{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:10:34Z","timestamp":1772039434126,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Key R&D Program of China","award":["2021YFB2900103"],"award-info":[{"award-number":["2021YFB2900103"]}]},{"name":"the University Synergy Innovation Program of Anhui Province","award":["GXXT-2022-049"],"award-info":[{"award-number":["GXXT-2022-049"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["WK2150110024"],"award-info":[{"award-number":["WK2150110024"]}]},{"name":"China National Natural Science Foundation","award":["61932016"],"award-info":[{"award-number":["61932016"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627107","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"609-620","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DeepContract: Controllable Authorization of Deep Learning Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9476-8587","authenticated-orcid":false,"given":"Xirong","family":"Zhuang","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1004-8588","authenticated-orcid":false,"given":"Lan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China and Institute of Dataspace, Hefei Comprehensive National Science Center, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1200-475X","authenticated-orcid":false,"given":"Chen","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1879-0779","authenticated-orcid":false,"given":"Huiqi","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2284-7996","authenticated-orcid":false,"given":"Bin","family":"Wang","sequence":"additional","affiliation":[{"name":"Tencent YouTu Lab, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7237-1570","authenticated-orcid":false,"given":"Yan","family":"Zheng","sequence":"additional","affiliation":[{"name":"Tencent YouTu Lab, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0619-7188","authenticated-orcid":false,"given":"Bo","family":"Ren","sequence":"additional","affiliation":[{"name":"Tencent YouTu Lab, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"27th USENIX Security Symposium. 1615\u20131631","author":"Adi Yossi","year":"2018","unstructured":"Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. 2018. Turning your weakness into a strength: Watermarking deep neural networks by backdooring. In 27th USENIX Security Symposium. 1615\u20131631."},{"key":"e_1_3_2_1_2_1","volume-title":"Deep-lock: Secure authorization for deep neural networks. arXiv preprint arXiv:2008.05966","author":"Alam Manaar","year":"2020","unstructured":"Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, and Sandip Kundu. 2020. Deep-lock: Secure authorization for deep neural networks. arXiv preprint arXiv:2008.05966 (2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Machine Learning. PMLR, 812\u2013821","author":"Brutzkus Alon","year":"2019","unstructured":"Alon Brutzkus, Ran Gilad-Bachrach, and Oren Elisha. 2019. Low latency privacy preserving inference. In International Conference on Machine Learning. PMLR, 812\u2013821."},{"key":"e_1_3_2_1_5_1","volume-title":"Privacy-preserving classification on deep neural network. Cryptology ePrint Archive","author":"Chabanne Herv\u00e9","year":"2017","unstructured":"Herv\u00e9 Chabanne, Amaury De\u00a0Wargny, Jonathan Milgram, Constance Morel, and Emmanuel Prouff. 2017. Privacy-preserving classification on deep neural network. Cryptology ePrint Archive (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3437539.3437711"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00043"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322251"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630791"},{"key":"e_1_3_2_1_10_1","volume-title":"30th USENIX Security Symposium. 699\u2013716","author":"Chen Zitai","year":"2021","unstructured":"Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David Oswald, and Flavio\u00a0D Garcia. 2021. VoltPillager: Hardware-based fault injection attacks against Intel SGXEnclaves using the SVID voltage scaling interface. In 30th USENIX Security Symposium. 699\u2013716."},{"key":"e_1_3_2_1_11_1","volume-title":"Faster cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv preprint arXiv:1811.09953","author":"Edward Chou","year":"2018","unstructured":"Edward Chou 2018. Faster cryptonets: Leveraging sparsity for real-world encrypted inference. arXiv preprint arXiv:1811.09953 (2018)."},{"key":"e_1_3_2_1_12_1","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. Cryptology ePrint Archive Paper 2016\/086."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304051"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09815-4"},{"key":"e_1_3_2_1_15_1","volume-title":"Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks. Advances in Neural Information Processing Systems 32","author":"Fan Lixin","year":"2019","unstructured":"Lixin Fan, Kam\u00a0Woh Ng, and Chee\u00a0Seng Chan. 2019. Rethinking deep neural network ownership verification: Embedding passports to defeat ambiguity attacks. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_16_1","volume-title":"Deepip: Deep neural network intellectual property protection with passports","author":"Fan Lixin","year":"2021","unstructured":"Lixin Fan, Kam\u00a0Woh Ng, Chee\u00a0Seng Chan, and Qiang Yang. 2021. Deepip: Deep neural network intellectual property protection with passports. IEEE Transactions on Pattern Analysis and Machine Intelligence (2021)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Machine Learning. PMLR, 201\u2013210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. PMLR, 201\u2013210."},{"key":"e_1_3_2_1_19_1","volume-title":"Privado: Practical and secure DNN inference with enclaves. arXiv preprint arXiv:1810.00602","author":"Grover Karan","year":"2018","unstructured":"Karan Grover, Shruti Tople, Shweta Shinde, Ranjita Bhagwan, and Ramachandran Ramjee. 