{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:07:23Z","timestamp":1763345243642,"version":"3.45.0"},"reference-count":105,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064346","type":"journal-article","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T11:14:57Z","timestamp":1753269297000},"page":"89-119","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Homomorphic Encryption for Machine Learning Applications with CKKS Algorithms: A Survey of Developments and Applications"],"prefix":"10.32604","volume":"85","author":[{"given":"Lingling","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiasen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yunxuan","family":"Su","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Wenhao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Dianhua","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yunfei","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the 2014 New Security Paradigms Workshop","first-page":"105","article-title":"Data is the new currency","author":"Gates","year":"2014"},{"key":"ref2","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref3","unstructured":"Kang M, Ting FF, Phan RCW, Ge Z, Ting C. A multi-modal feature distillation with CNN-transformer network for brain tumor segmentation with incomplete modalities. arXiv:2404.14019. 2024. doi:10.48550\/arXiv.2404.14019."},{"key":"ref4","first-page":"1","article-title":"The federation strikes back: a survey of federated learning privacy attacks, defenses, applications, and policy landscape","volume":"57","author":"Zhao","year":"2025","journal-title":"ACM Comput Surv"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3712000","article-title":"Recent advances of differential privacy in centralized deep learning: a systematic survey","volume":"57","author":"Demelius","year":"2025","journal-title":"ACM Comput Surv"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"121071","DOI":"10.1016\/j.eswa.2023.121071","article-title":"No more privacy Concern: a privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user\u2019s private and sensitive data","volume":"234","author":"Sathish Kumar","year":"2023","journal-title":"Expert Syst Appl"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1504\/IJSNET.2022.125113","article-title":"Privacy preservation and security challenges: a new frontier multimodal machine learning research","volume":"39","author":"Kumar","year":"2022","journal-title":"Int J Sens Netw"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"Jaydip S. Data Privacy-Techniques, Applications, and Standards. IntechOpen; 2025 Jan. doi:10.5772\/intechopen.1003421.","DOI":"10.5772\/intechopen.1003421"},{"key":"ref9","first-page":"88","article-title":"Artificial iintelligence facial recognition surveillance and the breach of privacy rights: the \u2018Clearview AI\u2019 and \u2018Rite Aid\u2019 case studies","volume":"11","author":"Nwafor","year":"2023","journal-title":"S Afr N Intellect Prop Law J"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"167425","DOI":"10.1109\/ACCESS.2020.3023084","article-title":"Privacy-preserving deep learning on machine learning as a service\u2014a comprehensive survey","volume":"8","author":"Tanuwidjaja","year":"2020","journal-title":"IEEE Access"},{"key":"ref11","series-title":"Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice","first-page":"3","article-title":"Engineering privacy-preserving machine learning protocols","author":"Schneider","year":"2020"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1038\/s42256-021-00337-8","article-title":"End-to-end privacy preserving deep learning on multi-institutional medical imaging","volume":"3","author":"Kaissis","year":"2021","journal-title":"Nat Mach Intell"},{"key":"ref13","unstructured":"Jeon Y, Erez M, Orshansky M. Artemis: he-aware training for efficient privacy-preserving machine learning. arXiv:2310.01664. 2023. doi:10.48550\/arXiv.2310.01664."},{"key":"ref14","series-title":"International Conference on Machine Learning","first-page":"7102","article-title":"Hemet: a homomorphic-encryption-friendly privacy-preserving mobile neural network architecture","author":"Lou","year":"2021"},{"key":"ref15","series-title":"Privacy-Preserving Machine Learning (PPML-PriML 2020) NeurIPS 2020 Workshop","article-title":"New challenges for fully homomorphic encryption","author":"Chillotti","year":"2020"},{"key":"ref16","series-title":"Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security","first-page":"3","article-title":"Formidable challenges in hardware implementations of fully homomorphic encryption functions for applications in machine learning","author":"Ko\u00e7","year":"2020"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"30039","DOI":"10.1109\/ACCESS.2022.3159694","article-title":"Privacy-preserving machine learning with fully homomorphic encryption for deep