{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T09:11:59Z","timestamp":1772874719974,"version":"3.50.1"},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T00:00:00Z","timestamp":1608163200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772042"],"award-info":[{"award-number":["61772042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2016YFB1000105"],"award-info":[{"award-number":["2016YFB1000105"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2020,12,17]]},"abstract":"<jats:p>Deep learning models have been deployed to a wide range of edge devices. Since the data distribution on edge devices may differ from the cloud where the model was trained, it is typically desirable to customize the model for each edge device to improve accuracy. However, such customization is hard because collecting data from edge devices is usually prohibited due to privacy concerns. In this paper, we propose PMC, a privacy-preserving model customization framework to effectively customize a CNN model from the cloud to edge devices without collecting raw data. Instead, we introduce a method to extract statistical information from the edge, which contains adequate domain-related knowledge for model customization. PMC uses Gaussian distribution parameters to describe the edge data distribution, reweights the cloud data based on the parameters, and uses the reweighted data to train a specialized model for the edge device. During this process, differential privacy can be enforced by adding computed noises to the Gaussian parameters. Experiments on public datasets show that PMC can improve model accuracy by a large margin through customization. Finally, a study on user-generated data demonstrates the effectiveness of PMC in real-world settings.<\/jats:p>","DOI":"10.1145\/3432208","type":"journal-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T15:39:14Z","timestamp":1608305954000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["PMC"],"prefix":"10.1145","volume":"4","author":[{"given":"Bingyan","family":"Liu","sequence":"first","affiliation":[{"name":"MOE Key Lab of HCST, Dept of Computer Science, School of EECS, Peking University, Beijing, China"}]},{"given":"Yuanchun","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Yao","family":"Guo","sequence":"additional","affiliation":[{"name":"MOE Key Lab of HCST, Dept of Computer Science, School of EECS, Peking University, Beijing, China"}]},{"given":"Xiangqun","family":"Chen","sequence":"additional","affiliation":[{"name":"MOE Key Lab of HCST, Dept of Computer Science, School of EECS, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,12,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_1_2_1","unstructured":"Apple. [n.d.]. Differential Privacy Overview. https:\/\/www.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf.  Apple. [n.d.]. Differential Privacy Overview. https:\/\/www.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf."},{"key":"e_1_2_1_3_1","unstructured":"Apple. [n.d.]. Private on-device technologies to browse and edit photos and videos on iOS and iPadOS. https:\/\/www.apple.com\/ios\/photos\/pdf\/Photos_Tech_Brief_Sept_2019.pdf.  Apple. [n.d.]. Private on-device technologies to browse and edit photos and videos on iOS and iPadOS. https:\/\/www.apple.com\/ios\/photos\/pdf\/Photos_Tech_Brief_Sept_2019.pdf."},{"key":"e_1_2_1_4_1","volume-title":"A theory of learning from different domains. Machine learning 79, 1-2","author":"Ben-David Shai","year":"2010","unstructured":"Shai Ben-David , John Blitzer , Koby Crammer , Alex Kulesza , Fernando Pereira , and Jennifer Wortman Vaughan . 2010. A theory of learning from different domains. Machine learning 79, 1-2 ( 2010 ), 151--175. Shai Ben-David, John Blitzer, Koby Crammer, Alex Kulesza, Fernando Pereira, and Jennifer Wortman Vaughan. 2010. A theory of learning from different domains. Machine learning 79, 1-2 (2010), 151--175."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664266"},{"key":"e_1_2_1_6_1","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","author":"Dem\u0161ar Janez","year":"2006","unstructured":"Janez Dem\u0161ar . 