXiv preprint arXiv:1801.08058. Scott Cyphers, Arjun K. Bansal, Anahita Bhiwandiwalla, Jayaram Bobba, Matthew Brookhart, Avijit Chakraborty, William Constable, Christian Convey, Leona Cook, Omar Kanawi, Robert Kimball, Jason Knight, Nikolay Korovaiko, Varun Kumar Vijay, Yixing Lao, Christopher R. Lishka, Jaikrishnan Menon, Jennifer Myers, Sandeep Aswath Narayana, Adam Procter, and Tristan J. Webb. 2018. Intel nGraph: An Intermediate Representation, Compiler, and Executor for Deep Learning. arXiv preprint arXiv:1801.08058."},{"key":"e_1_3_2_1_12_1","unstructured":"Morten Dahl Jason Mancuso Yann Dupis Ben Decoste Morgan Giraud Ian Livingstone Justin Patriquin and Gavin Uhma. 2018. Private Machine Learning in TensorFlow using Secure Computation. arXiv preprint arXiv:1810.08130.  Morten Dahl Jason Mancuso Yann Dupis Ben Decoste Morgan Giraud Ian Livingstone Justin Patriquin and Gavin Uhma. 2018. Private Machine Learning in TensorFlow using Secure Computation. arXiv preprint arXiv:1810.08130."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813678"},{"key":"e_1_3_2_1_14_1","volume-title":"ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In Network and Distributed System Security Symposium (NDSS).","author":"Demmler Daniel","year":"2015","unstructured":"Daniel Demmler , Thomas Schneider , and Michael Zohner . 2015 b. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In Network and Distributed System Security Symposium (NDSS). Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015b. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_15_1","volume-title":"Learning the Structure of Sum-Product Networks. In International Conference on Machine Learning (ICML).","author":"Gens Robert","year":"2013","unstructured":"Robert Gens and Pedro M Domingos . 2013 . Learning the Structure of Sum-Product Networks. In International Conference on Machine Learning (ICML). Robert Gens and Pedro M Domingos. 2013. Learning the Structure of Sum-Product Networks. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Zoubin Ghahramani. 2015. Probabilistic machine learning and artificial intelligence. Nature.  Zoubin Ghahramani. 2015. Probabilistic machine learning and artificial intelligence. Nature.","DOI":"10.1038\/nature14541"},{"key":"e_1_3_2_1_17_1","unstructured":"Ran Gilad-Bachrach Nathan Dowlin Kim Laine Kristin E Lauter Michael Naehrig and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In ICML.  Ran Gilad-Bachrach Nathan Dowlin Kim Laine Kristin E Lauter Michael Naehrig and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In ICML."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Bryce Goodman and Seth Flaxman. 2017. European Union regulations on algorithmic decision-making and a 'right to explanation'. AI Magazine.  Bryce Goodman and Seth Flaxman. 2017. European Union regulations on algorithmic decision-making and a 'right to explanation'. AI Magazine.","DOI":"10.1609\/aimag.v38i3.2741"},{"key":"e_1_3_2_1_19_1","unstructured":"David Gunning Awni Hannun Mark Ibrahim Brian Knott Laurens van der Maaten Vinicius Reis Shubho Sengupta Shobha Venkataraman and Xing Zhou. 2019. CrypTen: A new research tool for secure machine learning with PyTorch. https:\/\/ai.facebook.com\/blog\/crypten-a-new-research-tool-for-secure-machine-learning-with-pytorch\/.  David Gunning Awni Hannun Mark Ibrahim Brian Knott Laurens van der Maaten Vinicius Reis Shubho Sengupta Shobha Venkataraman and Xing Zhou. 2019. CrypTen: A new research tool for secure machine learning with PyTorch. https:\/\/ai.facebook.com\/blog\/crypten-a-new-research-tool-for-secure-machine-learning-with-pytorch\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/3384345.3384349"},{"key":"e_1_3_2_1_21_1","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security.","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"\u00c1gnes Kiss Masoud Naderpour Jian Liu N Asokan and Thomas Schneider. 2019. SoK: Modular and efficient private decision tree evaluation. Privacy Enhancing Technologies (PETs).  \u00c1gnes Kiss Masoud Naderpour Jian Liu N Asokan and Thomas Schneider. 2019. SoK: Modular and efficient private decision tree evaluation. Privacy Enhancing Technologies (PETs).","DOI":"10.2478\/popets-2019-0026"},{"key":"e_1_3_2_1_23_1","unstructured":"Vladimir Kolesnikov and Thomas Schneider. 