{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:29Z","timestamp":1773615809344,"version":"3.50.1"},"reference-count":30,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701049","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:03Z","timestamp":1741962183000},"page":"1373-1385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Researching the Performance of AutoML Platforms in Confidential Computing"],"prefix":"10.3103","volume":"58","author":[{"given":"S. V.","family":"Bezzateev","sequence":"first","affiliation":[]},{"given":"G. A.","family":"Zhemelev","sequence":"additional","affiliation":[]},{"given":"S. G.","family":"Fomicheva","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7803_CR1","unstructured":"Patience, N. and Immerman, D., Global Trends in AI-WEKA. https:\/\/www.weka.io\/resources\/analyst-report\/2023-global-trends-in-ai\/. Cited May 5, 2024."},{"key":"7803_CR2","unstructured":"Infusing security into MLOps. https:\/\/www.robustintelligence.com\/blog-posts\/mlsecops-infusing-security-into-mlops. Cited May 5, 2024."},{"key":"7803_CR3","doi-asserted-by":"publisher","first-page":"md\u201321","DOI":"10.1115\/1.4052301","volume":"144","author":"S. Ghosh","year":"2021","unstructured":"Ghosh, S., Anantha Padmanabha, G., Peng, Ch., Andreoli, V., Atkinson, S., Pandita, P., Vandeputte, T., Zabaras, N., and Wang, L., Inverse aerodynamic design of gas turbine blades using probabilistic machine learning, J. Mech. Des., 2021, vol. 144, no. 2, pp. md\u201321\u20131275. https:\/\/doi.org\/10.1115\/1.4052301","journal-title":"J. Mech. Des."},{"key":"7803_CR4","doi-asserted-by":"publisher","first-page":"860","DOI":"10.3934\/era.2023043","volume":"31","author":"Y. Zhang","year":"2022","unstructured":"Zhang, Y., Pan, Z., Zhang, Sh., and Qiu, N., Probabilistic invertible neural network for inverse design space exploration and reasoning, Electronic Research Archive, 2022, vol. 31, no. 2, pp. 860\u2013881. https:\/\/doi.org\/10.3934\/era.2023043","journal-title":"Electronic Research Archive"},{"key":"7803_CR5","doi-asserted-by":"publisher","unstructured":"Esan, A.B. and Ehiaguina, V., Dataset for independent gas turbine for electricity generation, Mendeley Data, \n               V3, 2019. https:\/\/doi.org\/10.17632\/6w3vy3ybhg","DOI":"10.17632\/6w3vy3ybhg"},{"key":"7803_CR6","doi-asserted-by":"publisher","unstructured":"Zohuri, B., Gas turbine working principles, Combined Cycle Driven Efficiency for Next Generation Nuclear Power Plants, Cham: Springer, 2015, pp. 147\u2013171. https:\/\/doi.org\/10.1007\/978-3-319-15560-9_7","DOI":"10.1007\/978-3-319-15560-9_7"},{"key":"7803_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/3460427","volume":"54","author":"Xuefei Yin","year":"2021","unstructured":"Xuefei Yin, Ya., Zhu, J., and Hu, A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions, ACM Comput. Surv. \n               (CSUR), 2021, vol. 54, no. 6, p. 131. https:\/\/doi.org\/10.1145\/3460427","journal-title":"ACM Comput. Surv."},{"key":"7803_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.36724\/2072-8735-2023-17-10-28-42","volume":"17","author":"S.G. Fomicheva","year":"2023","unstructured":"Fomicheva, S.G. and Bezzateev, S.V., Defenses for machine learning models from adversarial attacks, T-Comm: Telekommunikatsii i Transport, 2023, vol. 17, no. 10, pp. 28\u201342. https:\/\/doi.org\/10.36724\/2072-8735-2023-17-10-28-42","journal-title":"T-Comm: Telekommunikatsii i Transport"},{"key":"7803_CR9","doi-asserted-by":"publisher","unstructured":"Fomicheva, S.G., Influence of attack indicator ranking on the quality of machine learning models in agent-based continuous authentication systems, T-Comm: Telekommunikatsii i Transport, 2023, vol. 17, no. 8, pp. 45\u201355. https:\/\/doi.org\/10.36724\/2072-8735-2023-17-8-45-55","DOI":"10.36724\/2072-8735-2023-17-8-45-55"},{"key":"7803_CR10","doi-asserted-by":"publisher","unstructured":"Li, X., Zhao, B., Yang, G., Xiang, T., Weng, J., and Deng, R.H., A survey of secure computation using trusted execution environments, arXiv Preprint, 2023. https:\/\/doi.org\/10.48550\/arXiv.2302.12150","DOI":"10.48550\/arXiv.2302.12150"},{"key":"7803_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/3177872","volume":"65","author":"E. Stefanov","year":"2018","unstructured":"Stefanov, E., Van Dijk, M., Shi, E., Chan, T.