{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:17:28Z","timestamp":1766441848615,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","funder":[{"name":"NSFC","award":["92270204,U24A20236"],"award-info":[{"award-number":["92270204,U24A20236"]}]},{"name":"CAS Project for Young Scientists in Basic Research","award":["Grant No. YSBR-118"],"award-info":[{"award-number":["Grant No. YSBR-118"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765228","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"4020-4034","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SCOPE: Expanding Client-Side Post-Processing for Efficient Privacy-Preserving Model Inference"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7924-6940","authenticated-orcid":false,"given":"Shenchen","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4708-8061","authenticated-orcid":false,"given":"Yue","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7521-5164","authenticated-orcid":false,"given":"Cheng'an","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Akamaster. 2019. Akamaster\/Pytorch_resnet_cifar10: Proper Implementation of ResNet-s for CIFAR10\/100 in Pytorch That Matches Description of the Original Paper. https:\/\/github.com\/akamaster\/pytorch_resnet_cifar10"},{"key":"e_1_3_2_1_2_1","unstructured":"Alibaba Gemini Lab. 2025. Alibaba-Gemini-Lab\/OpenCheetah. https:\/\/github. com\/Alibaba-Gemini-Lab\/OpenCheetah"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium. USENIX Association, USENIX Association","author":"Ao Wei","year":"2024","unstructured":"Wei Ao and Vishnu Naresh Boddeti. 2024. AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE. In USENIX Security Symposium. USENIX Association, USENIX Association, Philadelphia, PA, USA."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623136"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3114032"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00942"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2022.102680"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning. PMLR","author":"Brutzkus Alon","year":"2019","unstructured":"Alon Brutzkus, Ran Gilad-Bachrach, and Oren Elisha. 2019. Low Latency Privacy Preserving Inference. In Proceedings of the 36th International Conference on Machine Learning. PMLR, Long Beach, California, USA, 812--821. https: \/\/proceedings.mlr.press\/v97\/brutzkus19a.html"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-acl.277"},{"key":"e_1_3_2_1_11_1","unstructured":"Edward Chou Josh Beal Daniel Levy et al. 2018. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. arXiv abs\/1811.09953 (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486929"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--84252--9_17"},{"volume-title":"Elements of information theory","author":"Cover Thomas M","key":"e_1_3_2_1_14_1","unstructured":"Thomas M Cover and Joy A Thomas. 2012. Elements of information theory. John Wiley & Sons, Hoboken, NJ."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1979.4766909"},{"key":"e_1_3_2_1_16_1","volume-title":"Ubuntu Manpage: Cgroups - Linux Control Groups. https:\/\/manpages.ubuntu.com\/manpages\/bionic\/man7\/cgroups.7.html","author":"Documentation Ubuntu","year":"2025","unstructured":"Ubuntu Documentation. 2025. Ubuntu Manpage: Cgroups - Linux Control Groups. https:\/\/manpages.ubuntu.com\/manpages\/bionic\/man7\/cgroups.7.html"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24034"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Machine Learning (ICML). PMLR","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, et al. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.. In International Conference on Machine Learning (ICML). PMLR, New York, NY, USA, 201--210."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems (NIPS '22)","author":"Hao Meng","year":"2022","unstructured":"Meng Hao, Hongwei Li, Hanxiao Chen, et al. 2022. Iron: Private Inference on Transformers. In Proceedings of the 36th International Conference on Neural Information Processing Systems (NIPS '22). Curran Associates Inc., Red Hook, NY, USA, 15718--15731."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690281"},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX Security Symposium","volume":"2022","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen-jie Lu, Cheng Hong, et al. 2022. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference.. In USENIX Security Symposium, Vol. 2022. USENIX Association, Boston, MA, USA, 809--826."},{"volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security Symposium. USENIX Association","author":"Juvekar Chiraag","key":"e_1_3_2_1_22_1","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha P. Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security Symposium. USENIX Association, Baltimore, MD, USA, 1651--1669."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Miran Kim Xiaoqian Jiang Kristin Lauter et al. 2022. Secure human action recognition by encrypted neural network inference. Nature Communications 13 1 (2022).","DOI":"10.1038\/s41467-022-32168-5"},{"key":"e_1_3_2_1_24_1","volume-title":"Conference on Neural Information Processing Systems (NeurIPS). NeurIPS, Virtual Only, 4961-- 4973","author":"Knott Brian","year":"2021","unstructured":"Brian Knott, Shobha Venkataraman, Awni Y. Hannun, et al. 2021. CrypTen: Secure Multi-Party Computation Meets Machine Learning.. In Conference on Neural Information Processing Systems (NeurIPS). NeurIPS, Virtual Only, 4961-- 4973."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 39th International Conference on Machine Learning. PMLR","author":"Lee Eunsang","year":"2022","unstructured":"Eunsang Lee, Joon-Woo Lee, Junghyun Lee, et al. 2022. Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions. In Proceedings of the 39th International Conference on Machine Learning. PMLR, Baltimore, MD, USA, 12403--12422. https:\/\/proceedings.mlr.press\/v162\/lee22e.html"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3287564"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning. PMLR, Virtual Only, 7102--7110","author":"Lou Qian","year":"2021","unstructured":"Qian Lou and Lei Jiang. 2021. HEMET: A Homomorphic-Encryption-Friendly Privacy-Preserving Mobile Neural Network Architecture.. In Proceedings of the 38th International Conference on Machine Learning. PMLR, Virtual Only, 7102--7110."},{"key":"e_1_3_2_1_28_1","unstructured":"Wen-jie Lu Zhicong Huang Zhen Gu et al. 2023. BumbleBee: Secure Two-party Inference Framework for Large Transformers."},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium","volume":"2020","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, et al. 2020. Delphi: A Cryptographic Inference Service for Neural Networks.. In USENIX Security Symposium, Vol. 2020. USENIX Association, Boston, MA, USA, 2505--2522."},{"key":"e_1_3_2_1_30_1","unstructured":"Primate Labs. 2025. Home - Geekbench. https:\/\/browser.geekbench.com\/"},{"key":"e_1_3_2_1_31_1","unstructured":"PyTorch. 2014. ResNet-50 \u2014 Torchvision main documentation. https:\/\/docs. pytorch.org\/vision\/main\/models\/generated\/torchvision.models.resnet50.html Accessed: 2025-09--10."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327144.3327174"},{"volume-title":"1st place models in Google Open- Image Detection Challenge 2019 \u2014 github.com. https:\/\/github.com\/Sense-X\/TSD","author":"Team X","key":"e_1_3_2_1_35_1","unstructured":"Sense-X Team. 2019. GitHub - Sense-X\/TSD: 1st place models in Google Open- Image Detection Challenge 2019 \u2014 github.com. https:\/\/github.com\/Sense-X\/TSD."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2025.3534636"},{"key":"e_1_3_2_1_37_1","volume-title":"Llama: Open and efficient foundation language models. arXiv:2302.13971","author":"Touvron Hugo","year":"2023","unstructured":"Hugo Touvron, Thibaut Lavril, Gautier Izacard, et al. 2023. Llama: Open and efficient foundation language models. arXiv:2302.13971"},{"key":"e_1_3_2_1_38_1","unstructured":"Ubuntu Documentation. 2025. Ubuntu Manpage: cpulimit -- limits the CPU usage of a process. https:\/\/manpages.ubuntu.com\/manpages\/trusty\/man1\/cpulimit.1. html"},{"key":"e_1_3_2_1_39_1","unstructured":"Ubuntu Documentation. 2025. Ubuntu Manpage: tc - show \/ manipulate traffic control settings. https:\/\/manpages.ubuntu.com\/manpages\/jammy\/en\/man8\/tc.8. html"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01721-8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417276"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3444327"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems (NIPS '23)","author":"Zeng Wenxuan","year":"2023","unstructured":"Wenxuan Zeng, Meng Li, Haichuan Yang, et al. 2023. CoPriv: Network\/Protocol Co-Optimization for Communication-Efficient Private Inference. In Proceedings of the 37th International Conference on Neural Information Processing Systems (NIPS '23). Curran Associates Inc., Red Hook, NY, USA, 78906--78925."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24351"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:14:39Z","timestamp":1766441679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":44,"alternative-id":["10.1145\/3719027.3765228","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765228","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}