{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:44Z","timestamp":1755907724985,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation (NSF)","award":["CNS-2308730, CNS-2302689, CNS-2432533, CNS-2319277, CMMI-2326341"],"award-info":[{"award-number":["CNS-2308730, CNS-2302689, CNS-2432533, CNS-2319277, CMMI-2326341"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1145\/3714393.3726505","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T18:38:47Z","timestamp":1749062327000},"page":"185-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6847-6664","authenticated-orcid":false,"given":"Bingyu","family":"Liu","sequence":"first","affiliation":[{"name":"Wentworth Institute of Technology, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8111-6176","authenticated-orcid":false,"given":"Ali","family":"Arastehfard","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4019-5327","authenticated-orcid":false,"given":"Rujia","family":"Wang","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1466-7418","authenticated-orcid":false,"given":"Weiran","family":"Liu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0921-8869","authenticated-orcid":false,"given":"Zhongjie","family":"Ba","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6409-7716","authenticated-orcid":false,"given":"Shanglin","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4095-4506","authenticated-orcid":false,"given":"Yuan","family":"Hong","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Garbled Neural Networks are Practical. IACR Cryptol. ePrint Arch","author":"Ball Marshall","year":"2019","unstructured":"Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, and Nichole Schimanski. Garbled Neural Networks are Practical. IACR Cryptol. ePrint Arch., 2019."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_3_1","unstructured":"Stephen Boyd Neal Parikh Eric Chu Borja Peleato Jonathan Eckstein et al. Distributed optimization and statistical learning via the alternating direction method of multipliers. Foundations and Trends\u00ae in Machine learning 1--122."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the ACML","volume":"95","author":"Chen Xuhui","year":"2018","unstructured":"Xuhui Chen, Jinlong Ji, Lixing Yu, Changqing Luo, and Pan Li. 2018. SecureNets: Secure Inference of Deep Neural Networks on an Untrusted Cloud. In Proc. of the ACML, 2018, Vol. 95, 646--661."},{"key":"e_1_3_2_1_7_1","volume-title":"Advances in Cryptology, 2017, 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security","volume":"10624","author":"Cheon Jung Hee","unstructured":"Jung Hee Cheon, Andrey Kim, Miran Kim, and Yong Soo Song. Homomorphic Encryption for Arithmetic of Approximate Numbers. In Advances in Cryptology, 2017, 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Vol. 10624."},{"key":"e_1_3_2_1_8_1","volume-title":"Chinmay Hegde. Selective Network Linearization for Efficient Private Inference. In ICML","author":"Cho Minsu","year":"2022","unstructured":"Minsu Cho, Ameya Joshi, Brandon Reagen, Siddharth Garg, and Chinmay Hegde. Selective Network Linearization for Efficient Private Inference. In ICML 2022."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_10_1","volume-title":"DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. In IEEE Symposium on Security and Privacy","author":"Feng Shuya","year":"2024","unstructured":"Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, and Yuan Hong. 2024. DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. In IEEE Symposium on Security and Privacy, 2024."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_12_1","volume-title":"ICML","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In ICML 2016,"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/344"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Deniz Gurevin Shanglin Zhou Lynn Pepin Bingbing Li Mikhail Bragin Caiwen Ding and Fei Miao. 2020. Enabling retrain-free deep neural network pruning using surrogate lagrangian relaxation. (2020).","DOI":"10.24963\/ijcai.2021\/344"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007447"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00368"},{"key":"e_1_3_2_1_17_1","volume-title":"Wright","author":"Hesamifard Ehsan","year":"2018","unstructured":"Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, and Rebecca N. Wright. 