{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:10:07Z","timestamp":1770225007931,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft mbH","award":["88652"],"award-info":[{"award-number":["88652"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,10]]},"DOI":"10.1145\/3589883.3589889","type":"proceedings-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T19:50:36Z","timestamp":1687895436000},"page":"35-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["HE-MAN \u2013 Homomorphically Encrypted MAchine learning with oNnx models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6967-8800","authenticated-orcid":false,"given":"Martin","family":"Nocker","sequence":"first","affiliation":[{"name":"MCI The Entrepreneurial School, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7375-0170","authenticated-orcid":false,"given":"David","family":"Drexel","sequence":"additional","affiliation":[{"name":"MCI The Entrepreneurial School, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1819-5246","authenticated-orcid":false,"given":"Michael","family":"Rader","sequence":"additional","affiliation":[{"name":"Fraunhofer Austria Research GmbH, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2605-9081","authenticated-orcid":false,"given":"Alessio","family":"Montuoro","sequence":"additional","affiliation":[{"name":"SCCH Software Competence Center, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-9188","authenticated-orcid":false,"given":"Pascal","family":"Sch\u00f6ttle","sequence":"additional","affiliation":[{"name":"MCI The Entrepreneurial School, Austria"}]}],"member":"320","published-online":{"date-parts":[[2023,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mart\u00edn Abadi 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org\/ Software available from tensorflow.org."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Ehud Aharoni 2020. HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data. https:\/\/doi.org\/10.48550\/ARXIV.2011.01805","DOI":"10.48550\/ARXIV.2011.01805"},{"key":"e_1_3_2_1_3_1","unstructured":"Ahmad\u00a0Al Badawi 2022. OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive Paper 2022\/915. https:\/\/eprint.iacr.org\/2022\/915 https:\/\/eprint.iacr.org\/2022\/915."},{"key":"e_1_3_2_1_4_1","volume-title":"ONNX: Open Neural Network Exchange. https:\/\/onnx.ai\/.","author":"Bai Junjie","year":"2019","unstructured":"Junjie Bai, Fang Lu, Ke Zhang, 2019. ONNX: Open Neural Network Exchange. https:\/\/onnx.ai\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Ayoub Benaissa Bilal Retiat Bogdan Cebere and Alaa\u00a0Eddine Belfedhal. 2021. TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption. arxiv:2104.03152\u00a0[cs.CR]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Machine Learning. PMLR, 812\u2013821","author":"Brutzkus Alon","year":"2019","unstructured":"Alon Brutzkus, Ran Gilad-Bachrach, and Oren Elisha. 2019. Low latency privacy preserving inference. In International Conference on Machine Learning. PMLR, 812\u2013821."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732520"},{"key":"e_1_3_2_1_13_1","unstructured":"Melissa Chase 2017. Security of Homomorphic Encryption. Technical Report. HomomorphicEncryption.org Redmond WA USA."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD46524.2019.00053"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti Nicolas Gama Mariya Georgieva and Malika Izabach\u00c3\u00a8ne. 2016. Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds. Cryptology ePrint Archive Paper 2016\/870. https:\/\/eprint.iacr.org\/2016\/870 https:\/\/eprint.iacr.org\/2016\/870.","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_18_1","volume-title":"WAHC 2020\u20138th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Vol.\u00a015","author":"Chillotti Ilaria","year":"2020","unstructured":"Ilaria Chillotti, Marc Joye, Damien Ligier, Jean-Baptiste Orfila, and Samuel Tap. 2020. CONCRETE: Concrete Operates oN Ciphertexts Rapidly by Extending TfhE. In WAHC 2020\u20138th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Vol.\u00a015."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti Marc Joye and Pascal Paillier. 2020. Programmable bootstrapping enables efficient homomorphic inference of deep neural networks. Technical Report. Cryptology ePrint Archive Report 2021\/091 2021.https:\/\/eprint.iacr.org","DOI":"10.1007\/978-3-030-78086-9_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243828"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_3_2_1_24_1","volume-title":"Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Vinod Ganesan Anwesh Bhattacharya Pratyush Kumar Divya Gupta Rahul Sharma and Nishanth Chandran. 2022. Efficient ML Models for Practical Secure Inference. https:\/\/doi.org\/10.48550\/ARXIV.2209.00411","DOI":"10.48550\/ARXIV.2209.00411"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_28_1","volume-title":"International Conference on Machine Learning. PMLR, 201\u2013210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. PMLR, 201\u2013210."},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Information Security and Cryptology. Springer, 1\u201321","author":"Graepel Thore","year":"2012","unstructured":"Thore Graepel, Kristin Lauter, and Michael Naehrig. 2012. ML confidential: Machine learning on encrypted data. In International Conference on Information Security and Cryptology. Springer, 1\u201321."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_4"},{"key":"e_1_3_2_1_31_1","volume-title":"Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 809\u2013826. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/huang-zhicong"},{"key":"e_1_3_2_1_32_1","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1651\u20131669. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/juvekar"},{"key":"e_1_3_2_1_33_1","volume-title":"Advances in Neural Information Processing Systems, M.\u00a0Ranzato, A.\u00a0Beygelzimer, Y.\u00a0Dauphin, P.S. Liang, and J.\u00a0Wortman Vaughan (Eds.). Vol.\u00a034. Curran Associates","author":"Knott Brian","year":"2021","unstructured":"Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, and Laurens van\u00a0der Maaten. 2021. CrypTen: Secure Multi-Party Computation Meets Machine Learning. In Advances in Neural Information Processing Systems, M.\u00a0Ranzato, A.\u00a0Beygelzimer, Y.\u00a0Dauphin, P.S. Liang, and J.\u00a0Wortman Vaughan (Eds.). Vol.\u00a034. Curran Associates, Inc., 4961\u20134973. https:\/\/proceedings.neurips.cc\/paper\/2021\/file\/2754518221cfbc8d25c13a06a4cb8421-Paper.pdf"},{"key":"e_1_3_2_1_34_1","volume-title":"Simple encrypted arithmetic library 2.3.1. Microsoft Research https:\/\/www.microsoft.com\/en-us\/research\/uploads\/prod\/2017\/11\/sealmanual-2-3-1.pdf","author":"Laine Kim","year":"2017","unstructured":"Kim Laine. 2017. Simple encrypted arithmetic library 2.3.1. Microsoft Research https:\/\/www.microsoft.com\/en-us\/research\/uploads\/prod\/2017\/11\/sealmanual-2-3-1.pdf (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_36_1","unstructured":"Yann LeCun Corinna Cortes and Chris Burges. 2010. MNIST handwritten digit database. http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"e_1_3_2_1_37_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Lehmkuhl Ryan","year":"2021","unstructured":"Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, and Raluca\u00a0Ada Popa. 2021. Muse: Secure Inference Resilient to Malicious Clients. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2201\u20132218. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/lehmkuhl"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_40_1","volume-title":"Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca\u00a0Ada Popa. 2020. Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2505\u20132522. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64\u201370","author":"Mouchet Christian\u00a0Vincent","year":"2020","unstructured":"Christian\u00a0Vincent Mouchet, Jean-Philippe Bossuat, Juan\u00a0Ram\u00f3n Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2020. Lattigo: A multiparty homomorphic encryption library in go. In Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64\u201370."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00011"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_47_1","volume-title":"XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Riazi M\u00a0Sadegh","year":"2019","unstructured":"M\u00a0Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19). 1501\u20131518."},{"key":"e_1_3_2_1_48_1","volume-title":"On data banks and privacy homomorphisms. Foundations of secure computation 4, 11","author":"Rivest L","year":"1978","unstructured":"Ronald\u00a0L Rivest, Len Adleman, and Michael\u00a0L Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of secure computation 4, 11 (1978), 169\u2013180."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411508.3421376"},{"key":"e_1_3_2_1_51_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2022. Microsoft SEAL (release 4.0). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_52_1","volume-title":"25th USENIX security symposium (USENIX Security 16). 601\u2013618.","author":"Tram\u00e8r Florian","unstructured":"Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael\u00a0K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction APIs. In 25th USENIX security symposium (USENIX Security 16). 601\u2013618."},{"key":"e_1_3_2_1_53_1","volume-title":"SEALion: A framework for neural network inference on encrypted data. arXiv preprint arXiv:1904.12840","author":"van Elsloo Tim","year":"2019","unstructured":"Tim van Elsloo, Giorgio Patrini, and Hamish Ivey-Law. 2019. SEALion: A framework for neural network inference on encrypted data. arXiv preprint arXiv:1904.12840 (2019)."},{"key":"e_1_3_2_1_54_1","volume-title":"HECO: Automatic Code Optimizations for Efficient Fully Homomorphic Encryption. arXiv preprint arXiv:2202.01649","author":"Viand Alexander","year":"2022","unstructured":"Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi. 2022. HECO: Automatic Code Optimizations for Efficient Fully Homomorphic Encryption. arXiv preprint arXiv:2202.01649 (2022)."}],"event":{"name":"ICMLT 2023: 2023 8th International Conference on Machine Learning Technologies","location":"Stockholm Sweden","acronym":"ICMLT 2023"},"container-title":["Proceedings of the 2023 8th International Conference on Machine Learning Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589883.3589889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589883.3589889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:03:21Z","timestamp":1755846201000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589883.3589889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,10]]},"references-count":54,"alternative-id":["10.1145\/3589883.3589889","10.1145\/3589883"],"URL":"https:\/\/doi.org\/10.1145\/3589883.3589889","relation":{},"subject":[],"published":{"date-parts":[[2023,3,10]]},"assertion":[{"value":"2023-06-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}