{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T13:14:33Z","timestamp":1776950073963,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":118,"publisher":"ACM","funder":[{"name":"European Union&rsquo;s Horizon Europe research and innovation programme under the LICORICE project","award":["101168311"],"award-info":[{"award-number":["101168311"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,5,4]]},"DOI":"10.1145\/3777884.3797005","type":"proceedings-article","created":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T12:27:26Z","timestamp":1776947246000},"page":"120-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SwiftSNNI: Optimized Scheduling for Secure Neural Network Inference (SNNI) on Multi-Core Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7767-9520","authenticated-orcid":false,"given":"Kanwal","family":"Batool","sequence":"first","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8346-4040","authenticated-orcid":false,"given":"Saleem","family":"Anwar","sequence":"additional","affiliation":[{"name":"Rotterdam University of Applied Sciences, Rotterdam, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6385-0780","authenticated-orcid":false,"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands and USI Universit\u00e0 della Svizzera italiana, Lugano, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2043-4469","authenticated-orcid":false,"given":"Andy","family":"Pimentel","sequence":"additional","affiliation":[{"name":"University of Amsterdam, Amsterdam, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5741-2709","authenticated-orcid":false,"given":"Zolt\u00e1n \u00c1d\u00e1m","family":"Mann","sequence":"additional","affiliation":[{"name":"University of M\u00fcnster, M\u00fcnster, Germany"}]}],"member":"320","published-online":{"date-parts":[[2026,5,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.32"},{"key":"e_1_3_2_1_3_1","volume-title":"Schuldt","author":"Attrapadung Nuttapong","year":"2021","unstructured":"Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, and Jacob C. N. Schuldt. 2021. Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation. CoRR, Vol. abs\/2106.02203 (2021). arXiv:2106.02203 https:\/\/arxiv.org\/abs\/2106.02203"},{"key":"e_1_3_2_1_4_1","volume-title":"Garbled Neural Networks are Practical. Cryptology ePrint Archive","author":"Ball Marshall","year":"2019","unstructured":"Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, and Nichole Schimanski. 2019. Garbled Neural Networks are Practical. Cryptology ePrint Archive (2019)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623136"},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Cryptology -- CRYPTO '91","author":"Beaver Donald","unstructured":"Donald Beaver. 1992. Efficient Multiparty Protocols Using Circuit Randomization. In Advances in Cryptology -- CRYPTO '91, Joan Feigenbaum (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 420-432."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_30"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_12"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978429"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36030-6_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490390"},{"key":"e_1_3_2_1_13_1","volume-title":"Low Latency Privacy Preserving Inference. CoRR","author":"Brutzkus Alon","year":"1812","unstructured":"Alon Brutzkus, Oren Elisha, and Ran Gilad-Bachrach. 2018. Low Latency Privacy Preserving Inference. CoRR, Vol. abs\/1812.10659. arXiv:1812.10659 http:\/\/arxiv.org\/abs\/1812.10659"},{"key":"e_1_3_2_1_14_1","volume-title":"FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. Cryptology ePrint Archive, Paper 2019\/1365. https:\/\/eprint.iacr.org\/2019\/1365","author":"Byali Megha","year":"2019","unstructured":"Megha Byali, Harsh Chaudhari, Arpita Patra, and Ajith Suresh. 2019. FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. Cryptology ePrint Archive, Paper 2019\/1365. https:\/\/eprint.iacr.org\/2019\/1365"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00043"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23005"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3251982"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00049"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation","author":"Crankshaw Daniel","year":"2017","unstructured":"Daniel Crankshaw, Xin Wang, Giulio Zhou, Michael J. Franklin, Joseph E. Gonzalez, and Ion Stoica. 