2018. Privacy-preserving Machine Learning as a Service. PoPETs, , Vol. 2018."},{"key":"e_1_3_2_1_18_1","volume-title":"Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility","author":"Hong Yuan","year":"2022","unstructured":"Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras, and Sanjay Goel. 2022. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility. In IEEE Transactions on Dependable and Secure Computing. % 2022 2015."},{"key":"e_1_3_2_1_19_1","volume-title":"Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In USENIX'22","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In USENIX'22. % 2022"},{"key":"e_1_3_2_1_20_1","volume-title":"DeepReDuce: ReLU Reduction for Fast Private Inference. In ICML","author":"Jha Nandan Kumar","year":"2021","unstructured":"Nandan Kumar Jha, Zahra Ghodsi, Siddharth Garg, and Brandon Reagen. 2021. DeepReDuce: ReLU Reduction for Fast Private Inference. In ICML 2021,"},{"key":"e_1_3_2_1_21_1","volume-title":"DeepReShape: Redesigning Neural Networks for Efficient Private Inference. CoRR","author":"Jha Nandan Kumar","year":"2023","unstructured":"Nandan Kumar Jha and Brandon Reagen. 2023. DeepReShape: Redesigning Neural Networks for Efficient Private Inference. CoRR, Vol. abs\/2304.10593 (2023)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Xiaoqian Jiang Miran Kim Kristin E. Lauter and Yongsoo Song. 2018. Secure Outsourced Matrix Computation and Application to Neural Networks. In CCS.","DOI":"10.1145\/3243734.3243837"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security, 2018, 1651--1669."},{"key":"e_1_3_2_1_24_1","volume-title":"Large-Scale Video Classification with Convolutional Neural Networks. In IEEE Conference on CVPR","author":"Karpathy Andrej","year":"2014","unstructured":"Andrej Karpathy, George Toderici, Sanketh Shetty, Thomas Leung, Rahul Sukthankar, and Li Fei-Fei. 2014. Large-Scale Video Classification with Convolutional Neural Networks. In IEEE Conference on CVPR 2014."},{"key":"e_1_3_2_1_25_1","volume-title":"ESORICS 2018, Barcelona, Spain, September 3--7, 2018, Proc., Part I (Lecture Notes in Computer Science","volume":"171","author":"Keuffer Julien","year":"2018","unstructured":"Julien Keuffer, Refik Molva, and Herv\u00e9 Chabanne. 2018. Efficient Proof Composition for Verifiable Computation. In Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3--7, 2018, Proc., Part I (Lecture Notes in Computer Science, Vol. 11098), 152--171."},{"key":"e_1_3_2_1_26_1","volume-title":"Advances in NeurIPS","author":"Knott Brian","year":"2021","unstructured":"Brian Knott, Shobha Venkataraman, Awni Y. Hannun, Shubho Sengupta, Mark Ibrahim, and Laurens van der Maaten. 2021. CrypTen: Secure Multi-Party Computation Meets Machine Learning. In Advances in NeurIPS 2021."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"e_1_3_2_1_28_1","volume-title":"ICLR","author":"Kundu Souvik","year":"2023","unstructured":"Souvik Kundu, Shunlin Lu, Yuke Zhang, Jacqueline Tiffany Liu, and Peter A. Beerel. 2023. Learning to Linearize Deep Neural Networks for Secure and Efficient Private Inference. In ICLR, 2023."},{"key":"e_1_3_2_1_29_1","volume-title":"ACM CCS","author":"Liu Jian","year":"2017","unstructured":"Jian Liu, Mika Juuti, Yao Lu, and N. Asokan. 2017. Oblivious Neural Network Predictions via MiniONN Transformations. In ACM CCS, 2017 ."},{"key":"e_1_3_2_1_30_1","volume-title":"AAMAS","author":"Liu Bingyu","year":"2020","unstructured":"Bingyu Liu, Shangyu Xie, and Yuan Hong. 2020. PANDA: Privacy-Aware Double Auction for Divisible Resources without a Mediator. In AAMAS, 2020 ."