neural network","volume":"10","author":"Lee","year":"2022","journal-title":"IEEE Access"},{"key":"ref18","series-title":"Annual IEEE\/ACM International Symposium on Microarchitecture","article-title":"Fully homomorphic encryption for computer architects: a fundamental characterization study","author":"Pal","year":"2023"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"6117","DOI":"10.3390\/app13106117","article-title":"Secure convolution neural network inference based on homomorphic encryption","volume":"13","author":"Song","year":"2023","journal-title":"Appl Sci"},{"key":"ref20","series-title":"2023 International Conference on Electronics, Information, and Communication (ICEIC); 2023 Feb 5\u20138","first-page":"1","article-title":"Privacy-preserving federated learning in healthcare","author":"Moon","year":"2023"},{"key":"ref21","first-page":"427","article-title":"A compact attribute-based encryption scheme supporting computing outsourcing in fog computing","volume":"44","author":"Wang","year":"2022","journal-title":"Comput Eng Sci"},{"key":"ref22","series-title":"2015 IEEE 8th International Conference on Cloud Computing; 2015 Jun 27\u2013Jul 2","first-page":"860","article-title":"SLO-aware deployment of web applications requiring strong consistency using multiple clouds","author":"Qu","year":"2015"},{"key":"ref23","series-title":"Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security; 2017 Dec 3\u20137","first-page":"409","article-title":"Homomorphic encryption for arithmetic of approximate numbers","author":"Cheon","year":"2017"},{"key":"ref24","series-title":"32nd USENIX Security Symposium (USENIX Security 23)","first-page":"4697","article-title":"ELASM: error-latency-aware scale management for fully homomorphic encryption","author":"Lee","year":"2023"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3214303","article-title":"A survey on homomorphic encryption schemes","volume":"51","author":"Acar","year":"2019","journal-title":"ACM Comput Surv"},{"key":"ref26","first-page":"357","article-title":"A lightweight fully homomorphic encryption scheme for cloud security","volume":"13","author":"Biksham","year":"2020","journal-title":"Int J Inf Comput Secur"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"601","DOI":"10.14778\/3574245.3574248","article-title":"Heda: multi-attribute unbounded aggregation over homomorphically encrypted database","volume":"16","author":"Ren","year":"2022","journal-title":"Proc VLDB Endow"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun ACM"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"Elgamal","year":"1985","journal-title":"IEEE Trans Inf Theory"},{"journal-title":"Verifiable secret-ballot elections","year":"1987","author":"Benaloh","key":"ref30"},{"key":"ref31","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","author":"Paillier","year":"1999"},{"key":"ref32","first-page":"24","article-title":"Advances in Cryptology-EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2010 May 30\u2013Jun 3","author":"van Dijk","journal-title":"Fully homomorphic encryption over the integers"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","author":"Brakerski","year":"2012","journal-title":"Advances in cryptology\u2013CRYPTO 2012"},{"key":"ref34","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref35","series-title":"Proceedings of the 3rd Innovations in Theoretical Computer Science Conference","first-page":"309","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","author":"Brakerski","year":"2012"},{"key":"ref36","series-title":"Advances in Cryptology\u2013EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2018 Apr 29\u2013May 3","first-page":"360","article-title":"Bootstrapping for approximate homomorphic encryption","author":"Cheon"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","article-title":"TFHE: fast fully homomorphic encryption over the torus","volume":"33","author":"Chillotti","year":"2020","journal-title":"J Cryptol"},{"key":"ref38","first-page":"618","author":"Lee","year":"2012","journal-title":"Advances in cryptology\u2013EUROCRYPT 2021"},{"key":"ref39","first-page":"188","author":"Bonte","year":"2022","journal-title":"FINAL: faster FHE instantiated with NTRU and LWE"},{"key":"ref40","series-title":"Proceedings of the 50th Annual International Symposium on Computer Architecture","first-page":"1","article-title":"SHARP: a short-word hierarchical accelerator for robust and practical fully homomorphic encryption","author":"Kim","year":"2023"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"103775","DOI":"10.1016\/j.csi.2023.103775","article-title":"Faster matrix approximate homomorphic encryption","volume":"87","author":"Hu","year":"2024","journal-title":"Comput Stand Interfaces"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"6160","DOI":"10.1109\/ACCESS.2024.3351738","article-title":"Overflow-detectable floating-point