{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T13:31:34Z","timestamp":1763731894143,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["210100651"],"award-info":[{"award-number":["210100651"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1145\/3680207.3765578","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T13:19:18Z","timestamp":1763731158000},"page":"1166-1168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Demo: PP-AICloud for Edge-Assisted Privacy-Preserving AI Inference with Homomorphic Encryption in Cloud-Based Mobile Services"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6903-0163","authenticated-orcid":false,"given":"Chi-Hieu","family":"Nguyen","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1057-8332","authenticated-orcid":false,"given":"Bui Duc","family":"Manh","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9528-0863","authenticated-orcid":false,"given":"Dinh Thai","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2659-8648","authenticated-orcid":false,"given":"Diep N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7485-4493","authenticated-orcid":false,"given":"Lin","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Combining Machine Learning and Homomorphic Encryption in the Apple Ecosystem. https:\/\/machinelearning.apple.com\/research\/homomorphic-encryption Accessed","year":"2025","unstructured":"Apple. 2024. Combining Machine Learning and Homomorphic Encryption in the Apple Ecosystem. https:\/\/machinelearning.apple.com\/research\/homomorphic-encryption Accessed: July. 30, 2025."},{"key":"e_1_3_2_1_2_1","unstructured":"Ayoub Benaissa Bilal Retiat Bogdan Cebere and Alaa Eddine Belfedhal. 2021. TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption. arXiv:2104.03152 [cs.CR]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_4_1","volume-title":"Vision AI: Extract insights from images, documents, and videos. https:\/\/cloud.google.com\/vision#build-an-image-processing-pipeline Accessed","author":"Cloud Google","year":"2025","unstructured":"Google Cloud. 2025. Vision AI: Extract insights from images, documents, and videos. https:\/\/cloud.google.com\/vision#build-an-image-processing-pipeline Accessed: July. 30, 2025."},{"key":"e_1_3_2_1_5_1","volume-title":"A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing 13, 18","author":"Dinh Hoang T","year":"2013","unstructured":"Hoang T Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. 2013. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing 13, 18 (2013), 1587\u20131611."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.004.2300015"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3535792"},{"key":"e_1_3_2_1_8_1","volume-title":"Secure human action recognition by encrypted neural network inference. Nature communications 13, 1","author":"Kim Miran","year":"2022","unstructured":"Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, and Shayan Shams. 2022. Secure human action recognition by encrypted neural network inference. Nature communications 13, 1 (2022), 4799."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"e_1_3_2_1_10_1","volume-title":"Dinh Thai Hoang, and Diep N. Nguyen","author":"Manh Bui Duc","year":"2024","unstructured":"Bui Duc Manh, Chi-Hieu Nguyen, Dinh Thai Hoang, and Diep N. Nguyen. 2024. Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks. In 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall). 1\u20136."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2024-Fall63153.2024.10757744"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3365815"},{"key":"e_1_3_2_1_13_1","volume-title":"Encryption-Friendly LLM Architecture. In The Thirteenth International Conference on Learning Representations.","author":"Rho Donghwan","year":"2025","unstructured":"Donghwan Rho, Taeseong Kim, Minje Park, Jung Woo Kim, Hyunsik Chae, Ernest K Ryu, and Jung Hee Cheon. 2025. Encryption-Friendly LLM Architecture. In The Thirteenth International Conference on Learning Representations."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_15_1","volume-title":"Dusit Niyato, Xueqiang Yan, and Xu Chen.","author":"Wang Xiaofei","year":"2020","unstructured":"Xiaofei Wang, Yiwen Han, Victor CM Leung, Dusit Niyato, Xueqiang Yan, and Xu Chen. 2020. Convergence of edge computing and deep learning: A comprehensive survey. IEEE communications surveys & tutorials 22, 2 (2020), 869\u2013904."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3353265"}],"event":{"name":"ACM MOBICOM '25: 31st Annual International Conference on Mobile Computing and Networking","location":"Kerry Hotel, Hong Kong Hong Kong China","acronym":"ACM MOBICOM '25","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 31st Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3680207.3765578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T13:21:59Z","timestamp":1763731319000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3680207.3765578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":16,"alternative-id":["10.1145\/3680207.3765578","10.1145\/3680207"],"URL":"https:\/\/doi.org\/10.1145\/3680207.3765578","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]},"assertion":[{"value":"2025-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}