},{"key":"e_1_3_2_1_31_1","volume-title":"The Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS): A dynamic, multimodal set of facial and vocal expressions in North American English. PloS one","author":"Livingstone Steven R","year":"2018","unstructured":"Steven R Livingstone and Frank A Russo. 2018. The Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS): A dynamic, multimodal set of facial and vocal expressions in North American English. PloS one, Vol. 13, 5 (2018)."},{"key":"e_1_3_2_1_32_1","volume-title":"CCS","author":"Mohammady Meisam","year":"2018","unstructured":"Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, and Mourad Debbabi. Preserving both privacy and utility in network trace anonymization. In CCS, 2018."},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Security","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. Delphi: A Cryptographic Inference Service for Neural Networks. In USENIX Security, 2020."},{"key":"e_1_3_2_1_34_1","volume-title":"ACM CCS","author":"Mohassel Payman","year":"2018","unstructured":"Payman Mohassel and Peter Rindal. 2018. ABY(^mbox3): A Mixed Protocol Framework for Machine Learning. In ACM CCS, 2018."},{"key":"e_1_3_2_1_35_1","volume-title":"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques.","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques."},{"key":"e_1_3_2_1_36_1","volume-title":"Privacy-Preserving Video Classification with Convolutional Neural Networks. In ICML","author":"Pentyala Sikha","year":"2021","unstructured":"Sikha Pentyala, Rafael Dowsley, and Martine De Cock. 2021. Privacy-Preserving Video Classification with Convolutional Neural Networks. In ICML 2021."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.48"},{"key":"e_1_3_2_1_38_1","first-page":"1039","article-title":"Visor: Privacy-Preserving Video Analytics as a Cloud Service","volume":"2020","author":"Poddar Rishabh","year":"2020","unstructured":"Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, and Raluca Ada Popa. 2020. Visor: Privacy-Preserving Video Analytics as a Cloud Service. In USENIX Security, 2020. , pp. 1039--1056.","journal-title":"USENIX Security"},{"key":"e_1_3_2_1_39_1","unstructured":"Michael O. Rabin. 2005. How To Exchange Secrets with Oblivious Transfer. IACR Cryptol. ePrint Arch. (2005) 187."},{"key":"e_1_3_2_1_40_1","volume-title":"ACM CCS","author":"Rathee Deevashwer","year":"2020","unstructured":"Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma. CrypTFlow2: Practical 2-Party Secure Inference. In ACM CCS, 2020,"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Security","author":"Riazi M. Sadegh","year":"2019","unstructured":"M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, and Farinaz Koushanfar. XONN: XNOR-based Oblivious Deep Neural Network Inference. In USENIX Security, 2019, 1501--1518."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196023"},{"key":"e_1_3_2_1_44_1","unstructured":"Reza Shokri and Vitaly Shmatikov. Privacy-Preserving Deep Learning. In CCS."},{"key":"e_1_3_2_1_45_1","volume-title":"Amir Roshan Zamir, and Mubarak Shah","author":"Soomro Khurram","year":"2012","unstructured":"Khurram Soomro, Amir Roshan Zamir, and Mubarak Shah. 2012. UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild. CoRR, Vol. abs\/1212.0402 (2012)."},{"volume-title":"Privado: Practical and Secure DNN Inference. CoRR","author":"Tople Shruti","key":"e_1_3_2_1_46_1","unstructured":"Shruti Tople, Karan Grover, Shweta Shinde, Ranjita Bhagwan, and Ramachandran Ramjee. Privado: Practical and Secure DNN Inference. CoRR, Vol. abs\/1810.00602 ( 18)."},{"key":"e_1_3_2_1_47_1","volume-title":"Verifiable and Private Execution of Neural Networks in Trusted Hardware. In ICLR","author":"Tram\u00e8r Florian","year":"2019","unstructured":"Florian Tram\u00e8r and Dan Boneh. Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. In ICLR 2019, ."},{"key":"e_1_3_2_1_48_1","first-page":"4489","article-title":"Learning Spatiotemporal Features with 3D Convolutional Networks","volume":"2015","author":"Tran Du","year":"2015","unstructured":"Du Tran, Lubomir D. Bourdev, Rob Fergus, Lorenzo Torresani, and Manohar Paluri. 