{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:47:02Z","timestamp":1775069222726,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["General Research Fund 14210319"],"award-info":[{"award-number":["General Research Fund 14210319"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627175","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"463-476","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure Softmax\/Sigmoid for Machine-learning Computation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5816-4126","authenticated-orcid":false,"given":"Yu","family":"Zheng","sequence":"first","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8092-0653","authenticated-orcid":false,"given":"Qizhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Ant Group &amp; ByteDance, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7306-453X","authenticated-orcid":false,"given":"Sherman S. M.","family":"Chow","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5592-9971","authenticated-orcid":false,"given":"Yuxiang","family":"Peng","sequence":"additional","affiliation":[{"name":"Northeastern University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8532-6975","authenticated-orcid":false,"given":"Sijun","family":"Tan","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7495-1445","authenticated-orcid":false,"given":"Lichun","family":"Li","sequence":"additional","affiliation":[{"name":"Morse Team, Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6630-6051","authenticated-orcid":false,"given":"Shan","family":"Yin","sequence":"additional","affiliation":[{"name":"Morse Team, Ant Group, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Jianli Bai Xiaowu Zhang Xiangfu Song Hang Shao Qifan Wang Shujie Cui and Giovanni Russello. 2023. CryptoMask: Privacy-preserving Face Recognition. In ICICS. 333\u2013350.","DOI":"10.1007\/978-981-99-7356-9_20"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Christina Boura Ilaria Chillotti Nicolas Gama Dimitar Jetchev Stanislav Peceny and Alexander Petric. 2018. High-Precision Privacy-Preserving Real-Valued Function Evaluation. In FC. 183\u2013202.","DOI":"10.1007\/978-3-662-58387-6_10"},{"key":"e_1_3_2_1_3_1","volume-title":"Numerical Methods for Ordinary Differential Equations","author":"Butcher John\u00a0Charles","unstructured":"John\u00a0Charles Butcher. 2016. Numerical Methods for Ordinary Differential Equations. John Wiley & Sons, New Zealand."},{"key":"e_1_3_2_1_4_1","volume-title":"Fourier Analysis and Approximation: One Dimensional Theory","author":"Butzer L.","unstructured":"Paul\u00a0L. Butzer and Rolf\u00a0J. Nessel. 1971. Fourier Analysis and Approximation: One Dimensional Theory. Birkh\u00e4user Basel, Switzerland."},{"key":"e_1_3_2_1_5_1","volume-title":"Rosetta: A Privacy-Preserving Framework Based on TensorFlow. https:\/\/github.com\/LatticeX-Foundation\/Rosetta. Also presented at the Privacy Preserving Machine Learning Workshop at ACM CCS","author":"Chen Yuanfeng","year":"2020","unstructured":"Yuanfeng Chen, Gaofeng Huang, Junjie Shi, Xiang Xie, and Yilin Yan. 2020. Rosetta: A Privacy-Preserving Framework Based on TensorFlow. https:\/\/github.com\/LatticeX-Foundation\/Rosetta. Also presented at the Privacy Preserving Machine Learning Workshop at ACM CCS 2021."},{"key":"e_1_3_2_1_6_1","volume-title":"Private Machine Learning in TensorFlow using Secure Computation. arXiV","author":"Dahl Morten","year":"1810","unstructured":"Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, and Gavin Uhma. 2018. Private Machine Learning in TensorFlow using Secure Computation. arXiV 1810.08130. Also presented at the Privacy Preserving Machine Learning Workshop at NeurIPS 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Fantastic Four: Honest-Majority Four-Party Secure Computation with Malicious Security. In Usenix Security. 2183\u20132200.","author":"Dalskov Anders","year":"2021","unstructured":"Anders P.\u00a0K. Dalskov, Daniel Escudero, and Marcel Keller. 2021. Fantastic Four: Honest-Majority Four-Party Secure Computation with Malicious Security. In Usenix Security. 2183\u20132200."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"e_1_3_2_1_9_1","unstructured":"Minxin Du Xiang Yue Sherman S.\u00a0M. Chow Tianhao Wang Chenyu Huang and Huan Sun. 2023. DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. In ACM CCS. 18\u00a0pages. To appear also available at arXiV 2309.06746."},{"key":"e_1_3_2_1_10_1","volume-title":"Numerical Methods for Initial Value Problems in Ordinary Differential Equations","author":"Fatunla Simeon\u00a0Ola","unstructured":"Simeon\u00a0Ola Fatunla. 1988. Numerical Methods for Initial Value Problems in Ordinary Differential Equations. Elsevier, Boston."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0109"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In CVPR. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_13_1","volume-title":"Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In Usenix Security. 809\u2013826.","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In Usenix Security. 809\u2013826."},{"key":"e_1_3_2_1_14_1","unstructured":"Marcel Keller and Ke Sun. 2022. Secure Quantized Training for Deep Learning. In ICML. 10912\u201310938."},{"key":"e_1_3_2_1_15_1","unstructured":"Brian Knott Shobha Venkataraman Awni\u00a0Y. Hannun Shubho Sengupta Mark Ibrahim and Laurens van\u00a0der Maaten. 2021. CrypTen: Secure Multi-Party Computation Meets Machine Learning. In NeurIPS. 4961\u20134973."},{"key":"e_1_3_2_1_16_1","unstructured":"Alex Krizhevsky and Geoffrey Hinton. 2009. Learning Multiple Layers of Features from Tiny Images. https:\/\/www.cs.toronto.edu\/\u00a0kriz\/cifar.