2017. Clipper: a Low-Latency Online Prediction Serving System. In Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation (Boston, MA, USA) (NSDI'17). USENIX Association, USA, 613\u2013627."},{"key":"e_1_3_2_1_20_1","unstructured":"CSIRO ML & AI. 2023. Deep Learning Training with Multi-Party Computation. https:\/\/github.com\/csiro-mlai\/deep-mpc\/tree\/more-models. Accessed: 2025-11-04."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_23_1","volume-title":"Jones","author":"DeMillo Richard A.","year":"1978","unstructured":"Richard A. DeMillo, Richard J. Lipton, David P. Dobkin, and Anita K. Jones. 1978. Foundations of Secure Computation. Academic Press, Inc., USA."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133967"},{"key":"e_1_3_2_1_26_1","volume-title":"Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs. Cryptology ePrint Archive, Paper 2023\/100. https:\/\/eprint.iacr.org\/2023\/100","author":"Dong Ye","year":"2023","unstructured":"Ye Dong, Xiaojun Chen, Weizhan Jing, Kaiyun Li, and Weiping Wang. 2023a. Meteor: Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs. Cryptology ePrint Archive, Paper 2023\/100. https:\/\/eprint.iacr.org\/2023\/100"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3265342"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1051\/sands\/2025014"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PUNECON.2018.8745428"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2015.1011355"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560565"},{"key":"e_1_3_2_1_32_1","unstructured":"Lars Folkerts Charles Gouert and Nektarios Georgios Tsoutsos. 2021. REDsec: Running Encrypted Discretized Neural Networks in Seconds. Cryptology ePrint Archive Paper 2021\/1100. https:\/\/eprint.iacr.org\/2021\/1100"},{"key":"e_1_3_2_1_33_1","volume-title":"Brandon Reagen, and Siddharth Garg.","author":"Ghodsi Zahra","year":"2021","unstructured":"Zahra Ghodsi, Nandan Kumar Jha, Brandon Reagen, and Siddharth Garg. 2021. Circa: Stochastic ReLUs for Private Deep Learning. arXiv:2106.08475 [cs.LG] https:\/\/arxiv.org\/abs\/2106.08475"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems","author":"Ghodsi Zahra","year":"2020","unstructured":"Zahra Ghodsi, Akshaj Kumar Veldanda, Brandon Reagen, and Siddharth Garg. 2020. CryptoNAS: Private Inference on a ReLU Budget. In Proceedings of the 34th International Conference on Neural Information Processing Systems (Vancouver, BC, Canada) (NIPS '20). Curran Associates Inc., Red Hook, NY, USA, Article 1423, 11 pages."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of The 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of The 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 48), Maria Florina Balcan and Kilian Q. Weinberger (Eds.). PMLR, New York, New York, USA, 201-210. https:\/\/proceedings.mlr.press\/v48\/gilad-bachrach16.html"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_37_1","first-page":"261","volume-title":"Proceedings of International Conference on Data Science and Applications. Springer Nature Singapore","author":"Grigoriadis Ioannis","unstructured":"Ioannis Grigoriadis, Eleni Vrochidou, Iliana Tsiatsiou, editor=''Saraswat Mukesh Papakostas, George A.'', Chandreyee Chowdhury, Chintan Kumar Mandal, and Amir H. Gandomi. 2023. Machine Learning as a Service (MLaaS)--An Enterprise Perspective. In Proceedings of International Conference on Data Science and Applications. Springer Nature Singapore, Singapore, 261-273."},{"key":"e_1_3_2_1_38_1","volume-title":"Eigen: C template library for linear algebra. https:\/\/libeigen.gitlab.io\/ Accessed","author":"Guennebaud Ga\u00ebl","year":"2010","unstructured":"Ga\u00ebl Guennebaud, Beno^it Jacob, et al., 2010. Eigen: C template library for linear algebra. https:\/\/libeigen.gitlab.io\/ Accessed: February 15, 2026."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135993"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00175"},{"key":"e_1_3_2_1_41_1","volume-title":"SIGMA: Secure GPT Inference with Function Secret Sharing. In Privacy Enhancing technologies Symposium (PETS)","author":"Gupta Kanav","year":"2024","unstructured":"Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, and Rahul Sharma. 