2015. Learning Spatiotemporal Features with 3D Convolutional Networks. In IEEE ICCV, 2015. 4489--4497.","journal-title":"IEEE ICCV"},{"key":"e_1_3_2_1_49_1","first-page":"1","article-title":"Cooperation and security isolation of library OSes for multi-process applications","volume":"9","author":"Arora Kumar Saurabh","year":"2014","unstructured":"Chia-che Tsai, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela A. S. de Oliveira, and Donald E. Porter. 2014. Cooperation and security isolation of library OSes for multi-process applications. In EuroSys. 9:1--9:14.","journal-title":"EuroSys."},{"key":"e_1_3_2_1_50_1","volume-title":"Differentially Private Empirical Risk Minimization Revisited: Faster and More General. CoRR","author":"Wang Di","year":"2018","unstructured":"Di Wang, Minwei Ye, and Jinhui Xu. 2018. Differentially Private Empirical Risk Minimization Revisited: Faster and More General. CoRR, Vol. abs\/1802.05251 (2018)."},{"volume-title":"VideoDP: A Flexible Platform for Video Analytics with Differential Privacy. PoPETs","author":"Wang Han","key":"e_1_3_2_1_51_1","unstructured":"Han Wang, Shangyu Xie, and Yuan Hong. 2020. VideoDP: A Flexible Platform for Video Analytics with Differential Privacy. PoPETs, , Vol. 2020."},{"key":"e_1_3_2_1_52_1","volume-title":"EDBT","author":"Wang Han","year":"2020","unstructured":"Han Wang, Yuan Hong, Yu Kong, and Jaideep Vaidya. 2020. Publishing Video Data with Indistinguishable Objects. EDBT, 2020,."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833776"},{"key":"e_1_3_2_1_54_1","volume-title":"TDSC","author":"Xie Shangyu","year":"2024","unstructured":"Shangyu Xie, Yan Yan, and Yuan Hong. 2024. Stealthy 3D Poisoning Attack on Video Recognition Models. In TDSC, 2024."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045277"},{"key":"e_1_3_2_1_56_1","first-page":"162","article-title":"How to Generate and Exchange Secrets (Extended Abstract)","volume":"1986","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets (Extended Abstract). In IEEE FOCS, 1986, 162--167.","journal-title":"IEEE FOCS"},{"key":"e_1_3_2_1_57_1","volume-title":"Differentially Private Model Publishing for Deep Learning. In IEEE Symposium on Security and Privacy","author":"Yu Lei","year":"2019","unstructured":"Lei Yu, Ling Liu, Calton Pu, Mehmet Emre Gursoy, and Stacey Truex. 2019. Differentially Private Model Publishing for Deep Learning. In IEEE Symposium on Security and Privacy, 2019. 332--349."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24351"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01237-3_12"},{"key":"e_1_3_2_1_60_1","volume-title":"Wornell. %","author":"Zhou Hongchao","year":"2014","unstructured":"Hongchao Zhou and Gregory W. Wornell. % 2014. Efficient homomorphic encryption on integer vectors and its applications. In ITA, % 2014, San Diego, CA, USA, February 9--14, 2014."},{"key":"e_1_3_2_1_61_1","first-page":"122","article-title":"An end-to-end multi-task object detection using embedded gpu in autonomous driving","volume":"2021","author":"Zhou Shanglin","year":"2021","unstructured":"Shanglin Zhou, Mimi Xie, Yufang Jin, Fei Miao, and Caiwen Ding. % 2021. An end-to-end multi-task object detection using embedded gpu in autonomous driving. In IEEE ISQED, 2021, 122--128.","journal-title":"IEEE ISQED"}],"event":{"name":"CODASPY '25: Fifteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Pittsburgh PA USA","acronym":"CODASPY '25"},"container-title":["Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726505","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3714393.3726505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T19:55:23Z","timestamp":1755892523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3714393.3726505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":61,"alternative-id":["10.1145\/3714393.3726505","10.1145\/3714393"],"URL":"https:\/\/doi.org\/10.1145\/3714393.3726505","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]},"assertion":[{"value":"2025-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}