{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:04:22Z","timestamp":1771697062127,"version":"3.50.1"},"reference-count":84,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T00:00:00Z","timestamp":1622592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Biotechnology","award":["BT\/PR33154\/AI\/133\/7\/2019 and BT\/ADV\/CANINEHEALTH\/GADVASU"],"award-info":[{"award-number":["BT\/PR33154\/AI\/133\/7\/2019 and BT\/ADV\/CANINEHEALTH\/GADVASU"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,6,23]]},"abstract":"<jats:p>The advancements in the Internet of Things (IoT) and cloud services have enabled the availability of smart e-healthcare services in a distant and distributed environment. However, this has also raised major privacy and efficiency concerns that need to be addressed. While sharing clinical data across the cloud that often consists of sensitive patient-related information, privacy is a major challenge. Adequate protection of patients\u2019 privacy helps to increase public trust in medical research. Additionally, DL-based models are complex, and in a cloud-based approach, efficient data processing in such models is complicated. To address these challenges, we propose an efficient and secure cancer diagnostic framework for histopathological image classification by utilizing both differential privacy and secure multi-party computation. For efficient computation, instead of performing the whole operation on the cloud, we decouple the layers into two modules: one for feature extraction using the VGGNet<jats:inline-formula><jats:alternatives><jats:tex-math\/><\/jats:alternatives><\/jats:inline-formula>module at the user side and the remaining layers for private prediction over the cloud. The efficacy of the framework is validated on two datasets composed of histopathological images of the canine mammary tumor and human breast cancer. The application of differential privacy preserving to the proposed model makes the model secure and capable of preserving the privacy of sensitive data from any adversary, without significantly compromising the model accuracy. Extensive experiments show that the proposed model efficiently achieves the trade-off between privacy and model performance.<\/jats:p>","DOI":"10.1145\/3424221","type":"journal-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T02:47:39Z","timestamp":1622688459000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9741-4020","authenticated-orcid":false,"given":"Abhinav","family":"Kumar","sequence":"first","affiliation":[{"name":"Indian Institute of Technology (BHU), Varanasi, Uttar Pradesh, India"}]},{"given":"Sanjay Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology (BHU), Varanasi, Uttar Pradesh, India"}]},{"given":"K","family":"Lakshmanan","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology (BHU), Varanasi, Uttar Pradesh, India"}]},{"given":"Sonal","family":"Saxena","sequence":"additional","affiliation":[{"name":"Indian Veterinary Research Institute, Izatnagar, Bareilly, Uttar Pradesh, India"}]},{"given":"Sameer","family":"Shrivastava","sequence":"additional","affiliation":[{"name":"Indian Veterinary Research Institute, Izatnagar, Bareilly, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2021,6,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_1_2_1","first-page":"8195","article-title":"Canine mammary tumors as a model for human disease","volume":"15","author":"Abdelmegeed Somaia M.","year":"2018","unstructured":"Somaia M. Abdelmegeed and Sulma Mohammed . 2018 . Canine mammary tumors as a model for human disease . Oncology Letters 15 , 6 (2018), 8195 \u2013 8205 . Somaia M. Abdelmegeed and Sulma Mohammed. 2018. Canine mammary tumors as a model for human disease. Oncology Letters 15, 6 (2018), 8195\u20138205.","journal-title":"Oncology Letters"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455674"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence47617.2020.9057841"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3322\/caac.21492"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243786"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0036"},{"key":"e_1_2_1_9_1","volume-title":"Dario Fiore, and Irene Giacomelli.","author":"Catalano Dario","year":"2019","unstructured":"Dario Catalano , Mario Di Raimondo , Dario Fiore, and Irene Giacomelli. 2019 . MonZ2ka: Fast Maliciously Secure Two Party Computation on Z2k. Technical Report. Cryptology ePrint Archive, Report 2019\/211. Dario Catalano, Mario Di Raimondo, Dario Fiore, and Irene Giacomelli. 2019. MonZ2ka: Fast Maliciously Secure Two Party Computation on Z2k. Technical Report. Cryptology ePrint Archive, Report 2019\/211."