fully homomorphic encryption","volume":"12","author":"Lee","year":"2024","journal-title":"IEEE Access"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1007\/s10623-024-01555-y","article-title":"Somewhat homomorphic encryption based on random codes","volume":"93","author":"Aguilar-Melchor","year":"2025","journal-title":"Des Codes Cryptogr"},{"key":"ref44","first-page":"26","article-title":"Survey of various homomorphic encryption algorithms and schemes","volume":"91","author":"Parmar","year":"2014","journal-title":"Int J Comput Appl"},{"article-title":"Evaluating 2-dnf formulas on ciphertexts","series-title":"Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005; 2005 Feb 10\u201312","author":"Boneh","key":"ref45"},{"journal-title":"Digitalized signatures and public key functions as intractable as factorization, 1979","year":"2023","author":"Rabin","key":"ref46"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1007\/978-3-030-78372-3_18","author":"Chen","year":"2021","journal-title":"Applied cryptography and network security"},{"key":"ref48","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"94","article-title":"Bootstrapping bits with CKKS","author":"Bae","year":"2024"},{"key":"ref49","first-page":"3094","article-title":"A universal approximation theorem of deep neural networks for expressing probability distributions","volume":"33","author":"Lu","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"567356","DOI":"10.3389\/frai.2020.567356","article-title":"Algorithmic probability-guided machine learning on non-differentiable spaces","volume":"3","author":"Hern\u00e1ndez-Orozco","year":"2020","journal-title":"Front Artif Intell"},{"key":"ref51","first-page":"548","author":"von Rueden","year":"2020","journal-title":"Advances in intelligent data analysis XVIII"},{"journal-title":"Machine learning: a probabilistic perspective","year":"2012","author":"Murphy","key":"ref52"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10586-017-0849-9","article-title":"Privacy-preserving outsourced classification in cloud computing","volume":"21","author":"Li","year":"2018","journal-title":"Clust Comput"},{"key":"ref54","series-title":"27th USENIX Security Symposium (USENIX Security 18)","first-page":"1651","article-title":"GAZELLE: a low latency framework for secure neural network inference","author":"Juvekar","year":"2018"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"106924","DOI":"10.1016\/j.compeleceng.2020.106924","article-title":"Secure and verifiable iris authentication system using fully homomorphic encryption","volume":"89","author":"Morampudi","year":"2021","journal-title":"Comput Electr Eng"},{"key":"ref56","series-title":"2019 IEEE International Conference on Image Processing (ICIP); 2019 Sep 22\u201325","first-page":"674","article-title":"Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain","author":"Sirichotedumrong","year":"2019"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.procs.2022.04.044","article-title":"Implementing linear regression with homomorphic encryption","volume":"202","author":"Chen","year":"2022","journal-title":"Procedia Comput Sci"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"8759922","DOI":"10.1155\/2021\/8759922","article-title":"Secure KNN classification scheme based on homomorphic encryption for cyberspace","volume":"2021","author":"Liu","year":"2021","journal-title":"Secur Commun Netw"},{"key":"ref59","series-title":"International Conference on Mobile, Secure, and Programmable Networking","first-page":"139","article-title":"Privacy-preserving tree-based inference with TFHE","author":"Frery","year":"2023"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"100469","DOI":"10.1016\/j.smhl.2024.100469","article-title":"ReActHE: a homomorphic encryption friendly deep neural network for privacy-preserving biomedical prediction","volume":"32","author":"Song","year":"2024","journal-title":"Smart Health"},{"key":"ref61","first-page":"784","article-title":"Privacy-preserving gradient boosting decision trees","volume":"34","author":"Li","year":"2020","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref62","article-title":"Optimized privacy-preserving clustering with fully homomorphic encryption","author":"Yang","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"ref63","article-title":"Fast, lagre scale dimensionality reduction schemes based on CKKS","author":"Yuan","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","article-title":"Nearest neighbor pattern classification","volume":"13","author":"Cover","year":"1967","journal-title":"IEEE Trans Inf Theory"},{"key":"ref65","series-title":"Advanced Data Mining and Applications: 10th International Conference, ADMA 2014; 2014 Dec 19\u201321","first-page":"499","article-title":"KNN algorithm with data-driven k value","author":"Cheng","year":"2014"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/TKDE.2010.99","article-title":"Missing