{"id":"https://openalex.org/W4309675588","doi":"https://doi.org/10.1109/kse56063.2022.9953624","title":"Experimental Evaluation of Homomorphic Encryption in Cloud and Edge Machine Learning","display_name":"Experimental Evaluation of Homomorphic Encryption in Cloud and Edge Machine Learning","publication_year":2022,"publication_date":"2022-10-19","ids":{"openalex":"https://openalex.org/W4309675588","doi":"https://doi.org/10.1109/kse56063.2022.9953624"},"language":"en","primary_location":{"id":"doi:10.1109/kse56063.2022.9953624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse56063.2022.9953624","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075484437","display_name":"Joe Hrzich","orcid":"https://orcid.org/0009-0009-3292-077X"},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]},{"id":"https://openalex.org/I872945872","display_name":"University of Winnipeg","ror":"https://ror.org/02gdzyx04","country_code":"CA","type":"education","lineage":["https://openalex.org/I872945872"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Joe Hrzich","raw_affiliation_strings":["University of Winnipeg,Manitoba,Canada","University of Winnipeg, Manitoba, Canada"],"affiliations":[{"raw_affiliation_string":"University of Winnipeg,Manitoba,Canada","institution_ids":["https://openalex.org/I46247651","https://openalex.org/I872945872"]},{"raw_affiliation_string":"University of Winnipeg, Manitoba, Canada","institution_ids":["https://openalex.org/I872945872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083367298","display_name":"Gunjan Basra","orcid":null},"institutions":[{"id":"https://openalex.org/I46247651","display_name":"University of Manitoba","ror":"https://ror.org/02gfys938","country_code":"CA","type":"education","lineage":["https://openalex.org/I46247651"]},{"id":"https://openalex.org/I872945872","display_name":"University of Winnipeg","ror":"https://ror.org/02gdzyx04","country_code":"CA","type":"education","lineage":["https://openalex.org/I872945872"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gunjan Basra","raw_affiliation_strings":["University of Winnipeg,Manitoba,Canada","University of Winnipeg, Manitoba, Canada"],"affiliations":[{"raw_affiliation_string":"University of Winnipeg,Manitoba,Canada","institution_ids":["https://openalex.org/I46247651","https://openalex.org/I872945872"]},{"raw_affiliation_string":"University of Winnipeg, Manitoba, Canada","institution_ids":["https://openalex.org/I872945872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055415812","display_name":"Talal Halabi","orcid":"https://orcid.org/0000-0002-1922-5803"},"institutions":[{"id":"https://openalex.org/I43406934","display_name":"Universit\u00e9 Laval","ror":"https://ror.org/04sjchr03","country_code":"CA","type":"education","lineage":["https://openalex.org/I43406934"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Talal Halabi","raw_affiliation_strings":["Laval University,Quebec,Canada","Laval University, Quebec, Canada"],"affiliations":[{"raw_affiliation_string":"Laval University,Quebec,Canada","institution_ids":["https://openalex.org/I43406934"]},{"raw_affiliation_string":"Laval University, Quebec, Canada","institution_ids":["https://openalex.org/I43406934"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075484437"],"corresponding_institution_ids":["https://openalex.org/I46247651","https://openalex.org/I872945872"],"apc_list":null,"apc_paid":null,"fwci":0.5552,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.72800748,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8720172643661499},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8199425935745239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8056749105453491},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.633877158164978},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6147034764289856},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5647109150886536},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5269188284873962},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4763643741607666},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4425845146179199},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.436631441116333},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.43351253867149353},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4273649752140045},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4002254605293274},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30739378929138184},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28772953152656555},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.2788814306259155},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.17939996719360352},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08525019884109497}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8720172643661