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00043"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981780.2981817"},{"key":"e_1_2_1_12_1","volume-title":"Private machine learning in tensorflow using secure computation. arXiv preprint arXiv:1810.08130","author":"Dahl Morten","year":"2018","unstructured":"Morten Dahl , Jason Mancuso , Yann Dupis , Ben Decoste , Morgan Giraud , Ian Livingstone , Justin Patriquin , and Gavin Uhma . 2018. Private machine learning in tensorflow using secure computation. arXiv preprint arXiv:1810.08130 ( 2018 ). Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, and Gavin Uhma. 2018. Private machine learning in tensorflow using secure computation. arXiv preprint arXiv:1810.08130 (2018)."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation. In NDSS. 1--5. Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation. In NDSS. 1--5.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_2_1_16_1","first-page":"1","article-title":"A tutorial survey of architectures, algorithms, and applications for deep learning","volume":"3","author":"Deng Li","year":"2014","unstructured":"Li Deng . 2014 . A tutorial survey of architectures, algorithms, and applications for deep learning . APSIPA Transactions on Signal and Information Processing 3 (2014), 1 -- 29 . DOI:10.1017\/atsip.2013.9 10.1017\/atsip.2013.9 Li Deng. 2014. A tutorial survey of architectures, algorithms, and applications for deep learning. APSIPA Transactions on Signal and Information Processing 3 (2014), 1--29. DOI:10.1017\/atsip.2013.9","journal-title":"APSIPA Transactions on Signal and Information Processing"},{"key":"e_1_2_1_17_1","volume-title":"Optimal differentially private ADMM for distributed machine learning. arXiv preprint arXiv:1901.02094","author":"Ding Jiahao","year":"2019","unstructured":"Jiahao Ding , Yanmin Gong , Chi Zhang , Miao Pan , and Zhu Han . 2019. Optimal differentially private ADMM for distributed machine learning. arXiv preprint arXiv:1901.02094 ( 2019 ). Jiahao Ding, Yanmin Gong, Chi Zhang, Miao Pan, and Zhu Han. 2019. Optimal differentially private ADMM for distributed machine learning. arXiv preprint arXiv:1901.02094 (2019)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_2_1_22_1","volume-title":"Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","author":"Geyer Robin C.","year":"2017","unstructured":"Robin C. Geyer , Tassilo Klein , and Moin Nabi . 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 ( 2017 ). Robin C. Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)."},{"key":"e_1_2_1_23_1","volume-title":"Secure multi-party computation. Manuscript. Preliminary Version 78","author":"Goldreich Oded","year":"1998","unstructured":"Oded Goldreich . 1998. Secure multi-party computation. Manuscript. Preliminary Version 78 ( 1998 ). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.11.2201. Oded Goldreich. 1998. Secure multi-party computation. Manuscript. Preliminary Version 78 (1998). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.11.2201."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1186\/1746-1596-9-121"},{"key":"e_1_2_1_26_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_2_1_27_1","first-page":"1","article-title":"Breast cancer multi-classification from histopathological images with structured deep learning model","volume":"7","author":"Han Zhongyi","year":"2017","unstructured":"Zhongyi Han , Benzheng Wei , Yuanjie Zheng , Yilong Yin , Kejian Li , and Shuo Li . 2017 . Breast cancer multi-classification from histopathological images with structured deep learning model . Scientific Reports 7 , 1 (2017), 1 \u2013 10 . Zhongyi Han, Benzheng Wei, Yuanjie Zheng, Yilong Yin, Kejian Li, and Shuo Li. 2017. Breast cancer multi-classification from histopathological images with structured deep learning model. Scientific Reports 7, 1 (2017), 1\u201310.","journal-title":"Scientific Reports"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277326"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.072"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.2995968"},{"key":"e_1_2_1_36_1","volume-title":"Cryptflow: Secure tensorflow inference. arXiv preprint arXiv:1909.07814","author":"Kumar Nishant","year":"2019","unstructured":"Nishant Kumar , Mayank Rathee , Nishanth Chandran , Divya Gupta , Aseem Rastogi , and Rahul Sharma . 2019 . Cryptflow: Secure tensorflow inference. arXiv preprint arXiv:1909.07814 (2019). Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma. 2019. Cryptflow: Secure tensorflow inference. arXiv preprint arXiv:1909.07814 (2019)."},{"key":"e_1_2_1_37_1","volume-title":"Deep learning. Nature 521, 7553","author":"LeCun Yann","year":"2015","unstructured":"Yann LeCun , Yoshua Bengio , and Geoffrey Hinton . 2015. Deep learning. Nature 521, 7553 ( 2015 ), 436\u2013444. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436\u2013444."