{"id":"https://openalex.org/W7147121593","doi":"https://doi.org/10.1109/cnml68938.2026.11453250","title":"Privacy-preserving Recommendation based on Non-interactive Encrypted CNN","display_name":"Privacy-preserving Recommendation based on Non-interactive Encrypted CNN","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7147121593","doi":"https://doi.org/10.1109/cnml68938.2026.11453250"},"language":null,"primary_location":{"id":"doi:10.1109/cnml68938.2026.11453250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11453250","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103652371","display_name":"Qin Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"education","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qin Yi","raw_affiliation_strings":["Civil Aviation University of China,College of Safety Science and Engineering,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"Civil Aviation University of China,College of Safety Science and Engineering,Tianjin,China","institution_ids":["https://openalex.org/I28813325"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5132645113","display_name":"Ruiqi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"education","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiqi Li","raw_affiliation_strings":["Civil Aviation University of China,College of Safety Science and Engineering,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"Civil Aviation University of China,College of Safety Science and Engineering,Tianjin,China","institution_ids":["https://openalex.org/I28813325"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103652371"],"corresponding_institution_ids":["https://openalex.org/I28813325"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88605005,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"277","last_page":"283"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.4796000123023987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.4796000123023987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.34439998865127563,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.031199999153614044,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7559000253677368},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6647999882698059},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6571000218391418},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.626800000667572},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6223000288009644},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5491999983787537},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5415999889373779},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4629000127315521}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8371000289916992},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7559000253677368},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6647999882698059},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6571000218391418},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.626800000667572},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6223000288009644},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5491999983787537},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5415999889373779},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4629000127315521},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38989999890327454},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C157899210","wikidata":"https://www.wikidata.org/wiki/Q1395022","display_name":"Convolutional code","level":3,"score":0.3359000086784363},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3206999897956848},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3086000084877014},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.30790001153945923},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3028999865055084},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.29010000824928284},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27149999141693115},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.2678999900817871},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2628999948501587},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25110000371932983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnml68938.2026.11453250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnml68938.2026.11453250","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Communication Networks and Machine Learning (CNML)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W913176383","https://openalex.org/W1971991172","https://openalex.org/W1979120705","https://openalex.org/W2031533839","https://openalex.org/W2073304375","https://openalex.org/W2166939545","https://openalex.org/W2167094273","https://openalex.org/W2226167778","https://openalex.org/W2527113903","https://openalex.org/W2549241050","https://openalex.org/W2768174108","https://openalex.org/W2783272285","https://openalex.org/W2942255051","https://openalex.org/W3092115729","https://openalex.org/W3117449869","https://openalex.org/W4319663638"],"related_works":[],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,34,45,76],"problems":[3],"of":[4],"frequent":[5],"interaction":[6],"and":[7,53,60,84,96],"high":[8],"communication":[9,107],"overhead":[10,108],"in":[11],"existing":[12],"privacy-preserving":[13,19],"recommendation":[14,22,115],"schemes,":[15,86],"we":[16],"propose":[17],"a":[18,25],"sequential":[20,62],"embedding":[21],"based":[23],"on":[24],"non-interactive":[26],"encrypted":[27,42],"one-dimension":[28],"convolution":[29],"neural":[30],"network":[31],"by":[32],"using":[33],"Pegasus":[35,77],"homomorphic":[36,47],"ciphertext":[37],"conversion":[38],"framework.":[39],"In":[40],"our":[41,87],"CNN":[43],"scheme,":[44],"proposed":[46],"convolutional":[48],"architecture":[49],"employs":[50],"complementary":[51],"horizontal":[52],"vertical":[54],"kernels":[55],"to":[56,71,110],"capture":[57],"both":[58],"local":[59],"global":[61],"patterns,":[63],"reducing":[64],"computational":[65],"complexity":[66],"from":[67],"O(n<sup":[68],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[69],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>)":[70],"O(n":[72],"+":[73],"d).":[74],"Leveraging":[75],"framework\u2019s":[78],"dynamic":[79],"switching":[80],"capability":[81],"between":[82],"CKKS":[83,95],"FHEW":[85],"solution":[88],"optimally":[89],"handles":[90],"linear":[91],"operations":[92],"through":[93],"SIMD-parallelized":[94],"nonlinear":[97],"computations":[98],"via":[99],"FHEW-LUT":[100],"combinations.":[101],"Experimental":[102],"results":[103],"demonstrate":[104],"substantially":[105],"reduced":[106],"compared":[109],"conventional":[111],"approaches":[112],"without":[113],"compromising":[114],"quality.":[116]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-04-02T00:00:00"}