2006 . Statistical comparisons of classifiers over multiple data sets . Journal of Machine learning research 7 , Jan (2006), 1 -- 30 . Janez Dem\u0161ar. 2006. Statistical comparisons of classifiers over multiple data sets. Journal of Machine learning research 7, Jan (2006), 1--30.","journal-title":"Journal of Machine learning research 7"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_2_1_8_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3241398"},{"key":"e_1_2_1_10_1","volume-title":"Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495","author":"Ganin Yaroslav","year":"2014","unstructured":"Yaroslav Ganin and Victor Lempitsky . 2014. Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495 ( 2014 ). Yaroslav Ganin and Victor Lempitsky. 2014. Unsupervised domain adaptation by backpropagation. arXiv preprint arXiv:1409.7495 (2014)."},{"key":"e_1_2_1_11_1","volume-title":"Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","author":"Geyer Robin C","year":"2017","unstructured":"Robin C Geyer , Tassilo Klein , and Moin Nabi . 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 ( 2017 ). Robin C Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_2_1_13_1","unstructured":"Yves Grandvalet and Yoshua Bengio. 2005. Semi-supervised learning by entropy minimization. In Advances in neural information processing systems. 529--536.  Yves Grandvalet and Yoshua Bengio. 2005. Semi-supervised learning by entropy minimization. In Advances in neural information processing systems. 529--536."},{"key":"e_1_2_1_14_1","unstructured":"Yiwen Guo Anbang Yao and Yurong Chen. 2016. Dynamic network surgery for efficient dnns. In Advances in neural information processing systems. 1379--1387.  Yiwen Guo Anbang Yao and Yurong Chen. 2016. Dynamic network surgery for efficient dnns. In Advances in neural information processing systems. 1379--1387."},{"key":"e_1_2_1_15_1","volume-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149","author":"Han Song","year":"2015","unstructured":"Song Han , Huizi Mao , and William J Dally . 2015. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149 ( 2015 ). Song Han, Huizi Mao, and William J Dally. 2015. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149 (2015)."},{"key":"e_1_2_1_16_1","unstructured":"Song Han Jeff Pool John Tran and William Dally. 2015. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems. 1135--1143.  Song Han Jeff Pool John Tran and William Dally. 2015. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems. 1135--1143."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_1_18_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton , Oriol Vinyals , and Jeff Dean . 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 ( 2015 ). Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00038"},{"key":"e_1_2_1_20_1","unstructured":"Judy Hoffman Mehryar Mohri and Ningshan Zhang. 2018. Algorithms and theory for multiple-source adaptation. In Advances in Neural Information Processing Systems. 8246--8256.  Judy Hoffman Mehryar Mohri and Ningshan Zhang. 2018. Algorithms and theory for multiple-source adaptation. In Advances in Neural Information Processing Systems. 8246--8256."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_2_1_22_1","unstructured":"Jangho Kim SeongUk Park and Nojun Kwak. 2018. Paraphrasing complex network: Network compression via factor transfer. In Advances in Neural Information Processing Systems. 2760--2769.  Jangho Kim SeongUk Park and Nojun Kwak. 2018. Paraphrasing complex network: Network compression via factor transfer. In Advances in Neural Information Processing Systems. 2760--2769."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.101"},{"key":"e_1_2_1_25_1","volume-title":"Pruning filters for efficient convnets. arXiv preprint arXiv:1608.08710","author":"Li Hao","year":"2016","unstructured":"Hao Li , Asim Kadav , Igor Durdanovic , Hanan Samet , and Hans Peter Graf . 2016. Pruning filters for efficient convnets. arXiv preprint arXiv:1608.08710 ( 2016 ). Hao Li, Asim Kadav, Igor Durdanovic, Hanan Samet, and Hans Peter Graf. 2016. Pruning filters for efficient convnets. arXiv preprint arXiv:1608.08710 (2016)."},{"key":"e_1_2_1_26_1","first-page":"1","article-title":"Privacystreams: Enabling transparency in personal data processing for mobile apps","volume":"1","author":"Li Yuanchun","year":"2017","unstructured":"Yuanchun Li , Fanglin Chen , Toby Jia-Jun Li , Yao Guo , Gang Huang , Matthew Fredrikson , Yuvraj Agarwal , and Jason I Hong . 2017 . Privacystreams: Enabling transparency in personal data processing for mobile apps . Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1 , 3 (2017), 1 -- 26 . Yuanchun Li, Fanglin Chen, Toby Jia-Jun Li, Yao Guo, Gang Huang, Matthew Fredrikson, Yuvraj Agarwal, and Jason I Hong. 2017. Privacystreams: Enabling transparency in personal data processing for mobile apps. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 1--26.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_2_1_27_1","volume-title":"Revisiting batch normalization for practical domain adaptation. arXiv preprint arXiv:1603.04779","author":"Li Yanghao","year":"2016","unstructured":"Yanghao Li , Naiyan Wang , Jianping Shi , Jiaying Liu , and Xiaodi Hou . 2016. Revisiting batch normalization for practical domain adaptation. arXiv preprint arXiv:1603.04779 ( 2016 ). Yanghao Li, Naiyan Wang, Jianping Shi, Jiaying Liu, and Xiaodi Hou. 2016. Revisiting batch normalization for practical domain adaptation. arXiv preprint arXiv:1603.04779 (2016)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351035"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213344.3213345"},{"key":"e_1_2_1_31_1","volume-title":"Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791","author":"Long Mingsheng","year":"2015","unstructured":"Mingsheng Long , Yue Cao , Jianmin Wang , and Michael I Jordan . 2015. Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791 ( 2015 ). Mingsheng Long, Yue Cao, Jianmin Wang, and Michael I Jordan. 2015. Learning transferable features with deep adaptation networks. arXiv preprint arXiv:1502.02791 (2015)."},{"key":"e_1_2_1_32_1","unstructured":"Mingsheng Long Zhangjie Cao Jianmin Wang and Michael I Jordan. 2018. Conditional adversarial domain adaptation. In Advances in Neural Information Processing Systems. 1640--1650.  Mingsheng Long Zhangjie Cao Jianmin Wang and Michael I Jordan. 2018. Conditional adversarial domain adaptation. In Advances in Neural Information Processing Systems. 1640--1650."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305890.3305909"},{"key":"e_1_2_1_34_1","first-page":"2579","article-title":"Visualizing data using t-SNE","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing data using t-SNE . Journal of machine learning research 9 , Nov (2008), 2579 -- 2605 . Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, Nov (2008), 2579--2605.","journal-title":"Journal of machine learning research 9"},{"key":"e_1_2_1_35_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. 1273--1282.  Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. 1273--1282."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380106"},{"key":"e_1_2_1_37_1","volume-title":"Pruning convolutional neural networks for resource efficient inference. arXiv preprint arXiv:1611.06440","author":"Molchanov Pavlo","year":"2016","unstructured":"Pavlo Molchanov , Stephen Tyree , Tero Karras , Timo Aila , and Jan Kautz . 2016. Pruning convolutional neural networks for resource efficient inference. arXiv preprint arXiv:1611.06440 ( 2016 ). Pavlo Molchanov, Stephen Tyree, Tero Karras, Timo Aila, and Jan Kautz. 2016. Pruning convolutional neural networks for resource efficient inference. arXiv preprint arXiv:1611.06440 (2016)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_2_1_39_1","volume-title":"Scalable private learning with pate. arXiv preprint arXiv:1802.08908","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot , Shuang Song , Ilya Mironov , Ananth Raghunathan , Kunal Talwar , and \u00dalfar Erlingsson . 2018. Scalable private learning with pate. arXiv preprint arXiv:1802.08908 ( 2018 ). Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and \u00dalfar Erlingsson. 2018. Scalable private learning with pate. arXiv preprint arXiv:1802.08908 (2018)."},{"key":"e_1_2_1_40_1","unstructured":"Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga etal 2019. PyTorch: An imperative style high-performance deep learning library. In Advances in Neural Information Processing Systems. 8024--8035.  Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga et al. 2019. PyTorch: An imperative style high-performance deep learning library. In Advances in Neural Information Processing Systems. 8024--8035."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888089.1888106"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00814"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2019312.2019313"},{"key":"e_1_2_1_45_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy (SP). 3--18","author":"Shokri R.","unstructured":"R. Shokri , M. Stronati , C. Song , and V. Shmatikov . 2017 . Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy (SP). 