2024. SIGMA: Secure GPT Inference with Function Secret Sharing. In Privacy Enhancing technologies Symposium (PETS) 2024. https:\/\/www.microsoft.com\/en-us\/research\/publication\/sigma-secure-gpt-inference-with-function-secret-sharing\/"},{"key":"e_1_3_2_1_42_1","first-page":"274","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2022","author":"Gupta Kanav","year":"2022","unstructured":"Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, and Divya Gupta. 2022. LLAMA: A Low Latency Math Library for Secure Inference. Proceedings on Privacy Enhancing Technologies, Vol. 2022, 4 (2022), 274-294."},{"key":"e_1_3_2_1_43_1","first-page":"15718","volume-title":"Oh (Eds.)","volume":"35","author":"Hao Meng","year":"2022","unstructured":"Meng Hao, Hongwei Li, Hanxiao Chen, Pengzhi Xing, Guowen Xu, and Tianwei Zhang. 2022. Iron: Private Inference on Transformers. In Advances in Neural Information Processing Systems, S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (Eds.), Vol. 35. Curran Associates, Inc., 15718-15731. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/file\/64e2449d74f84e5b1a5c96ba7b3d308e-Paper-Conference.pdf"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Harth-Kitzerow Christopher","year":"2025","unstructured":"Christopher Harth-Kitzerow, Yongqin Wang, Rachit Rajat, Georg Carle, and Murali Annavaram. 2025. PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation. Proceedings on Privacy Enhancing Technologies (2025)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22963-3_19"},{"key":"e_1_3_2_1_46_1","first-page":"1","article-title":"Characterization and Prediction of Deep Learning Workloads in Large-Scale GPU Datacenters. In SC21: International Conference for High Performance Computing, Networking, Storage and Analysis. IEEE Computer Society, Los Alamitos","author":"Hu Qinghao","year":"2021","unstructured":"Qinghao Hu, Peng Sun, Shengen Yan, Yonggang Wen, and Tianwei Zhang. 2021. Characterization and Prediction of Deep Learning Workloads in Large-Scale GPU Datacenters. In SC21: International Conference for High Performance Computing, Networking, Storage and Analysis. IEEE Computer Society, Los Alamitos, CA, USA, 1-15. https:\/\/doi.ieeecomputersociety.org\/","journal-title":"CA, USA"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 33rd International Conference on Neural Information Processing Systems. Curran Associates Inc.","author":"Huang Yanping","year":"2019","unstructured":"Yanping Huang, Youlong Cheng, Ankur Bapna, Orhan Firat, Mia Xu Chen, Dehao Chen, HyoukJoong Lee, Jiquan Ngiam, Quoc V. Le, Yonghui Wu, and Zhifeng Chen. 2019. GPipe: Efficient Training of Giant Neural Networks Using Pipeline Parallelism. In Proceedings of the 33rd International Conference on Neural Information Processing Systems. Curran Associates Inc., Red Hook, NY, USA, Article 10, 10 pages."},{"key":"e_1_3_2_1_48_1","first-page":"809","volume-title":"Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 809-826. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/huang-zhicong"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484797"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2020.102183"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00063"},{"key":"e_1_3_2_1_53_1","unstructured":"Nandan Kumar Jha Zahra Ghodsi Siddharth Garg and Brandon Reagen. 2021. DeepReDuce: ReLU Reduction for Fast Private Inference. 4839-4849 pages."},{"key":"e_1_3_2_1_54_1","first-page":"1651","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 1651-1669. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/juvekar"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303958"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3348170"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems (NIPS '21)","author":"Knott Brian","unstructured":"Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, and Laurens van der Maaten. 2021. CRYPTEN: Secure Multi-party Computation meets Machine Learning. In Proceedings of the 35th International Conference on Neural Information Processing Systems (NIPS '21). Curran Associates Inc., Red Hook, NY, USA, Article 379, 13 pages."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1843-1856","author":"Koti Nishat","year":"2022","unstructured":"Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal. 2022. PentaGOD: Stepping beyond Traditional GOD with Five Parties. