{"id":"https://openalex.org/W4406458551","doi":"https://doi.org/10.1109/bigdata62323.2024.10825068","title":"Practical Considerations of Fully Homomorphic Encryption in Privacy-Preserving Machine Learning","display_name":"Practical Considerations of Fully Homomorphic Encryption in Privacy-Preserving Machine Learning","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406458551","doi":"https://doi.org/10.1109/bigdata62323.2024.10825068"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10825068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085923839","display_name":"Dan Lo","orcid":"https://orcid.org/0000-0003-4396-0370"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dan Chia-Tien Lo","raw_affiliation_strings":["Kennesaw State University,Department of Computer Science,Marietta,GA,USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Computer Science,Marietta,GA,USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113542097","display_name":"Yong Shi","orcid":"https://orcid.org/0000-0001-7974-1079"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yong Shi","raw_affiliation_strings":["Kennesaw State University,Department of Computer Science,Marietta,GA,USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Computer Science,Marietta,GA,USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052820694","display_name":"Hossain Shahriar","orcid":"https://orcid.org/0000-0003-1021-7986"},"institutions":[{"id":"https://openalex.org/I83683471","display_name":"University of West Florida","ror":"https://ror.org/002w4zy91","country_code":"US","type":"education","lineage":["https://openalex.org/I83683471"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossain Shahriar","raw_affiliation_strings":["University of West Florida,The Center for Cybersecurity,Pensacola,FL,USA"],"affiliations":[{"raw_affiliation_string":"University of West Florida,The Center for Cybersecurity,Pensacola,FL,USA","institution_ids":["https://openalex.org/I83683471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087218093","display_name":"Bobin Deng","orcid":"https://orcid.org/0000-0001-8361-9025"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bobin Deng","raw_affiliation_strings":["Kennesaw State University,Department of Computer Science,Marietta,GA,USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Computer Science,Marietta,GA,USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100319963","display_name":"Xinyue Zhang","orcid":"https://orcid.org/0000-0002-4833-6481"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xinyue Zhang","raw_affiliation_strings":["Kennesaw State University,Department of Computer Science,Marietta,GA,USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Computer Science,Marietta,GA,USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070695035","display_name":"Meilan Chen","orcid":"https://orcid.org/0000-0002-3449-6775"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mei-Lan Chen","raw_affiliation_strings":["Georgia State University,School of Nursing,Atlanta,GA,USA"],"affiliations":[{"raw_affiliation_string":"Georgia State University,School of Nursing,Atlanta,GA,USA","institution_ids":["https://openalex.org/I181565077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085923839"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70829245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"6330","last_page":"6335"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9321843385696411},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7937054634094238},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5932952165603638},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4782397150993347},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4264720380306244},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3891420364379883}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9321843385696411},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7937054634094238},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5932952165603638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4782397150993347},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4264720380306244},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3891420364379883}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10825068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1695888583","https://openalex.org/W2010126199","https://openalex.org/W2152926062","https://openalex.org/W2219857805","https://openalex.org/W2226167778","https://openalex.org/W2527494673","https://openalex.org/W2724381582","https://openalex.org/W2734611429","https://openalex.org/W2766883899","https://openalex.org/W2768174108","https://openalex.org/W2768962222","https://openalex.org/W2798412895","https://openalex.org/W2895782209","https://openalex.org/W2907177738","https://openalex.org/W2978348882","https://openalex.org/W3010727636","https://openalex.org/W3034966256","https://openalex.org/W3154479105","https://openalex.org/W3156502157","https://openalex.org/W3195598474","https://openalex.org/W3204445038","https://openalex.org/W3210298954","https://openalex.org/W4287237144","https://openalex.org/W4366377472","https://openalex.org/W4383501576","https://openalex.org/W4386736882","https://openalex.org/W4387006290","https://openalex.org/W4387969892","https://openalex.org/W4394896923","https://openalex.org/W4399307766","https://openalex.org/W6793226373"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W2240244939"],"abstract_inverted_index":{"Machine":[0],"learning":[1,39,70],"has":[2,76],"been":[3],"successfully":[4],"applied":[5],"to":[6,118],"big":[7],"data":[8,15,58,99],"analytics":[9],"across":[10],"various":[11],"disciplines.":[12],"However,":[13,80],"as":[14],"is":[16,24,40,84],"collected":[17],"from":[18],"diverse":[19],"sectors,":[20],"much":[21],"of":[22,33,45],"it":[23,110],"private":[25],"and":[26],"confidential.":[27],"At":[28],"the":[29,34,41],"same":[30],"time,":[31],"one":[32],"major":[35],"challenges":[36],"in":[37],"machine":[38,69],"slow":[42],"training":[43,64,95],"speed":[44],"large":[46],"models,":[47],"which":[48],"often":[49],"requires":[50],"high-performance":[51],"servers":[52],"or":[53],"cloud":[54],"services.":[55],"To":[56],"protect":[57],"privacy":[59],"while":[60,106],"still":[61],"allowing":[62],"model":[63],"on":[65,94],"such":[66],"servers,":[67],"privacy-preserving":[68],"using":[71,100],"Fully":[72],"Homomorphic":[73],"Encryption":[74],"(FHE)":[75],"gained":[77],"significant":[78],"attention.":[79],"its":[81],"widespread":[82],"adoption":[83],"hindered":[85],"by":[86],"performance":[87],"degradation.":[88],"This":[89],"paper":[90],"presents":[91],"our":[92],"experiments":[93],"models":[96],"over":[97],"encrypted":[98],"FHE.":[101],"The":[102],"results":[103],"show":[104],"that":[105],"FHE":[107],"ensures":[108],"privacy,":[109],"can":[111],"significantly":[112],"degrade":[113],"performance,":[114],"requiring":[115],"complex":[116],"tuning":[117],"optimize.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
