{"id":"https://openalex.org/W4386066595","doi":"https://doi.org/10.1109/isit54713.2023.10206883","title":"Approximate Private Inference in Quantized Models","display_name":"Approximate Private Inference in Quantized Models","publication_year":2023,"publication_date":"2023-06-25","ids":{"openalex":"https://openalex.org/W4386066595","doi":"https://doi.org/10.1109/isit54713.2023.10206883"},"language":"en","primary_location":{"id":"doi:10.1109/isit54713.2023.10206883","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit54713.2023.10206883","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101201550","display_name":"Zirui Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zirui Deng","raw_affiliation_strings":["Washington University in St. Louis"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis","institution_ids":["https://openalex.org/I204465549"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048888817","display_name":"Netanel Raviv","orcid":"https://orcid.org/0000-0002-1686-1994"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Netanel Raviv","raw_affiliation_strings":["Washington University in St. Louis"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis","institution_ids":["https://openalex.org/I204465549"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101201550"],"corresponding_institution_ids":["https://openalex.org/I204465549"],"apc_list":null,"apc_paid":null,"fwci":0.7064,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76025094,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1597","last_page":"1602"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.7115798592567444},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6786084175109863},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6614012718200684},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5861629247665405},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5804170370101929},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5650346279144287},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5190290212631226},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4928765296936035},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.44371694326400757},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4364369511604309},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2774242162704468},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2587839663028717},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20074614882469177},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1284707486629486}],"concepts":[{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.7115798592567444},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6786084175109863},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6614012718200684},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5861629247665405},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5804170370101929},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5650346279144287},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5190290212631226},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4928765296936035},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.44371694326400757},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4364369511604309},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2774242162704468},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2587839663028717},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20074614882469177},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1284707486629486},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit54713.2023.10206883","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit54713.2023.10206883","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2435473771","https://openalex.org/W2478708596","https://openalex.org/W2701059868","https://openalex.org/W2725001169","https://openalex.org/W2949680615","https://openalex.org/W2962883027","https://openalex.org/W3124017584","https://openalex.org/W3157477139","https://openalex.org/W3217525267","https://openalex.org/W4287123012","https://openalex.org/W4289655165","https://openalex.org/W4295262505","https://openalex.org/W4297952240","https://openalex.org/W4386066595","https://openalex.org/W6693397755","https://openalex.org/W6740103103","https://openalex.org/W6748082217","https://openalex.org/W6796828830","https://openalex.org/W6804198145"],"related_works":["https://openalex.org/W4288019264","https://openalex.org/W4302362156","https://openalex.org/W4315784658","https://openalex.org/W4320024194","https://openalex.org/W4248305038","https://openalex.org/W3138219915","https://openalex.org/W3203403667","https://openalex.org/W3082340300","https://openalex.org/W2776458542","https://openalex.org/W4312206423"],"abstract_inverted_index":{"Private":[0],"inference":[1,65],"refers":[2],"to":[3,25,48,55,130],"a":[4,11,14,70,103,107,169,184],"two-party":[5],"setting":[6],"in":[7,41,58,88],"which":[8,42,73,116],"one":[9,146],"has":[10,19,66],"model":[12,23],"(e.g.,":[13,47],"linear":[15],"classifier),":[16],"the":[17,22,29,33,43,97,100,121,124,128,141,149,163],"other":[18],"data,":[20],"and":[21,78,102,111,123,158,182],"is":[24],"be":[26,131],"applied":[27],"over":[28],"data":[30],"while":[31],"safeguarding":[32],"privacy":[34,98,152,161],"of":[35,99,109,154],"both":[36],"parties.":[37],"In":[38],"particular,":[39],"models":[40],"weights":[44],"are":[45],"quantized":[46,89],"\u00b11)":[49],"gained":[50],"increasing":[51],"attention":[52],"lately,":[53],"due":[54],"their":[56],"benefits":[57],"efficient,":[59],"private,":[60],"or":[61],"robust":[62],"computations.Traditionally,":[63],"private":[64],"been":[67],"studied":[68],"from":[69,75],"cryptographic":[71],"standpoint,":[72],"suffers":[74],"high":[76],"complexity":[77],"degraded":[79],"accuracy.":[80],"More":[81],"recently,":[82],"Raviv":[83,155],"et":[84,156],"al.":[85],"showed":[86],"that":[87,118,138],"models,":[90],"an":[91],"information":[92,150],"theoretic":[93,151],"tradeoff":[94],"exists":[95],"between":[96],"parties,":[101],"scheme":[104,122,170],"based":[105],"on":[106],"combination":[108],"Boolean":[110],"real-valued":[112],"algebra":[113],"was":[114],"presented":[115],"attains":[117],"tradeoff.":[119],"Both":[120],"respective":[125,185],"bound":[126,175,187],"required":[127],"computation":[129],"done":[132],"exactly.In":[133],"this":[134],"work":[135],"we":[136],"show":[137,178],"by":[139],"relaxing":[140],"requirement":[142],"for":[143,171,188],"exact":[144],"computation,":[145,174],"can":[147],"break":[148],"barrier":[153],"al.,":[157],"provide":[159,168],"better":[160],"at":[162],"same":[164],"communication":[165],"costs.":[166],"We":[167],"such":[172],"approximate":[173],"its":[176,179],"error,":[177],"improved":[180],"privacy,":[181],"devise":[183],"lower":[186],"some":[189],"parameter":[190],"regimes.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