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1843-1856."},{"key":"e_1_3_2_1_60_1","first-page":"2651","volume-title":"SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Koti Nishat","year":"2021","unstructured":"Nishat Koti, Mahak Pancholi, Arpita Patra, and Ajith Suresh. 2021a. SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2651-2668. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/koti"},{"key":"e_1_3_2_1_61_1","volume-title":"Tetrad: Actively Secure 4PC for Secure Training and Inference. CoRR","author":"Koti Nishat","year":"2021","unstructured":"Nishat Koti, Arpita Patra, Rahul Rachuri, and Ajith Suresh. 2021b. Tetrad: Actively Secure 4PC for Secure Training and Inference. CoRR, Vol. abs\/2106.02850 (2021). arXiv:2106.02850 https:\/\/arxiv.org\/abs\/2106.02850"},{"key":"e_1_3_2_1_62_1","volume-title":"Weinberger (Eds.)","volume":"25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems, F. Pereira, C.J. Burges, L. Bottou, and K.Q. Weinberger (Eds.), Vol. 25. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2012\/file\/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf"},{"key":"e_1_3_2_1_63_1","volume-title":"CrypTFlow: Secure TensorFlow Inference. In IEEE Symposium on Security and Privacy (SP). 336-353","author":"Kumar Nishant","year":"2020","unstructured":"Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma. 2020. CrypTFlow: Secure TensorFlow Inference. In IEEE Symposium on Security and Privacy (SP). 336-353."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2018.06.008"},{"key":"e_1_3_2_1_65_1","first-page":"2201","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Lehmkuhl Ryan","year":"2021","unstructured":"Ryan Lehmkuhl, Pratyush Mishra, Akshayaram Srinivasan, and Raluca Ada Popa. 2021. Muse: Secure Inference Resilient to Malicious Clients. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2201-2218. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/lehmkuhl"},{"key":"e_1_3_2_1_66_1","volume-title":"Garnett (Eds.)","volume":"30","author":"Lin Ji","year":"2017","unstructured":"Ji Lin, Yongming Rao, Jiwen Lu, and Jie Zhou. 2017. Runtime Neural Pruning. In Advances in Neural Information Processing Systems, I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/a51fb975227d6640e4fe47854476d133-Paper.pdf"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_68_1","volume-title":"Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. arXiv preprint arXiv:2403.11166","author":"Liu Xuanqi","year":"2024","unstructured":"Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, and Mingwei Xu. 2024. Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. arXiv preprint arXiv:2403.11166 (2024). arXiv:2403.11166 [cs.CR] https:\/\/arxiv.org\/abs\/2403.11166"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3141391"},{"key":"e_1_3_2_1_70_1","volume-title":"Accurate and Fast Neural Network Inference. In 9th International Conference on Learning Representations, ICLR 2021","author":"Lou Qian","year":"2021","unstructured":"Qian Lou, Yilin Shen, Hongxia Jin, and Lei Jiang. 2021. SAFENet: A Secure, Accurate and Fast Neural Network Inference. In 9th International Conference on Learning Representations, ICLR 2021, Virtual Event, Austria, May 3-7, 2021. OpenReview.net. https:\/\/openreview.net\/forum?id=Cz3dbFm5u-"},{"key":"e_1_3_2_1_71_1","volume-title":"SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning. In 2023 USeNIX annual technical conference (USeNIX ATC 23)","author":"Ma Junming","unstructured":"Junming Ma, Yancheng Zheng, Jun Feng, Derun Zhao, Haoqi Wu, Wenjing Fang, Jin Tan, Chaofan Yu, Benyu Zhang, and Lei Wang. 2023. SecretFlow-SPU: A Performant and User-Friendly Framework for Privacy-Preserving Machine Learning. In 2023 USeNIX annual technical conference (USeNIX ATC 23). USENIX Association, Boston, MA, 17-33. https:\/\/www.usenix.org\/conference\/atc23\/presentation\/ma"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3628446"},{"key":"e_1_3_2_1_73_1","first-page":"2505","volume-title":"Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2505-2522. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813705"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Deepak Narayanan Mohammad Shoeybi Jared Casper Patrick LeGresley Mostofa Patwary Vijay Korthikanti Dmitri Vainbrand Prethvi Kashinkunti Julie Bernauer Bryan Catanzaro Amar Phanishayee and Matei Zaharia. 