{"id":"https://openalex.org/W3135930094","doi":"https://doi.org/10.1109/bigdata50022.2020.9378377","title":"Privacy Preserving Proxy for Machine Learning as a Service","display_name":"Privacy Preserving Proxy for Machine Learning as a Service","publication_year":2020,"publication_date":"2020-12-10","ids":{"openalex":"https://openalex.org/W3135930094","doi":"https://doi.org/10.1109/bigdata50022.2020.9378377","mag":"3135930094"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata50022.2020.9378377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9378377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088187789","display_name":"Keshav Kasichainula","orcid":"https://orcid.org/0000-0003-4385-966X"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Keshav Kasichainula","raw_affiliation_strings":["Computer Science Department, University Of Houston, Houston, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University Of Houston, Houston, USA","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069784576","display_name":"Hadi Mansourifar","orcid":"https://orcid.org/0000-0003-2329-0701"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hadi Mansourifar","raw_affiliation_strings":["Computer Science Department, University Of Houston, Houston, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University Of Houston, Houston, USA","institution_ids":["https://openalex.org/I44461941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109410921","display_name":"Weidong Shi","orcid":"https://orcid.org/0000-0002-9005-3071"},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weidong Shi","raw_affiliation_strings":["Computer Science Department, University Of Houston, Houston, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University Of Houston, Houston, USA","institution_ids":["https://openalex.org/I44461941"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088187789"],"corresponding_institution_ids":["https://openalex.org/I44461941"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.58395404,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"24","issue":null,"first_page":"4006","last_page":"4015"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8009680509567261},{"id":"https://openalex.org/keywords/rounding","display_name":"Rounding","score":0.6709766387939453},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6465417146682739},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5643911361694336},{"id":"https://openalex.org/keywords/inefficiency","display_name":"Inefficiency","score":0.5189511775970459},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5116384625434875},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45117348432540894},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30874234437942505},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.16774070262908936}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8009680509567261},{"id":"https://openalex.org/C136625980","wikidata":"https://www.wikidata.org/wiki/Q663208","display_name":"Rounding","level":2,"score":0.6709766387939453},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6465417146682739},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5643911361694336},{"id":"https://openalex.org/C2778869765","wikidata":"https://www.wikidata.org/wiki/Q6028363","display_name":"Inefficiency","level":2,"score":0.5189511775970459},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5116384625434875},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45117348432540894},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30874234437942505},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.16774070262908936},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata50022.2020.9378377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9378377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1473189865","https://openalex.org/W1915485278","https://openalex.org/W1965802774","https://openalex.org/W2032117693","https://openalex.org/W2040228409","https://openalex.org/W2051267297","https://openalex.org/W2070855716","https://openalex.org/W2079397195","https://openalex.org/W2098693229","https://openalex.org/W2104375222","https://openalex.org/W2123859926","https://openalex.org/W2151103935","https://openalex.org/W2154822588","https://openalex.org/W2161969291","https://openalex.org/W2190008860","https://openalex.org/W2294710185","https://openalex.org/W2519091744","https://openalex.org/W2532520288","https://openalex.org/W2535690855","https://openalex.org/W2799803467","https://openalex.org/W2807371563","https://openalex.org/W2884280357","https://openalex.org/W2887995258","https://openalex.org/W2917133166","https://openalex.org/W2949382160","https://openalex.org/W2962760235","https://openalex.org/W2962793481","https://openalex.org/W2963174698","https://openalex.org/W2963465081","https://openalex.org/W2963989815","https://openalex.org/W2964151798","https://openalex.org/W3023856683","https://openalex.org/W3047663549","https://openalex.org/W4232288880","https://openalex.org/W4288567374","https://openalex.org/W4294643831","https://openalex.org/W4297800839","https://openalex.org/W6628547770","https://openalex.org/W6692550842","https://openalex.org/W6745560452","https://openalex.org/W6750799548","https://openalex.org/W6752062975","https://openalex.org/W6753280856","https://openalex.org/W6759531683"],"related_works":["https://openalex.org/W4220780102","https://openalex.org/W2264067234","https://openalex.org/W2410881844","https://openalex.org/W3196334750","https://openalex.org/W1502401885","https://openalex.org/W3124243301","https://openalex.org/W2004257129","https://openalex.org/W2116281088","https://openalex.org/W2357551824","https://openalex.org/W2369084412"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,132],"propose":[4,104],"a":[5,22,80,140],"new":[6],"framework":[7],"called":[8],"Privacy":[9],"Preserving":[10],"Proxy":[11],"(PPP)":[12],"to":[13,24,49,58,69,87,121],"protect":[14,122],"the":[15,29,36,40,50,53,56,59,63,71,74,89,92,123,130,164],"online":[16,41,126],"models.":[17,75,127],"PPP":[18,76,120,131,156],"is":[19],"designed":[20],"like":[21],"gateway":[23],"work":[25],"on":[26],"behalf":[27],"of":[28,39,46,73,83,91,125,147],"users":[30],"when":[31],"requesting":[32],"service,":[33],"potentially":[34,78,158],"masking":[35],"true":[37],"origin":[38],"model":[42],"from":[43],"client.":[44],"Instead":[45],"connecting":[47],"directly":[48],"machine":[51],"learning-as-a-service(MLaaS)":[52],"clients":[54],"submit":[55],"request":[57,64,93],"PPP,":[60],"which":[61,116,143],"evaluates":[62],"and":[65,101,112],"executes":[66],"some":[67],"functions":[68,84],"maximize":[70],"safety":[72],"can":[77,117,144,157],"host":[79],"wide":[81],"range":[82],"or":[85,94],"triggers":[86],"control":[88],"complexity":[90],"provide":[95],"additional":[96],"benefits":[97],"such":[98,160],"as":[99,139,150],"privacy":[100,124],"security.":[102],"We":[103],"two":[105],"different":[106],"methods":[107],"including":[108],"Random":[109],"Model":[110],"Assignment":[111],"Intelligent":[113],"Rounding":[114],"Policy":[115],"function":[118],"inside":[119],"To":[128],"test":[129,133],"TL-GAN":[134],"based":[135],"face":[136],"reconstruction":[137],"attack":[138],"sophisticated":[141],"approach":[142],"reveal":[145],"inefficiency":[146],"rounding":[148],"policy":[149],"countermeasure.":[151],"Our":[152],"experiments":[153],"show":[154],"that,":[155],"nullify":[159],"complicated":[161],"attacks":[162],"in":[163],"future.":[165]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