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9107-0"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0560.2007.00970.x"},{"key":"e_1_2_1_42_1","volume-title":"A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210","author":"McMahan H. Brendan","year":"2018","unstructured":"H. Brendan McMahan , Galen Andrew , Ulfar Erlingsson , Steve Chien , Ilya Mironov , Nicolas Papernot , and Peter Kairouz . 2018. A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210 ( 2018 ). H. Brendan McMahan, Galen Andrew, Ulfar Erlingsson, Steve Chien, Ilya Mironov, Nicolas Papernot, and Peter Kairouz. 2018. A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210 (2018)."},{"key":"e_1_2_1_43_1","volume-title":"Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963","author":"McMahan H. Brendan","year":"2017","unstructured":"H. Brendan McMahan , Daniel Ramage , Kunal Talwar , and Li Zhang . 2017. Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963 ( 2017 ). H. Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2017. Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963 (2017)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_2_1_45_1","volume-title":"International Conference on Advanced Informatics for Computing Research. Springer, 772\u2013781","author":"\u00a0al Rajesh Mehra","year":"2018","unstructured":"Rajesh Mehra et \u00a0al . 2018 . Automatic magnification independent classification of breast cancer tissue in histological images using deep convolutional neural network . In International Conference on Advanced Informatics for Computing Research. Springer, 772\u2013781 . Rajesh Mehra et\u00a0al. 2018. Automatic magnification independent classification of breast cancer tissue in histological images using deep convolutional neural network. In International Conference on Advanced Informatics for Computing Research. Springer, 772\u2013781."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_2_1_47_1","first-page":"439","article-title":"Population-based incidence of mammary tumours in some dog breeds.Journal of Reproduction and Fertility","volume":"57","author":"Moe L.","year":"2001","unstructured":"L. Moe . 2001 . Population-based incidence of mammary tumours in some dog breeds.Journal of Reproduction and Fertility . Supplement 57 (2001), 439 \u2013 443 . L. Moe. 2001. Population-based incidence of mammary tumours in some dog breeds.Journal of Reproduction and Fertility. Supplement 57 (2001), 439\u2013443.","journal-title":"Supplement"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"e_1_2_1_51_1","volume-title":"Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Mart\u00edn Abadi , Ulfar Erlingsson , Ian Goodfellow , and Kunal Talwar . 2016. Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755 ( 2016 ). Nicolas Papernot, Mart\u00edn Abadi, Ulfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755 (2016)."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_2_1_54_1","volume-title":"Scalable private learning with pate. arXiv preprint arXiv:1802.08908","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot , Shuang Song , Ilya Mironov , Ananth Raghunathan , Kunal Talwar , and \u00dalfar Erlingsson . 2018. Scalable private learning with pate. arXiv preprint arXiv:1802.08908 ( 2018 ). Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and \u00dalfar Erlingsson. 2018. Scalable private learning with pate. arXiv preprint arXiv:1802.08908 (2018)."},{"key":"e_1_2_1_55_1","volume-title":"American Veterinary Medical Association. Retrieved","author":"Senior","year":"2020","unstructured":"Senior pets. American Veterinary Medical Association. Retrieved October 4, 2020 , from https:\/\/www.avma.org\/resources-tools\/pet-owners\/petcare\/senior-pets Senior pets. American Veterinary Medical Association. Retrieved October 4, 2020, from https:\/\/www.avma.org\/resources-tools\/pet-owners\/petcare\/senior-pets"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/3015812.3016005"},{"key":"e_1_2_1_57_1","volume-title":"Secure and robust machine learning for healthcare: A survey. arXiv preprint arXiv:2001.08103","author":"Qayyum Adnan","year":"2020","unstructured":"Adnan Qayyum , Junaid Qadir , Muhammad Bilal , and Ala Al-Fuqaha . 2020. Secure and robust machine learning for healthcare: A survey. arXiv preprint arXiv:2001.08103 ( 2020 ). Adnan Qayyum, Junaid Qadir, Muhammad Bilal, and Ala Al-Fuqaha. 2020. Secure and robust machine learning for healthcare: A survey. arXiv preprint arXiv:2001.08103 (2020)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_2_1_59_1","volume-title":"A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017","author":"Ryffel Theo","year":"2018","unstructured":"Theo Ryffel , Andrew Trask , Morten Dahl , Bobby Wagner , Jason Mancuso , Daniel Rueckert , and Jonathan Passerat-Palmbach . 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017 ( 2018 ). Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv preprint arXiv:1811.04017 (2018)."