2008. A practical universal circuit construction and secure evaluation of private functions. In Financial Cryptography and Data Security (FC).  Vladimir Kolesnikov and Thomas Schneider. 2008. A practical universal circuit construction and secure evaluation of private functions. In Financial Cryptography and Data Security (FC)."},{"volume-title":"Probabilistic Graphical Models: Principles and Techniques","author":"Koller Daphne","key":"e_1_3_2_1_24_1","unstructured":"Daphne Koller and Nir Friedman . 2009. Probabilistic Graphical Models: Principles and Techniques . MIT Press . Daphne Koller and Nir Friedman. 2009. Probabilistic Graphical Models: Principles and Techniques. MIT Press."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9107-0"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_28_1","unstructured":"Dahlia Malkhi Noam Nisan Benny Pinkas and Yaron Sella. 2004. Fairplay - A Secure Two-Party Computation System.. In USENIX Security.  Dahlia Malkhi Noam Nisan Benny Pinkas and Yaron Sella. 2004. Fairplay - A Secure Two-Party Computation System.. In USENIX Security."},{"key":"e_1_3_2_1_29_1","volume-title":"DELPHI: A Cryptographic Inference Service for Neural Networks. In USENIX Security.","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra , Ryan Lehmkuhl , Akshayaram Srinivasan , Wenting Zheng , and Raluca Ada Popa . 2020 . DELPHI: A Cryptographic Inference Service for Neural Networks. In USENIX Security. Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. DELPHI: A Cryptographic Inference Service for Neural Networks. In USENIX Security."},{"key":"e_1_3_2_1_30_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Mohassel Payman","year":"2018","unstructured":"Payman Mohassel and Peter Rindal . 2018 . ABY3: A mixed protocol framework for machine learning . In ACM SIGSAC Conference on Computer and Communications Security (CCS). Payman Mohassel and Peter Rindal. 2018. ABY3: A mixed protocol framework for machine learning. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_32_1","volume-title":"Poisson Sum-Product Networks: A Deep Architecture for Tractable Multivariate Poisson Distributions. In AAAI Conference on Artificial Intelligence (AAAI).","author":"Molina Alejandro","year":"2017","unstructured":"Alejandro Molina , Sriraam Natarajan , and Kristian Kersting . 2017 . Poisson Sum-Product Networks: A Deep Architecture for Tractable Multivariate Poisson Distributions. In AAAI Conference on Artificial Intelligence (AAAI). Alejandro Molina, Sriraam Natarajan, and Kristian Kersting. 2017. Poisson Sum-Product Networks: A Deep Architecture for Tractable Multivariate Poisson Distributions. In AAAI Conference on Artificial Intelligence (AAAI)."},{"key":"e_1_3_2_1_33_1","volume-title":"Pascal Poupart, and Kristian Kersting.","author":"Molina Alejandro","year":"2019","unstructured":"Alejandro Molina , Antonio Vergari , Karl Stelzner , Robert Peharz , Pranav Subramani , Nicola Di Mauro , Pascal Poupart, and Kristian Kersting. 2019 . SPFlow: An Easy and Extensible Library for Deep Probabilistic Learning using Sum-Product Networks. arXiv preprint arXiv:1901.03704. Alejandro Molina, Antonio Vergari, Karl Stelzner, Robert Peharz, Pranav Subramani, Nicola Di Mauro, Pascal Poupart, and Kristian Kersting. 2019. SPFlow: An Easy and Extensible Library for Deep Probabilistic Learning using Sum-Product Networks. arXiv preprint arXiv:1901.03704."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Claudio Orlandi Alessandro Piva and Mauro Barni. 2007. Oblivious neural network computing via homomorphic encryption. EURASIP Journal on Information Security.  Claudio Orlandi Alessandro Piva and Mauro Barni. 2007. Oblivious neural network computing via homomorphic encryption. EURASIP Journal on Information Security.","DOI":"10.1155\/2007\/37343"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854292"},{"key":"e_1_3_2_1_36_1","volume-title":"Conference on Uncertainty in Artificial Intelligence (UAI).","author":"Peharz Robert","year":"2019","unstructured":"Robert Peharz , Antonio Vergari , Karl Stelzner , Alejandro Molina , Xiaoting Shao , Martin Trapp , Kristian Kersting , and Zoubin Ghahramani . 