-H.H., Ch, F., Ren, L., Yu, X., and Devadas, S., Path ORAM: An extremely simple oblivious RAM protocol, J. ACM, 2018, vol. 65, no. 4, p. 18. https:\/\/doi.org\/10.1145\/3177872","journal-title":"J. ACM"},{"key":"7803_CR12","first-page":"979","volume":"17","author":"A.S. Konoplev","year":"2014","unstructured":"Konoplev, A.S. and Kali, M.O., Formalization the objectives of grid systems resources protection from unauthorized accessing, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, p. 979.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7803_CR13","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich, O. and Ostrovsky, R., Software protection and simulation on oblivious RAMs, J. ACM, 1996, vol.\u00a043, no. 3, pp. 431\u2013473. https:\/\/doi.org\/10.1145\/233551.233553","journal-title":"J. ACM"},{"key":"7803_CR14","doi-asserted-by":"publisher","unstructured":"Gentry, C., Fully homomorphic encryption using ideal lattices, Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, 2009, New York: Association for Computing Machinery, 2009, pp. 169\u2013178. https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"7803_CR15","doi-asserted-by":"publisher","unstructured":"Paillier, P., Public-key cryptosystems based on composite degree residuosity classes, Advances in Cryptology\u2014EUROCRYPT \u201999, Stern, J., Ed., Lecture Notes in Computer Science, vol. 1592, Berlin: Springer, 1999, pp.\u00a0223\u2013238. https:\/\/doi.org\/10.1007\/3-540-48910-x_16","DOI":"10.1007\/3-540-48910-x_16"},{"key":"7803_CR16","doi-asserted-by":"publisher","unstructured":"Damg\u00e5rd, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., and Smart, N.P., Practical covertly secure MPC for dishonest majority\u2013Or: Breaking the SPDZ limits, Computer Security\u2013ESORICS 2013, Crampton, J., Jajodia, S., and Mayes, K., Eds., Lecture Notes in Computer Science, vol. 8134, Berlin: Springer, 2013, pp. 1\u201318. https:\/\/doi.org\/10.1007\/978-3-642-40203-6_1","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"7803_CR17","doi-asserted-by":"publisher","unstructured":"Gentry, C., Fully homomorphic encryption using ideal lattices, Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), Bethesda, MD, 2009, New York: Association for Computing Machinery, 2009, pp. 169\u2013178. https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"7803_CR18","doi-asserted-by":"publisher","unstructured":"Gupta, K.D., Rahman, M.L., Dasgupta, D., and Poudyal, S., Shamir\u2019s secret sharing for authentication without reconstructing password, 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, 2020, IEEE, 2020, pp. 958\u2013963. https:\/\/doi.org\/10.1109\/CCWC47524.2020.9031270","DOI":"10.1109\/CCWC47524.2020.9031270"},{"key":"7803_CR19","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7803_CR20","doi-asserted-by":"publisher","unstructured":"Deutch, D., Frankenthal, A., Gilad, A., and Moskovitch, Yu., On optimizing the trade-off between privacy and utility in data provenance, Proceedings of the 2021 International Conference on Management of Data, New York: Association for Computing Machinery, 2021, pp. 379\u2013418. https:\/\/doi.org\/10.1145\/3448016.3452835","DOI":"10.1145\/3448016.3452835"},{"key":"7803_CR21","unstructured":"Patra, A., Schneider, Th., Suresh, A., and Yalame, H., ABY2.0: Improved mixed-protocol secure two-party computation (full version), 30th USENIX Security Symposium, USENIX Association, 2021, pp. 2165\u20132182."