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0127381"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2536809"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"e_1_2_1_64_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_2_1_65_1","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/TCBB.2020.2980831","article-title":"Imbalanced breast cancer classification using transfer learning","volume":"18","author":"Singh R.","year":"2020","unstructured":"R. Singh , T. Ahmed , A. Kumar , A. K. Singh , A. K. Pandey , and S. K. Singh . 2020 . Imbalanced breast cancer classification using transfer learning . IEEE\/ACM Transactions on Computational Biology and Bioinformatics 18 , 1 (2020), 83 \u2013 93 . DOI:10.1109\/TCBB.2020.2980831 10.1109\/TCBB.2020.2980831 R. Singh, T. Ahmed, A. Kumar, A. K. Singh, A. K. Pandey, and S. K. Singh. 2020. Imbalanced breast cancer classification using transfer learning. IEEE\/ACM Transactions on Computational Biology and Bioinformatics 18, 1 (2020), 83\u201393. DOI:10.1109\/TCBB.2020.2980831","journal-title":"IEEE\/ACM Transactions on Computational Biology and Bioinformatics"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2018.8363568"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISISE.2008.212"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2015.2496264"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727519"},{"key":"e_1_2_1_70_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_2_1_71_1","volume-title":"CryptoSPN: Privacy-preserving sum-product network inference. arXiv preprint arXiv:2002.00801","author":"Treiber Amos","year":"2020","unstructured":"Amos Treiber , Alejandro Molina , Christian Weinert , Thomas Schneider , and Kristian Kersting . 2020. CryptoSPN: Privacy-preserving sum-product network inference. arXiv preprint arXiv:2002.00801 ( 2020 ). Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, and Kristian Kersting. 2020. CryptoSPN: Privacy-preserving sum-product network inference. arXiv preprint arXiv:2002.00801 (2020)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900197"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.80"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.43"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.prevetmed.2016.02.008"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_2_1_77_1","unstructured":"Christopher Waites. 2019. An Introduction to Differentially Private Deep Learning. https:\/\/chriswaites.com\/2019\/08\/01\/deep-learning-with-differential-privacy-tutorial.html Christopher Waites. 2019. An Introduction to Differentially Private Deep Learning. https:\/\/chriswaites.com\/2019\/08\/01\/deep-learning-with-differential-privacy-tutorial.html"},{"key":"e_1_2_1_78_1","volume-title":"Subsampled R\u2019enyi differential privacy and analytical moments accountant. arXiv preprint arXiv:1808.00087","author":"Wang Yu-Xiang","year":"2018","unstructured":"Yu-Xiang Wang , Borja Balle , and Shiva Kasiviswanathan . 2018. Subsampled R\u2019enyi differential privacy and analytical moments accountant. arXiv preprint arXiv:1808.00087 ( 2018 ). Yu-Xiang Wang, Borja Balle, and Shiva Kasiviswanathan. 2018. Subsampled R\u2019enyi differential privacy and analytical moments accountant. arXiv preprint arXiv:1808.00087 (2018)."},{"key":"e_1_2_1_79_1","volume-title":"Deep image: Scaling up image recognition. arXiv preprint arXiv:1501.02876 7, 8","author":"Wu Ren","year":"2015","unstructured":"Ren Wu , Shengen Yan , Yi Shan , Qingqing Dang , and Gang Sun . 2015. Deep image: Scaling up image recognition. arXiv preprint arXiv:1501.02876 7, 8 ( 2015 ). Ren Wu, Shengen Yan, Yi Shan, Qingqing Dang, and Gang Sun. 2015. Deep image: Scaling up image recognition. arXiv preprint arXiv:1501.02876 7, 8 (2015)."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.3389\/fgene.2019.00080"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_2_1_83_1","volume-title":"Obliv-C: A language for extensible data-oblivious computation. IACR Cryptology ePrint Archive","author":"Zahur Samee","year":"2015","unstructured":"Samee Zahur and David Evans . 2015. Obliv-C: A language for extensible data-oblivious computation. IACR Cryptology ePrint Archive 2015 , 1153 (2015). Samee Zahur and David Evans. 2015. Obliv-C: A language for extensible data-oblivious computation. IACR Cryptology ePrint Archive 2015, 1153 (2015)."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2014.2361481"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:51Z","timestamp":1750197711000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,2]]},"references-count":84,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6,23]]}},"alternative-id":["10.1145\/3424221"],"URL":"https:\/\/doi.org\/10.1145\/3424221","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,2]]},"assertion":[{"value":"2020-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}