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey\u00a0E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In NIPS. 1106\u20131114."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"e_1_3_2_1_19_1","volume-title":"Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. In Usenix Security. 6435\u20136451.","author":"Huang Zhicong","year":"2023","unstructured":"Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, and Cheng Hong. 2023. Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. In Usenix Security. 6435\u20136451."},{"key":"e_1_3_2_1_20_1","volume-title":"\u00a0M. Chow","author":"Ma Jack","year":"2021","unstructured":"Jack P.\u00a0K. Ma, Raymond K.\u00a0H. Tai, Yongjun Zhao, and Sherman S.\u00a0M. Chow. 2021. Let\u2019s Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation. In NDSS. 18\u00a0pages."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Payman Mohassel and Peter Rindal. 2018. ABY3: A Mixed Protocol Framework for Machine Learning. In ACM CCS. 35\u201352.","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_22_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning","author":"Mohassel Payman","unstructured":"Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE S&P. 19\u201338."},{"key":"e_1_3_2_1_23_1","volume-title":"\u00a0M. Chow","author":"Ng Lucien","year":"2021","unstructured":"Lucien K.\u00a0L. Ng and Sherman S.\u00a0M. Chow. 2021. GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. In Usenix Security. 2147\u20132164."},{"key":"e_1_3_2_1_24_1","volume-title":"\u00a0M. Chow","author":"Ng Lucien","year":"2023","unstructured":"Lucien K.\u00a0L. Ng and Sherman S.\u00a0M. Chow. 2023. SoK: Cryptographic Neural-Network Computation. In IEEE S&P. 497\u2013514."},{"key":"e_1_3_2_1_25_1","volume-title":"Goten: GPU-Outsourcing Trusted Execution of Neural Network Training. In AAAI. 14876\u201314883.","author":"Ng Lucien","year":"2021","unstructured":"Lucien K.\u00a0L. Ng, Sherman S.\u00a0M. Chow, Anna P.\u00a0Y. Woo, Donald P.\u00a0H. Wong, and Yongjun Zhao. 2021. Goten: GPU-Outsourcing Trusted Execution of Neural Network Training. In AAAI. 14876\u201314883."},{"key":"e_1_3_2_1_26_1","unstructured":"Arpita Patra Thomas Schneider Ajith Suresh and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In Usenix Security. 2165\u20132182."},{"key":"e_1_3_2_1_27_1","volume-title":"SecFloat: Accurate Floating-Point meets Secure 2-Party Computation","author":"Rathee Deevashwer","unstructured":"Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, and Aseem Rastogi. 2022. SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. In IEEE S&P. 576\u2013595."},{"key":"e_1_3_2_1_28_1","volume-title":"Divya Gupta, Rahul Sharma, Nishanth Chandran, and Aseem Rastogi.","author":"Rathee Deevashwer","year":"2021","unstructured":"Deevashwer Rathee, Mayank Rathee, Rahul Kranti\u00a0Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, and Aseem Rastogi. 2021. SiRnn: A Math Library for Secure RNN Inference. In IEEE S&P. 1003\u20131020."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Deevashwer Rathee Mayank Rathee Nishant Kumar Nishanth Chandran Divya Gupta Aseem Rastogi and Rahul Sharma. 2020. CrypTFlow2: Practical 2-Party Secure Inference. In ACM CCS. 325\u2013342.","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0015"},{"key":"e_1_3_2_1_31_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In ICLR. 14\u00a0pages."},{"key":"e_1_3_2_1_32_1","volume-title":"CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU","author":"Tan Sijun","unstructured":"Sijun Tan, Brian Knott, Yuan Tian, and David\u00a0J. Wu. 2021. CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. In IEEE S&P. 1021\u20131038."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0011"},{"key":"e_1_3_2_1_35_1","volume-title":"Piranha: A GPU Platform for Secure Computation. In Usenix Security. 827\u2013844.","author":"Watson Jean-Luc","year":"2022","unstructured":"Jean-Luc Watson, Sameer Wagh, and Raluca\u00a0Ada Popa. 2022. Piranha: A GPU Platform for Secure Computation. In Usenix Security. 827\u2013844."},{"key":"e_1_3_2_1_36_1","volume-title":"\u00a0M. Chow","author":"Wong Harry","year":"2020","unstructured":"Harry W.\u00a0H. Wong, Jack P.\u00a0K. Ma, Donald P.\u00a0H. Wong, Lucien K.\u00a0L. Ng, and Sherman S.\u00a0M. Chow. 2020. Learning Model with Error - Exposing the Hidden Model of BAYHENN. In IJCAI. 3529\u20133535."},{"key":"e_1_3_2_1_37_1","unstructured":"Zhiqin Yang Yonggang Zhang Yu Zheng Xinmei Tian Peng Hao Tongliang Liu and Bo Han. 2023. FedFed: Feature Distillation against Data Heterogeneity in Federated Learning. In NeurIPS. 32\u00a0pages."},{"key":"e_1_3_2_1_38_1","unstructured":"Aston Zhang Zachary\u00a0C. Lipton Mu Li and Alexander\u00a0J. Smola. 2021. Dive into Deep Learning. arXiv:2106.11342."},{"key":"e_1_3_2_1_39_1","volume-title":"Primer: A Privacy-preserving Transformer on Encrypted Data. In DAC. 6\u00a0pages.","author":"Zheng Mengxin","year":"2023","unstructured":"Mengxin Zheng, Qian Lou, and Lei Jiang. 2023. Primer: A Privacy-preserving Transformer on Encrypted Data. In DAC. 6\u00a0pages."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Yu Zheng Wei Song Minxin Du Sherman S. M. Chow\u00a0Qian Lou Yongjun Zhao and Xiuhua Wang. 2023. Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning. In ADMA. 393\u2013407.","DOI":"10.1007\/978-3-031-46664-9_27"}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC '23"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:39:03Z","timestamp":1755884343000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":40,"alternative-id":["10.1145\/3627106.3627175","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627175","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}