},{"key":"7803_CR22","doi-asserted-by":"publisher","unstructured":"Bost, R., Popa, R.A., Tu, S., and Goldwasser, Sh., Machine learning classification over encrypted data, Proceedings 2015 Network and Distributed System Security Symposium, Internet Society, 2024. https:\/\/doi.org\/10.14722\/ndss.2015.23241","DOI":"10.14722\/ndss.2015.23241"},{"key":"7803_CR23","doi-asserted-by":"publisher","first-page":"739","DOI":"10.3103\/s0146411616080265","volume":"50","author":"E.B. Aleksandrova","year":"2016","unstructured":"Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739\u2013742. https:\/\/doi.org\/10.3103\/s0146411616080265","journal-title":"Autom. Control Comput. Sci."},{"key":"7803_CR24","doi-asserted-by":"publisher","first-page":"850","DOI":"10.3103\/s014641162008009x","volume":"54","author":"A.G. Busygin","year":"2020","unstructured":"Busygin, A.G. and Konoplev, A.S., Blockchain based system model for assessment of security against threats caused by uneven distribution of computational power, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp.\u00a0850\u2013853. https:\/\/doi.org\/10.3103\/s014641162008009x","journal-title":"Autom. Control Comput. Sci."},{"key":"7803_CR25","doi-asserted-by":"publisher","first-page":"103180","DOI":"10.1016\/j.cose.2023.103180","volume":"129","author":"A. Mu\u00f1oz","year":"2023","unstructured":"Mu\u00f1oz, A., R\u00edos, R., Rom\u00e1n, R., and L\u00f3pez, J., A survey on the (in)security of trusted execution environments, Comput. Secur., 2023, vol. 129, p. 103180. https:\/\/doi.org\/10.1016\/j.cose.2023.103180","journal-title":"Comput. Secur."},{"key":"7803_CR26","doi-asserted-by":"publisher","unstructured":"Feurer, M. and Hutter, F., Hyperparameter optimization, Automated Machine Learning, Hutter, F., Kotthoff, L., and Vanschoren, J., Eds., The Springer Series on Challenges in Machine Learning, Cham: Springer, 2019, pp.\u00a03\u201333. https:\/\/doi.org\/10.1007\/978-3-030-05318-5_1","DOI":"10.1007\/978-3-030-05318-5_1"},{"key":"7803_CR27","unstructured":"Tramer, F. and Boneh, D., Slalom: Fast, verifiable and private execution of neural networks in trusted hardware, Proceedings of the 2019 International Conference on Learning Representations, 2019."},{"key":"7803_CR28","doi-asserted-by":"publisher","unstructured":"Jang, I., Tang, A., Kim, T., Sethumadhavan, S., and Huh, J., Heterogeneous isolated execution for commodity GPUs, Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, Providence, RI, 2019, New York: Association for Computing Machinery, 2019, pp. 455\u2013468. https:\/\/doi.org\/10.1145\/3297858.3304021","DOI":"10.1145\/3297858.3304021"},{"key":"7803_CR29","unstructured":"Russinovich, M., Azure confidential computing with NVIDIA GPUs for trustworthy AI. https:\/\/azure.microsoft.com\/en-us\/blog\/azure-confidential-computing-with-nvidia-gpus-for-trustworthy-ai\/."},{"key":"7803_CR30","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.3103\/S0146411623080035","volume":"57","author":"S.V. Bezzateev","year":"2023","unstructured":"Bezzateev, S.V., Fomicheva, S.G., and Suprun, A.F., Improving the efficiency of multiagent information se-curity systems by post-quantum cryptography methods, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 1005\u20131017. https:\/\/doi.org\/10.3103\/S0146411623080035","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701049.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701049","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701049.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:57Z","timestamp":1773612297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7803"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701049","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"11 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}