2021. Efficient Large-Scale Language Model Training on GPU Clusters Using Megatron-LM. arXiv:2104.04473 [cs.CL] https:\/\/arxiv.org\/abs\/2104.04473","DOI":"10.1145\/3458817.3476209"},{"key":"e_1_3_2_1_78_1","first-page":"2147","volume-title":"GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Lucien K.","unstructured":"Lucien K. L. Ng and Sherman S. M. Chow. 2021. GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2147-2164. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ng"},{"key":"e_1_3_2_1_79_1","volume-title":"https:\/\/www.openmp.org Accessed","author":"MP.","year":"2026","unstructured":"OpenMP. November 2024. https:\/\/www.openmp.org Accessed: February 15, 2026."},{"key":"e_1_3_2_1_80_1","volume-title":"Scheduling Techniques for Concurrent Systems. In IEEE International Conference on Distributed Computing Systems","volume":"82","author":"Ousterhout John K.","year":"1982","unstructured":"John K. Ousterhout. 1982. Scheduling Techniques for Concurrent Systems. In IEEE International Conference on Distributed Computing Systems, Vol. 82. 22-30. https:\/\/api.semanticscholar.org\/CorpusID:210842950"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10729-022-09592-6"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.2834486"},{"key":"e_1_3_2_1_83_1","volume-title":"Accurate and Efficient Inference for Transformers. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 4753-4771","author":"Pang Qi","year":"2024","unstructured":"Qi Pang, Jinhao Zhu, Helen M\u00f6llering, Wenting Zheng, and Thomas Schneider. 2024. BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 4753-4771. https:\/\/eprint.iacr.org\/2023\/1893"},{"key":"e_1_3_2_1_84_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Patra Arpita","year":"2021","unstructured":"Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. 2021. ABY2. 0: Improved Mixed-Protocol Secure Two-Party Computation. In 30th USENIX Security Symposium (USENIX Security 21). 2165-2182. https:\/\/eprint.iacr.org\/2020\/1225"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24202"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_87_1","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium","author":"Riazi M Sadegh","year":"2019","unstructured":"M Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In Proceedings of the 28th USENIX Conference on Security Symposium (Santa Clara, CA, USA) (SEC'19). USENIX Association, USA, 1501\u20131518."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_89_1","unstructured":"Bita Darvish Rouhani M Sadegh Riazi and Farinaz Koushanfar. 2017. DeepSecure: Scalable Provably-Secure Deep Learning. arXiv:1705.08963 [cs.CR] https:\/\/arxiv.org\/abs\/1705.08963"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179422"},{"key":"e_1_3_2_1_91_1","volume-title":"ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing.","author":"Ryffel Th\u00e9o","year":"2021","unstructured":"Th\u00e9o Ryffel, Pierre Tholoniat, David Pointcheval, and Francis Bach. 2021. ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing. (2021). arXiv:2006.04593 [cs.LG] https:\/\/arxiv.org\/abs\/2006.04593"},{"key":"e_1_3_2_1_92_1","volume-title":"International conference on machine learning. PMLR, 4490-4499","author":"Sanyal Amartya","year":"2018","unstructured":"Amartya Sanyal, Matt Kusner, Adria Gascon, and Varun Kanade. 2018. TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service. In International conference on machine learning. PMLR, 4490-4499."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00592-x"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359658"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530680"},{"key":"e_1_3_2_1_96_1","unstructured":"Mohammad Shoeybi Mostofa Patwary Raul Puri Patrick LeGresley Jared Casper and Bryan Catanzaro. 2019. Megatron-LM: Training Multi-Billion Parameter Language Models Using Model Parallelism. arXiv:1909.08053 [cs.CL] https:\/\/arxiv.org\/abs\/1909.08053"},{"key":"e_1_3_2_1_97_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv:1409.1556 https:\/\/arxiv.org\/abs\/1409.1556"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1002\/0470121173"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560697"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623147"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00098"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833648"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0113"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_1_105_1","volume-title":"FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. arXiv preprint arXiv:2004.02229","author":"Wagh Sameer","year":"2020","unstructured":"Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. 