3--18 . R. Shokri, M. Stronati, C. Song, and V. Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy (SP). 3--18."},{"key":"e_1_2_1_46_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10463-008-0197-x"},{"key":"e_1_2_1_48_1","unstructured":"Cheng Tai Tong Xiao Yi Zhang Xiaogang Wang etal 2015. Convolutional neural networks with low-rank regularization. arXiv preprint arXiv:1511.06067 (2015).  Cheng Tai Tong Xiao Yi Zhang Xiaogang Wang et al. 2015. Convolutional neural networks with low-rank regularization. arXiv preprint arXiv:1511.06067 (2015)."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.316"},{"key":"e_1_2_1_50_1","volume-title":"Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:1412.3474","author":"Tzeng Eric","year":"2014","unstructured":"Eric Tzeng , Judy Hoffman , Ning Zhang , Kate Saenko , and Trevor Darrell . 2014. Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:1412.3474 ( 2014 ). Eric Tzeng, Judy Hoffman, Ning Zhang, Kate Saenko, and Trevor Darrell. 2014. Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:1412.3474 (2014)."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.572"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983563.2983567"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486403"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313591"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287075"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00151"},{"key":"e_1_2_1_57_1","volume-title":"Accelerating very deep convolutional networks for classification and detection","author":"Zhang Xiangyu","year":"2015","unstructured":"Xiangyu Zhang , Jianhua Zou , Kaiming He , and Jian Sun . 2015. Accelerating very deep convolutional networks for classification and detection . IEEE transactions on pattern analysis and machine intelligence 38, 10 ( 2015 ), 1943--1955. Xiangyu Zhang, Jianhua Zou, Kaiming He, and Jian Sun. 2015. Accelerating very deep convolutional networks for classification and detection. IEEE transactions on pattern analysis and machine intelligence 38, 10 (2015), 1943--1955."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409676"},{"key":"e_1_2_1_59_1","volume-title":"Joao P Costeira, and Geoffrey J Gordon.","author":"Zhao Han","year":"2018","unstructured":"Han Zhao , Shanghang Zhang , Guanhang Wu , Jos\u00e9 MF Moura , Joao P Costeira, and Geoffrey J Gordon. 2018 . Adversarial multiple source domain adaptation. In Advances in Neural Information Processing Systems . 8559--8570. Han Zhao, Shanghang Zhang, Guanhang Wu, Jos\u00e9 MF Moura, Joao P Costeira, and Geoffrey J Gordon. 2018. Adversarial multiple source domain adaptation. In Advances in Neural Information Processing Systems. 8559--8570."},{"key":"e_1_2_1_60_1","volume-title":"Incremental network quantization: Towards lossless cnns with low-precision weights. arXiv preprint arXiv:1702.03044","author":"Zhou Aojun","year":"2017","unstructured":"Aojun Zhou , Anbang Yao , Yiwen Guo , Lin Xu , and Yurong Chen . 2017. Incremental network quantization: Towards lossless cnns with low-precision weights. arXiv preprint arXiv:1702.03044 ( 2017 ). Aojun Zhou, Anbang Yao, Yiwen Guo, Lin Xu, and Yurong Chen. 2017. Incremental network quantization: Towards lossless cnns with low-precision weights. arXiv preprint arXiv:1702.03044 (2017)."},{"key":"e_1_2_1_61_1","volume-title":"Trained ternary quantization. arXiv preprint arXiv:1612.01064","author":"Zhu Chenzhuo","year":"2016","unstructured":"Chenzhuo Zhu , Song Han , Huizi Mao , and William J Dally . 2016. Trained ternary quantization. arXiv preprint arXiv:1612.01064 ( 2016 ). Chenzhuo Zhu, Song Han, Huizi Mao, and William J Dally. 2016. Trained ternary quantization. arXiv preprint arXiv:1612.01064 (2016)."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3432208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3432208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:09Z","timestamp":1750193229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3432208"}},"subtitle":["A Privacy-preserving Deep Learning Model Customization Framework for Edge Computing"],"short-title":[],"issued":{"date-parts":[[2020,12,17]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12,17]]}},"alternative-id":["10.1145\/3432208"],"URL":"https:\/\/doi.org\/10.1145\/3432208","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,17]]},"assertion":[{"value":"2020-12-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}