value estimation for mixed-attribute data sets","volume":"23","author":"Zhu","year":"2010","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"106933","DOI":"10.1016\/j.knosys.2021.106933","article-title":"Ensemble of ML-KNN for classification algorithm recommendation","volume":"221","author":"Zhu","year":"2021","journal-title":"Knowl Based Syst"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10115-020-01518-4","article-title":"BestNeighbor: efficient evaluation of kNN queries on large time series databases","volume":"63","author":"Levchenko","year":"2021","journal-title":"Knowl Inf Syst"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1109\/TCC.2017.2769645","article-title":"Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data","volume":"8","author":"Li","year":"2017","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref70","series-title":"Proceedings of the 27th International Conference on Systems Engineering, ICSEng 2020","first-page":"455","article-title":"A KNN approach for blockchain based electronic health record analysis","author":"Parvin","year":"2021"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"1831","DOI":"10.1109\/TDSC.2023.3291715","article-title":"PHRkNN: efficient and privacy-preserving reverse kNN query over high-dimensional data in cloud","volume":"21","author":"Zheng","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"8","DOI":"10.3390\/cryptography8010008","article-title":"FPGA-based acceleration of K-nearest neighbor algorithm on fully homomorphic encrypted data","volume":"8","author":"Behera","year":"2024","journal-title":"Cryptography"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"103901","DOI":"10.1016\/j.csi.2024.103901","article-title":"Encrypted data inner product KNN secure query based on BALL-PB tree","volume":"92","author":"Liu","year":"2025","journal-title":"Comput Stand Interfaces"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"10945","DOI":"10.1109\/JIOT.2020.2992349","article-title":"Secure and efficient kNN classification for industrial Internet of Things","volume":"7","author":"Yang","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref75","series-title":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP); 2024 Oct 17\u201319","first-page":"1","article-title":"Random knn evaluation using multi-key homomorphic encryption","author":"Petrean","year":"2024"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/978-3-031-13945-1_11","author":"Ameur","year":"2022","journal-title":"Privacy in statistical databases"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.32604\/iasc.2023.034123","article-title":"Outsourced privacy-preserving kNN classifier model based on multi-key homomorphic encryption","volume":"37","author":"Wang","year":"2023","journal-title":"Intell Autom Soft Comput"},{"key":"ref78","first-page":"79","author":"Liu","year":"2020","journal-title":"Algorithms for data and computation privacy"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TGCN.2019.2960767","article-title":"Energy-optimal dynamic computation offloading for industrial IoT in fog computing","volume":"4","author":"Chen","year":"2020","journal-title":"IEEE Trans Green Commun Netw"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3460352","article-title":"SLO-aware inference scheduler for heterogeneous processors in edge platforms","volume":"18","author":"Seo","year":"2021","journal-title":"ACM Trans Archit Code Optim"},{"key":"ref81","series-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","first-page":"486","article-title":"Secure two-party k-means clustering","author":"Bunn","year":"2007"},{"key":"ref82","series-title":"Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security","first-page":"123","article-title":"Privacy of outsourced k-means clustering","author":"Liu","year":"2014"},{"key":"ref83","series-title":"International Conference on Selected Areas in Cryptography","first-page":"453","article-title":"Unsupervised machine learning on encrypted data","author":"J\u00e4schke","year":"2018"},{"key":"ref84","first-page":"1","article-title":"Privacy protection scheme of DBSCAN clustering based on homomorphic encryption","volume":"42","author":"Jia","year":"2021","journal-title":"J Commun"},{"key":"ref85","first-page":"771","article-title":"A privacy-preserving k-means clustering algorithm for data privacy in multi-chain blockchain","volume":"55","author":"Zuo","year":"2022","journal-title":"Communicat Technol"},{"key":"ref86","first-page":"52","author":"Tu","year":"2022","journal-title":"Advances in internet, data & web technologies"},{"key":"ref87","first-page":"2348","article-title":"Privacy-preserving and outsourced multi-party K-means clustering based on multi-key fully homomorphic encryption","volume":"20","author":"Zhang","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1007\/s10207-023-00708-9","article-title":"Fast