2020. FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. arXiv preprint arXiv:2004.02229 (2020). https:\/\/arxiv.org\/abs\/2004.02229"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.3001047"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3241615"},{"key":"e_1_3_2_1_108_1","first-page":"827","volume-title":"Piranha: A GPU Platform for Secure Computation. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Watson Jean-Luc","year":"2022","unstructured":"Jean-Luc Watson, Sameer Wagh, and Raluca Ada Popa. 2022. Piranha: A GPU Platform for Secure Computation. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 827-844. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/watson"},{"key":"e_1_3_2_1_109_1","first-page":"945","volume-title":"MLaaS in the Wild: Workload Analysis and Scheduling in Large-Scale Heterogeneous GPU Clusters. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Weng Qizhen","year":"2022","unstructured":"Qizhen Weng, Wencong Xiao, Yinghao Yu, Wei Wang, Cheng Wang, Jian He, Yong Li, Liping Zhang, Wei Lin, and Yu Ding. 2022. MLaaS in the Wild: Workload Analysis and Scheduling in Large-Scale Heterogeneous GPU Clusters. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). USENIX Association, Renton, WA, 945-960. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/weng"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3287072"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_113_1","first-page":"1049","volume-title":"SLO-Aware Machine Learning Inference Serving. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Zhang Chengliang","year":"2019","unstructured":"Chengliang Zhang, Minchen Yu, Wei Wang, and Feng Yan. 2019. MArk: Exploiting Cloud Services for Cost-Effective, SLO-Aware Machine Learning Inference Serving. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 1049-1062. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/zhang-chengliang"},{"key":"e_1_3_2_1_114_1","volume-title":"GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks. https:\/\/arxiv.org\/abs\/2105.01827","author":"Zhang Qiao","year":"2021","unstructured":"Qiao Zhang, Chunsheng Xin, and Hongyi Wu. 2021. GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks. https:\/\/arxiv.org\/abs\/2105.01827"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247719"},{"key":"e_1_3_2_1_116_1","first-page":"2723","volume-title":"Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Zheng Wenting","year":"2021","unstructured":"Wenting Zheng, Ryan Deng, Weikeng Chen, Raluca Ada Popa, Aurojit Panda, and Ion Stoica. 2021. Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2723-2740. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/zheng"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"},{"key":"e_1_3_2_1_118_1","volume-title":"Proceedings of the research school of computer science","volume":"2601","author":"Zhu Wanlei","year":"2018","unstructured":"Wanlei Zhu. 2018. Classification of MNIST Handwritten Digit Database using Neural Network. Proceedings of the research school of computer science. Australian National University, Acton, ACT, Vol. 2601 (2018). https:\/\/api.semanticscholar.org\/CorpusID:202741200"}],"event":{"name":"ICPE '26: 17th ACM\/SPEC International Conference on Performance Engineering","location":"Florence Italy","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SPEC"]},"container-title":["Proceedings of the 17th ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T12:29:16Z","timestamp":1776947356000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3777884.3797005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5,3]]},"references-count":118,"alternative-id":["10.1145\/3777884.3797005","10.1145\/3777884"],"URL":"https:\/\/doi.org\/10.1145\/3777884.3797005","relation":{},"subject":[],"published":{"date-parts":[[2026,5,3]]},"assertion":[{"value":"2026-05-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}