2018. Privado: Practical and secure DNN inference with enclaves. arXiv preprint arXiv:1810.00602 (2018)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240862"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_22_1","volume-title":"Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)."},{"key":"e_1_3_2_1_23_1","volume-title":"27th USENIX Security Symposium. 1651\u20131669","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A low latency framework for secure neural network inference. In 27th USENIX Security Symposium. 1651\u20131669."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(21)00211-9"},{"key":"e_1_3_2_1_25_1","volume-title":"Integrating remote attestation with transport layer security. arXiv preprint arXiv:1801.05863","author":"Thomas Knauth","year":"2018","unstructured":"Thomas Knauth 2018. Integrating remote attestation with transport layer security. arXiv preprint arXiv:1801.05863 (2018)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190518"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345447"},{"key":"e_1_3_2_1_29_1","volume-title":"30th USENIX Security Symposium. 2201\u20132218","author":"Lehmkuhl Ryan","year":"2021","unstructured":"Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, and Raluca\u00a0Ada Popa. 2021. Muse: Secure inference resilient to malicious clients. In 30th USENIX Security Symposium. 2201\u20132218."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3018403"},{"key":"e_1_3_2_1_31_1","volume-title":"International Conference on Machine Learning. PMLR, 6978\u20136988","author":"Liu Hanwen","year":"2021","unstructured":"Hanwen Liu, Zhenyu Weng, and Yuesheng Zhu. 2021. Watermarking deep neural networks with greedy residuals. In International Conference on Machine Learning. PMLR, 6978\u20136988."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_33_1","volume-title":"She: A fast and accurate deep neural network for encrypted data. Advances in neural information processing systems 32","author":"Lou Qian","year":"2019","unstructured":"Qian Lou and Lei Jiang. 2019. She: A fast and accurate deep neural network for encrypted data. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"29th USENIX Security Symposium. 2505\u20132522","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca\u00a0Ada Popa. 2020. Delphi: A cryptographic inference service for neural networks. In 29th USENIX Security Symposium. 2505\u20132522."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_36_1","volume-title":"2018 USENIX Annual Technical Conference. 227\u2013240","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko, Bohdan Trach, Robert Krahn, Mark Silberstein, and Christof Fetzer. 2018. Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks. In 2018 USENIX Annual Technical Conference. 227\u2013240."},{"key":"e_1_3_2_1_37_1","first-page":"1","article-title":"Arnold\u2019s cat map","volume":"45","author":"Peterson Gabriel","year":"1997","unstructured":"Gabriel Peterson. 1997. Arnold\u2019s cat map. Math Linear Algebra 45 (1997), 1\u20137.","journal-title":"Math Linear Algebra"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_39_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Riazi M\u00a0Sadegh","year":"2019","unstructured":"M\u00a0Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based oblivious deep neural network inference. In 28th USENIX Security Symposium (USENIX Security 19). 1501\u20131518."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"e_1_3_2_1_42_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_43_1","volume-title":"Work-in-Progress: Critical-Weight Based Locking Scheme for DNN IP Protection in Edge Computing. In 2021 International Conference on Hardware\/Software Codesign and System Synthesis. IEEE, 33\u201334","author":"Song Ziwei","year":"2021","unstructured":"Ziwei Song, Wei Jiang, Jinyu Zhan, Xiangyu Wen, and Chen Bian. 2021. Work-in-Progress: Critical-Weight Based Locking Scheme for DNN IP Protection in Edge Computing. In 2021 International Conference on Hardware\/Software Codesign and System Synthesis. IEEE, 33\u201334."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_3_2_1_45_1","volume-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287","author":"Tramer Florian","year":"2018","unstructured":"Florian Tramer and Dan Boneh. 2018. Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. arXiv preprint arXiv:1806.03287 (2018)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078974"},{"key":"e_1_3_2_1_47_1","volume-title":"27th USENIX Security Symposium. 991\u20131008","author":"Van\u00a0Bulck Jo","year":"2018","unstructured":"Jo Van\u00a0Bulck 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In 27th USENIX Security Symposium. 991\u20131008."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196550"},{"key":"e_1_3_2_1_49_1","volume-title":"A Framework of an Intelligent Education System for Higher Education Based on Deep Learning.International Journal of Emerging Technologies in Learning 16, 7","author":"Zhang Xiuli","year":"2021","unstructured":"Xiuli Zhang and Zhongqiu Cao. 2021. A Framework of an Intelligent Education System for Higher Education Based on Deep Learning.International Journal of Emerging Technologies in Learning 16, 7 (2021)."}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC '23"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:41:15Z","timestamp":1755884475000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":49,"alternative-id":["10.1145\/3627106.3627107","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627107","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}