{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:16:39Z","timestamp":1778606199857,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411501.3419418","type":"proceedings-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T03:22:57Z","timestamp":1604460177000},"page":"27-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":186,"title":["Delphi"],"prefix":"10.1145","author":[{"given":"Pratyush","family":"Mishra","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Ryan","family":"Lehmkuhl","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Akshayaram","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Wenting","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Raluca Ada","family":"Popa","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"CCS '16","author":"Abadi M.","unstructured":"M. Abadi , A. Chu , I. J. Goodfellow , H. B. McMahan , I. Mironov , K. Talwar , and L. Zhang . ' Deep Learning with Differential Privacy '. In: CCS '16 . M. Abadi, A. Chu, I. J. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang. 'Deep Learning with Differential Privacy'. In: CCS '16."},{"key":"e_1_3_2_2_2_1","volume-title":"IJSN","author":"Ateniese G.","year":"2015","unstructured":"G. Ateniese , L. V. Mancini , A. Spognardi , A. Villani , D. Vitali , and G. Felici . ' Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers '. In: IJSN ( 2015 ). G. Ateniese, L. V. Mancini, A. Spognardi, A. Villani, D. Vitali, and G. Felici. 'Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers'. In: IJSN (2015)."},{"key":"e_1_3_2_2_3_1","unstructured":"B. Barrett. 'The year Alexa grew up'. https:\/\/www.wired. com\/story\/amazon-alexa-2018-machine-learning\/.  B. Barrett. 'The year Alexa grew up'. https:\/\/www.wired. com\/story\/amazon-alexa-2018-machine-learning\/."},{"key":"e_1_3_2_2_4_1","volume-title":"CRYPTO '95","author":"Beaver D.","unstructured":"D. Beaver . ' Precomputing Oblivious Transfer' . In: CRYPTO '95 . D. Beaver. 'Precomputing Oblivious Transfer'. In: CRYPTO '95."},{"key":"e_1_3_2_2_5_1","volume-title":"Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference'. ArXiV, cs.CR","author":"Chou E.","year":"1811","unstructured":"E. Chou , J. Beal , D. Levy , S. Yeung , A. Haque , and L. FeiFei . ' Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference'. ArXiV, cs.CR 1811 .09953. E. Chou, J. Beal, D. Levy, S. Yeung, A. Haque, and L. FeiFei. 'Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference'. ArXiV, cs.CR 1811.09953."},{"key":"e_1_3_2_2_6_1","volume-title":"IEEE Trans. on Inf. Theory","author":"Elgamal T.","year":"1985","unstructured":"T. Elgamal . ' A public key cryptosystem and a signature scheme based on discrete logarithms'. In: IEEE Trans. on Inf. Theory ( 1985 ). T. Elgamal. 'A public key cryptosystem and a signature scheme based on discrete logarithms'. In: IEEE Trans. on Inf. Theory (1985)."},{"key":"e_1_3_2_2_7_1","volume-title":"JMLR","author":"Elsken T.","year":"2019","unstructured":"T. Elsken , J. H. Metzen , and F. Hutter . ' Neural Architecture Search: A Survey '. In: JMLR ( 2019 ). T. Elsken, J. H. Metzen, and F. Hutter. 'Neural Architecture Search: A Survey'. In: JMLR (2019)."},{"key":"e_1_3_2_2_9_1","volume-title":"CCS '15","author":"Fredrikson M.","unstructured":"M. Fredrikson , S. Jha , and T. Ristenpart . ' Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures '. In: CCS '15 . M. Fredrikson, S. Jha, and T. Ristenpart. 'Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures'. In: CCS '15."},{"key":"e_1_3_2_2_10_1","volume-title":"USENIX Security '14","author":"Fredrikson M.","unstructured":"M. Fredrikson , E. Lantz , S. Jha , S. Lin , D. Page , and T. Ristenpart . ' Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing '. In: USENIX Security '14 . M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart. 'Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing'. In: USENIX Security '14."},{"key":"e_1_3_2_2_11_1","volume-title":"NIPS '17","author":"Ghodsi Z.","unstructured":"Z. Ghodsi , T. Gu , and S. Garg . ' SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud '. In: NIPS '17 . Z. Ghodsi, T. Gu, and S. Garg. 'SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud'. In: NIPS '17."},{"key":"e_1_3_2_2_12_1","volume-title":"ICML '16","author":"Gilad-Bachrach R.","unstructured":"R. Gilad-Bachrach , N. Dowlin , K. Laine , K. Lauter , M. Naehrig , and J. Wernsing . ' CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy '. In: ICML '16 . R. Gilad-Bachrach, N. Dowlin, K. Laine, K. Lauter, M. Naehrig, and J. Wernsing. 'CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy'. In: ICML '16."},{"key":"e_1_3_2_2_13_1","volume-title":"STOC '87","author":"Goldreich O.","unstructured":"O. Goldreich , S. Micali , and A. Wigderson . ' How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority '. In: STOC '87 . O. Goldreich, S. Micali, and A. Wigderson. 'How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority'. In: STOC '87."},{"key":"e_1_3_2_2_14_1","unstructured":"Google. 