2019 . Random Sum-Product Networks: A Simple and Effective Approach to Probabilistic Deep Learning . In Conference on Uncertainty in Artificial Intelligence (UAI). Robert Peharz, Antonio Vergari, Karl Stelzner, Alejandro Molina, Xiaoting Shao, Martin Trapp, Kristian Kersting, and Zoubin Ghahramani. 2019. Random Sum-Product Networks: A Simple and Effective Approach to Probabilistic Deep Learning. In Conference on Uncertainty in Artificial Intelligence (UAI)."},{"key":"e_1_3_2_1_37_1","volume-title":"Sum-Product Networks: A New Deep Architecture. In Conference on Uncertainty in Artificial Intelligence (UAI).","author":"Poon Hoifung","year":"2011","unstructured":"Hoifung Poon and Pedro M Domingos . 2011 . Sum-Product Networks: A New Deep Architecture. In Conference on Uncertainty in Artificial Intelligence (UAI). Hoifung Poon and Pedro M Domingos. 2011. Sum-Product Networks: A New Deep Architecture. In Conference on Uncertainty in Artificial Intelligence (UAI)."},{"key":"e_1_3_2_1_38_1","volume-title":"XONN: XNOR-based Oblivious Deep Neural Network Inference. In USENIX Security.","author":"Riazi M Sadegh","year":"2019","unstructured":"M Sadegh Riazi , Mohammad Samragh , Hao Chen , Kim Laine , Kristin Lauter , and Farinaz Koushanfar . 2019 . XONN: XNOR-based Oblivious Deep Neural Network Inference. In USENIX Security. M Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In USENIX Security."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_40_1","unstructured":"Theo Ryffel Andrew Trask Morten Dahl Bobby Wagner Jason Mancuso Daniel Rueckert and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017.  Theo Ryffel Andrew Trask Morten Dahl Bobby Wagner Jason Mancuso Daniel Rueckert and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017."},{"key":"e_1_3_2_1_41_1","volume-title":"International Conference on Information Security and Cryptology (ICISC).","author":"Sadeghi Ahmad-Reza","year":"2008","unstructured":"Ahmad-Reza Sadeghi and Thomas Schneider . 2008 . Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification . In International Conference on Information Security and Cryptology (ICISC). Ahmad-Reza Sadeghi and Thomas Schneider. 2008. Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. In International Conference on Information Security and Cryptology (ICISC)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419417"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Leslie G Valiant. 1976. Universal circuits (preliminary report). In STOC.  Leslie G Valiant. 1976. Universal circuits (preliminary report). In STOC.","DOI":"10.1145\/800113.803649"},{"key":"e_1_3_2_1_44_1","unstructured":"Tim van Elsloo Giorgio Patrini and Hamish Ivey-Law. 2019. SEALion: A Framework for Neural Network Inference on Encrypted Data. arXiv preprint arXiv:1904.12840.  Tim van Elsloo Giorgio Patrini and Hamish Ivey-Law. 2019. SEALion: A Framework for Neural Network Inference on Encrypted Data. arXiv preprint arXiv:1904.12840."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Andrew Yao. 1986. How to generate and exchange secrets. In FOCS.  Andrew Yao. 1986. How to generate and exchange secrets. In FOCS.","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Zehuan Yuan Hao Wang Limin Wang Tong Lu Shivakumara Palaiahnakote and Chew Lim Tan. 2016. Modeling spatial layout for scene image understanding via a novel multiscale sum-product network. Expert Systems with Applications.  Zehuan Yuan Hao Wang Limin Wang Tong Lu Shivakumara Palaiahnakote and Chew Lim Tan. 2016. Modeling spatial layout for scene image understanding via a novel multiscale sum-product network. Expert Systems with Applications.","DOI":"10.1016\/j.eswa.2016.07.015"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411501.3419417","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411501.3419417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411501.3419417"}},"subtitle":["Expanding PPML beyond Neural Networks"],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":46,"alternative-id":["10.1145\/3411501.3419417","10.1145\/3411501"],"URL":"https:\/\/doi.org\/10.1145\/3411501.3419417","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}