but approximate homomorphic k-means based on masking technique","volume":"22","author":"Rovida","year":"2023","journal-title":"Int J Inf Secur"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"120687","DOI":"10.1016\/j.ins.2024.120687","article-title":"Efficient privacy-preserving outsourced k-means clustering on distributed data","volume":"674","author":"Qiu","year":"2024","journal-title":"Inf Sci"},{"key":"ref90","series-title":"ICC, 2024-IEEE International Conference on Communications; 2024 Jun 9\u201313","first-page":"2694","article-title":"Fully privacy-preserving and efficient clustering scheme based on fully homomorphic encryption","author":"Zhang","year":"2024"},{"key":"ref91","series-title":"2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE); 2019 Jul 24\u201325","first-page":"1","article-title":"Transfer learning of a neural network using deep learning to perform face recognition","author":"Khan","year":"2019"},{"key":"ref92","series-title":"Applied Cryptography and Network Security Workshops: ACNS, 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT and SiMLA; 2020 Oct 19\u201322","first-page":"295","article-title":"Computing neural networks with homomorphic encryption and verifiable computing","author":"Madi","year":"2020"},{"key":"ref93","series-title":"Proceedings of the Seventh IEEE International Conference on Computer Vision; 1999 Sep 20\u201327","first-page":"1150","article-title":"Object recognition from local scale-invariant features","author":"Lowe","year":"1999"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"16532","DOI":"10.1109\/ACCESS.2017.2737544","article-title":"A secure face-verification scheme based on homomorphic encryption and deep neural networks","volume":"5","author":"Ma","year":"2017","journal-title":"IEEE Access"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.ins.2020.05.093","article-title":"Privacy-preserving krawtchouk moment feature extraction over encrypted image data","volume":"536","author":"Yang","year":"2020","journal-title":"Inf Sci"},{"key":"ref96","first-page":"102810","article-title":"Secure facial recognition in the encrypted domain using a local ternary pattern approach","volume":"59","author":"Khan","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"3737","DOI":"10.1007\/s11277-021-09311-4","article-title":"Design on face recognition system with privacy preservation based on homomorphic encryption","volume":"123","author":"Yang","year":"2022","journal-title":"Wirel Pers Commun"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"718","DOI":"10.3390\/app14020718","article-title":"Preliminary experiments of a real-world authentication mechanism based on facial recognition and fully homomorphic encryption","volume":"14","author":"Crihan","year":"2024","journal-title":"Appl Sci"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"10859","DOI":"10.1007\/s10586-024-04515-2","article-title":"Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system","volume":"27","author":"Ahmad Jalali","year":"2024","journal-title":"Clust Comput"},{"key":"ref100","unstructured":"Serengil S, Ozpinar A. Cipherface: a fully homomorphic encryption-driven framework for secure cloud-based facial recognition. arXiv:2502.18514. 2025. doi:10.48550\/arXiv.2502.18514."},{"key":"ref101","doi-asserted-by":"crossref","first-page":"e0314656","DOI":"10.1371\/journal.pone.0314656","article-title":"Privacy-preserving method for face recognition based on homomorphic encryption","volume":"20","author":"Song","year":"2025","journal-title":"PLoS One"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"e13645","DOI":"10.1111\/exsy.13645","article-title":"Privacy preserving security using multi-key homomorphic encryption for face recognition","volume":"42","author":"Wang","year":"2025","journal-title":"Expert Syst"},{"key":"ref103","series-title":"2018 International Conference on Virtual Reality and Visualization (ICVRV); 2018 Oct 22\u201324","first-page":"53","article-title":"A secure and efficient face-recognition scheme based on deep neural network and homomorphic encryption","author":"Li","year":"2018"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/978-981-99-9788-6_4","author":"Wang","year":"2024","journal-title":"Artificial intelligence security and privacy"},{"key":"ref105","first-page":"103","article-title":"A secure face recognition scheme based on ckks homomorphic encryption and neural network","volume":"49","author":"Su","year":"2023","journal-title":"J Lanzhou Univ Technol"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_64346\/TSP_CMC_64346.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:03:08Z","timestamp":1763344988000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":105,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064346","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}