{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T01:22:36Z","timestamp":1776993756314,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484797","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"3266-3281","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["COINN: Crypto\/ML Codesign for Oblivious Inference via Neural Networks"],"prefix":"10.1145","author":[{"given":"Siam Umar","family":"Hussain","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Mojan","family":"Javaheripi","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Mohammad","family":"Samragh","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Deep Learning with Differential Privacy. arXiv preprint arXiv:1607.00133","author":"Abadi Mart'in","year":"2016","unstructured":"Mart'in Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep Learning with Differential Privacy. arXiv preprint arXiv:1607.00133 (2016)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJBDCN.2020010105"},{"key":"e_1_3_2_2_4_1","volume-title":"Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology","author":"Alipanahi Babak","year":"2015","unstructured":"Babak Alipanahi, Andrew Delong, Matthew T Weirauch, and Brendan J Frey. 2015. Predicting the sequence specificities of DNA-and RNA-binding proteins by deep learning. Nature biotechnology, Vol. 33, 8 (2015), 831."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029204"},{"key":"e_1_3_2_2_7_1","volume-title":"Handbook of evolutionary computation","author":"Thomas","unstructured":"Thomas B\"ack, David B Fogel, and Zbigniew Michalewicz. 1997. Handbook of evolutionary computation .CRC Press."},{"key":"e_1_3_2_2_8_1","first-page":"338","article-title":"Garbled Neural Networks are Practical","volume":"2019","author":"Ball Marshall","year":"2019","unstructured":"Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, and Nichole Schimanski. 2019. Garbled Neural Networks are Practical. IACR Cryptol. ePrint Arch., Vol. 2019 (2019), 338.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_9_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1739--1744","author":"Bian Song","year":"2019","unstructured":"Song Bian, Masayuki Hiromoto, and Takashi Sato. 2019. DArL: Dynamic parameter adjustment for LWE-based secure inference. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1739--1744."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"e_1_3_2_2_11_1","volume-title":"International Conference on Machine Learning. PMLR, 812--821","author":"Brutzkus Alon","year":"2019","unstructured":"Alon Brutzkus, Ran Gilad-Bachrach, and Oren Elisha. 2019. Low latency privacy preserving inference. In International Conference on Machine Learning. PMLR, 812--821."},{"key":"e_1_3_2_2_12_1","volume-title":"Differentially private data generative models. arXiv preprint arXiv:1812.02274","author":"Chen Qingrong","year":"2018","unstructured":"Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaarfar, and Haojin Zhu. 2018. Differentially private data generative models. arXiv preprint arXiv:1812.02274 (2018)."},{"key":"e_1_3_2_2_13_1","volume-title":"Faster cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv preprint arXiv:1811.09953","author":"Chou Edward","year":"2018","unstructured":"Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, and Li Fei-Fei. 2018. Faster cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv preprint arXiv:1811.09953 (2018)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0077"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_2_16_1","volume-title":"ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation","author":"Demmler Daniel","unstructured":"Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS. The Internet Society."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56880-1_29"},{"key":"e_1_3_2_2_18_1","volume-title":"Nature","volume":"542","author":"Esteva Andre","year":"2017","unstructured":"Andre Esteva, Brett Kuprel, Roberto A Novoa, Justin Ko, Susan M Swetter, Helen M Blau, and Sebastian Thrun. 2017. Dermatologist-level classification of skin cancer with deep neural networks. Nature, Vol. 542, 7639 (2017), 115."},{"key":"e_1_3_2_2_19_1","volume-title":"A guide to deep learning in healthcare. Nature medicine","author":"Esteva Andre","year":"2019","unstructured":"Andre Esteva, Alexandre Robicquet, Bharath Ramsundar, Volodymyr Kuleshov, Mark DePristo, Katherine Chou, Claire Cui, Greg Corrado, Sebastian Thrun, and Jeff Dean. 2019. A guide to deep learning in healthcare. Nature medicine, Vol. 25, 1 (2019), 24."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Matt Fredrikson Somesh Jha and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In ACM CCS.","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_22_1","volume-title":"Cryptonas: Private inference on a relu budget. In Advances in Neural Information Processing Systems.","author":"Ghodsi Zahra","year":"2020","unstructured":"Zahra Ghodsi, Akshaj Veldanda, Brandon Reagen, and Siddharth Garg. 2020. Cryptonas: Private inference on a relu budget. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_2_23_1","volume-title":"International Conference on Machine Learning.","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In International Conference on Machine Learning."},{"key":"e_1_3_2_2_24_1","unstructured":"Ga\u00ebl Guennebaud Beno\u00eet Jacob et al. 2010. Eigen v3. http:\/\/eigen.tuxfamily.org."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00852"},{"key":"e_1_3_2_2_26_1","volume-title":"Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419433"},{"key":"e_1_3_2_2_28_1","volume-title":"Crypto","author":"Ishai Yuval","unstructured":"Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank. 2003. Extending Oblivious Transfers Efficiently.. In Crypto, Vol. 2729. Springer."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377930.3390226"},{"key":"e_1_3_2_2_31_1","volume-title":"27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 1651--1669.","author":"Juvekar Chiraag","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. $$GAZELLE$$: A low latency framework for secure neural network inference. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 1651--1669."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301638"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"e_1_3_2_2_34_1","first-page":"1533","article-title":"On the security of homomorphic encryption on approximate numbers","volume":"2020","author":"Li Baiyu","year":"2020","unstructured":"Baiyu Li and Daniele Micciancio. 2020. On the security of homomorphic encryption on approximate numbers. IACR Cryptol. ePrint Arch, Vol. 2020 (2020), 1533.","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Jian Liu Mika Juuti Yao Lu and N Asokan. 2017b. Oblivious Neural Network Predictions via MiniONN transformations. In CCS. ACM.","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_3_2_2_38_1","volume-title":"Accurate and Fast Neural Network Inference. In International Conference on Learning Representations.","author":"Lou Qian","year":"2021","unstructured":"Qian Lou, Yilin Shen, Hongxia Jin, and Lei Jiang. 2021. SAFEN et: A Secure, Accurate and Fast Neural Network Inference. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_39_1","unstructured":"Qian Lou Bian Song and Lei Jiang. 2020. AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2018.00067"},{"key":"e_1_3_2_2_41_1","volume-title":"DELPHI: A cryptographic inference service for neural networks. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20).","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. DELPHI: A cryptographic inference service for neural networks. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20)."},{"key":"e_1_3_2_2_42_1","volume-title":"Convolutional neural networks using logarithmic data representation. arXiv preprint arXiv:1603.01025","author":"Miyashita Daisuke","year":"2016","unstructured":"Daisuke Miyashita, Edward H Lee, and Boris Murmann. 2016. Convolutional neural networks using logarithmic data representation. arXiv preprint arXiv:1603.01025 (2016)."},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the World Congress on Engineering and Computer Science","volume":"2","author":"Moengin Parwadi","year":"2011","unstructured":"Parwadi Moengin. 2011. Exponential Penalty Methods for Solving Linear Programming Problems. In Proceedings of the World Congress on Engineering and Computer Science, Vol. 2."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0102-6"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Alvin Rajkomar Eyal Oren Kai Chen Andrew M Dai Nissan Hajaj Michaela Hardt Peter J Liu Xiaobing Liu Jake Marcus Mimi Sun et al. 2018. Scalable and accurate deep learning with electronic health records. npj Digital Medicine Vol. 1 1 (2018) 18.","DOI":"10.1038\/s41746-018-0029-1"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_2_47_1","volume-title":"XONN: XNOR-based Oblivious Deep Neural Network Inference.. In USENIX Security.","author":"Riazi M Sadegh","year":"2019","unstructured":"M Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference.. In USENIX Security."},{"key":"e_1_3_2_2_48_1","unstructured":"Peter Rindal. [n. d.]. libOTe: an efficient portable and easy to use Oblivious Transfer Library. https:\/\/github.com\/osu-crypto\/libOTe."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2017.43"},{"key":"e_1_3_2_2_50_1","volume-title":"International Conference on Machine Learning. PMLR, 4490--4499","author":"Sanyal Amartya","year":"2018","unstructured":"Amartya Sanyal, Matt Kusner, Adria Gascon, and Varun Kanade. 2018. TAPAS: Tricks to accelerate (encrypted) prediction as a service. In International Conference on Machine Learning. PMLR, 4490--4499."},{"key":"e_1_3_2_2_51_1","volume-title":"SIGSAC Conference on Computer and Communications Security. ACM.","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In SIGSAC Conference on Computer and Communications Security. ACM."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_53_1","volume-title":"Verifiable and Private Execution of Neural Networks in Trusted Hardware. In International Conference on Learning Representations.","author":"Tramer Florian","year":"2019","unstructured":"Florian Tramer and Dan Boneh. 2019. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_54_1","volume-title":"25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16). 601--618.","author":"Tram\u00e8r Florian","unstructured":"Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction apis. In 25th $$USENIX$$ Security Symposium ($$USENIX$$ Security 16). 601--618."},{"key":"e_1_3_2_2_55_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit."},{"key":"e_1_3_2_2_56_1","volume-title":"Training and Inference with Integers in Deep Neural Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=HJGXzmspb","author":"Wu Shuang","year":"2018","unstructured":"Shuang Wu, Guoqi Li, Feng Chen, and Luping Shi. 2018. Training and Inference with Integers in Deep Neural Networks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=HJGXzmspb"},{"key":"e_1_3_2_2_57_1","volume-title":"Genetic cnn. arXiv preprint arXiv:1703.01513","author":"Xie Lingxi","year":"2017","unstructured":"Lingxi Xie and Alan Yuille. 2017. Genetic cnn. arXiv preprint arXiv:1703.01513 (2017)."},{"key":"e_1_3_2_2_58_1","volume-title":"Defending model inversion and membership inference attacks via prediction purification. arXiv preprint arXiv:2005.03915","author":"Yang Ziqi","year":"2020","unstructured":"Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, and Fan Zhang. 2020. Defending model inversion and membership inference attacks via prediction purification. arXiv preprint arXiv:2005.03915 (2020)."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:43Z","timestamp":1763499223000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":59,"alternative-id":["10.1145\/3460120.3484797","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484797","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}