'Google Lens'. https:\/\/lens.google.com\/.  Google. 'Google Lens'. https:\/\/lens.google.com\/."},{"key":"e_1_3_2_2_15_1","volume-title":"CVPR '16","author":"He K.","unstructured":"K. He , X. Zhang , S. Ren , and J. Sun . ' Deep Residual Learning for Image Recognition '. In: CVPR '16 . K. He, X. Zhang, S. Ren, and J. Sun. 'Deep Residual Learning for Image Recognition'. In: CVPR '16."},{"key":"e_1_3_2_2_16_1","volume-title":"USENIX '18","author":"Juvekar C.","unstructured":"C. Juvekar , V. Vaikuntanathan , and A. Chandrakasan . ' GAZELLE: A Low Latency Framework for Secure Neural Network Inference '. In: USENIX '18 . C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan. 'GAZELLE: A Low Latency Framework for Secure Neural Network Inference'. In: USENIX '18."},{"key":"e_1_3_2_2_17_1","unstructured":"Kuna. 'Kuna AI'. https:\/\/getkuna.com\/blogs\/news\/2017-05-24-introducing-kuna-ai.  Kuna. 'Kuna AI'. https:\/\/getkuna.com\/blogs\/news\/2017-05-24-introducing-kuna-ai."},{"key":"e_1_3_2_2_18_1","volume-title":"CCS '17","author":"Liu J.","unstructured":"J. Liu , M. Juuti , Y. Lu , and N. Asokan . ' Oblivious Neural Network Predictions via MiniONN Transformations '. In: CCS '17 . J. Liu, M. Juuti, Y. Lu, and N. Asokan. 'Oblivious Neural Network Predictions via MiniONN Transformations'. In: CCS '17."},{"key":"e_1_3_2_2_19_1","volume-title":"Neurocomputing","author":"Liu W.","year":"2017","unstructured":"W. Liu , Z. Wang , X. Liu , N. Zeng , Y. Liu , and F. E. Alsaadi . ' A survey of deep neural network architectures and their applications '. In: Neurocomputing ( 2017 ). W. Liu, Z. Wang, X. Liu, N. Zeng, Y. Liu, and F. E. Alsaadi. 'A survey of deep neural network architectures and their applications'. In: Neurocomputing (2017)."},{"key":"e_1_3_2_2_20_1","unstructured":"P. Mohassel and Y. Zhang. 'SecureML: A System for Scalable Privacy-Preserving Machine Learning'. In: IEEE S&P '17.  P. Mohassel and Y. Zhang. 'SecureML: A System for Scalable Privacy-Preserving Machine Learning'. In: IEEE S&P '17."},{"key":"e_1_3_2_2_21_1","volume-title":"EUROCRYPT '99","author":"Paillier P.","unstructured":"P. Paillier . ' Public-Key Cryptosystems Based on Composite Degree Residuosity Classes' . In: EUROCRYPT '99 . P. Paillier. 'Public-Key Cryptosystems Based on Composite Degree Residuosity Classes'. In: EUROCRYPT '99."},{"key":"e_1_3_2_2_22_1","volume-title":"JACM","author":"Regev O.","year":"2009","unstructured":"O. Regev . ' On lattices, learning with errors, random linear codes, and cryptography '. In: JACM ( 2009 ). O. Regev. 'On lattices, learning with errors, random linear codes, and cryptography'. In: JACM (2009)."},{"key":"e_1_3_2_2_23_1","volume-title":"CCS '15","author":"Shokri R.","unstructured":"R. Shokri and V. Shmatikov . ' Privacy-Preserving Deep Learning '. In: CCS '15 . R. Shokri and V. Shmatikov. 'Privacy-Preserving Deep Learning'. In: CCS '15."},{"key":"e_1_3_2_2_24_1","volume-title":"USENIX Security '16","author":"Tram\u00e8r F.","unstructured":"F. Tram\u00e8r , F. Zhang , A. Juels , M. K. Reiter , and T. Ristenpart . ' Stealing Machine Learning Models via Prediction APIs '. In: USENIX Security '16 . F. Tram\u00e8r, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. 'Stealing Machine Learning Models via Prediction APIs'. In: USENIX Security '16."},{"key":"e_1_3_2_2_25_1","first-page":"01392","author":"Wistuba M.","year":"1905","unstructured":"M. Wistuba , A. Rawat , and T. Pedapati . 'A Survey on Neural Architecture Search'. ArXiV, cs.LG 1905 . 01392 . M. Wistuba, A. Rawat, and T. Pedapati. 'A Survey on Neural Architecture Search'. ArXiV, cs.LG 1905.01392.","journal-title":"'A Survey on Neural Architecture Search'. ArXiV, cs.LG"},{"key":"e_1_3_2_2_26_1","volume-title":"CSF '16","author":"Wu X.","unstructured":"X. Wu , M. Fredrikson , S. Jha , and J. F. Naughton . ' A Methodology for Formalizing Model-Inversion Attacks '. In: CSF '16 . X. Wu, M. Fredrikson, S. Jha, and J. F. Naughton. 'A Methodology for Formalizing Model-Inversion Attacks'. In: CSF '16."},{"key":"e_1_3_2_2_27_1","unstructured":"'Wyze: Contact and Motion Sensors for Your Home'. https: \/\/www.wyze.com\/.  'Wyze: Contact and Motion Sensors for Your Home'. https: \/\/www.wyze.com\/."},{"key":"e_1_3_2_2_28_1","volume-title":"FOCS '86","author":"Yao A. C.","unstructured":"A. C. Yao . ' How to Generate and Exchange Secrets ( Extended Abstract)'. In: FOCS '86 . A. C. Yao. 'How to Generate and Exchange Secrets (Extended Abstract)'. In: FOCS '86."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411501.3419418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411501.3419418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411501.3419418"}},"subtitle":["A Cryptographic Inference System for Neural Networks"],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":27,"alternative-id":["10.1145\/3411501.3419418","10.1145\/3411501"],"URL":"https:\/\/doi.org\/10.1145\/3411501.3419418","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}