499},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8199425935745239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8056749105453491},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.633877158164978},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6147034764289856},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5647109150886536},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5269188284873962},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4763643741607666},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4425845146179199},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.436631441116333},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43351253867149353},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4273649752140045},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4002254605293274},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30739378929138184},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28772953152656555},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.2788814306259155},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.17939996719360352},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08525019884109497},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kse56063.2022.9953624","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse56063.2022.9953624","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W133884053","https://openalex.org/W1798609567","https://openalex.org/W1964940342","https://openalex.org/W2031533839","https://openalex.org/W2031738616","https://openalex.org/W2077905990","https://openalex.org/W2085988980","https://openalex.org/W2101234009","https://openalex.org/W2132172731","https://openalex.org/W2291684754","https://openalex.org/W2294710185","https://openalex.org/W2320902025","https://openalex.org/W2551975923","https://openalex.org/W2768174108","https://openalex.org/W2769432718","https://openalex.org/W2770885069","https://openalex.org/W2786070938","https://openalex.org/W2787501553","https://openalex.org/W2792220701","https://openalex.org/W2944320359","https://openalex.org/W2981716510","https://openalex.org/W2992317283","https://openalex.org/W3014830762","https://openalex.org/W3048592926","https://openalex.org/W3109694481","https://openalex.org/W3120740533","https://openalex.org/W3129176636","https://openalex.org/W3161789284","https://openalex.org/W3173128495","https://openalex.org/W4205748779","https://openalex.org/W4206573848","https://openalex.org/W4214619252","https://openalex.org/W4220751475","https://openalex.org/W4225014259","https://openalex.org/W4229021746","https://openalex.org/W4283464586","https://openalex.org/W4285196740","https://openalex.org/W4286683545","https://openalex.org/W4287237144","https://openalex.org/W4287552625","https://openalex.org/W6675354045","https://openalex.org/W6781967559","https://openalex.org/W6787525762","https://openalex.org/W6793226373","https://openalex.org/W6806501298"],"related_works":["https://openalex.org/W3028898974","https://openalex.org/W2384844478","https://openalex.org/W1755636270","https://openalex.org/W3192883662","https://openalex.org/W4386907889","https://openalex.org/W2912162584","https://openalex.org/W4388894064","https://openalex.org/W3006524118","https://openalex.org/W3003184762","https://openalex.org/W2886853612"],"abstract_inverted_index":{"Machine":[0],"Learning":[1],"(ML)-based":[2],"intelligent":[3],"services":[4],"are":[5],"gradually":[6],"becoming":[7],"the":[8,44,52,152,158],"leading":[9],"service":[10],"design":[11],"and":[12,20,38,65,77,104,123,136,163,180],"delivery":[13],"model":[14,105],"in":[15,151,194],"edge":[16,93],"computing,":[17],"where":[18],"user":[19],"device":[21],"data":[22,56,63,76,135],"is":[23,172],"outsourced":[24],"to":[25,97],"take":[26],"part":[27],"of":[28,54,82,113,116,154,168],"large-scale":[29],"BigData":[30],"analytics.":[31],"This":[32,107,188],"paradigm":[33],"however":[34],"entails":[35],"challenging":[36],"security":[37,64],"privacy":[39,156],"concerns,":[40],"which":[41,131,196],"require":[42],"rethinking":[43],"fundamental":[45],"concepts":[46],"behind":[47],"performing":[48],"ML.":[49],"For":[50],"instance,":[51],"encryption":[53,70,118,126],"sensitive":[55],"provides":[57],"a":[58,80],"straightforward":[59],"solution":[60],"that":[61],"ensures":[62],"privacy.":[66],"In":[67],"particular,":[68],"Homomorphic":[69,117,125],"allows":[71],"arbitrary":[72],"computation":[73,181],"on":[74,101,133,141],"encrypted":[75,134,142,186,202],"has":[78,87],"gained":[79],"lot":[81],"attention":[83],"recently.":[84],"However,":[85],"it":[86],"not":[88],"been":[89],"fully":[90],"adopted":[91],"by":[92],"computing-based":[94],"ML":[95,129,155,170,197],"due":[96],"its":[98],"potential":[99,149],"impact":[100],"classification":[102,138],"accuracy":[103,179],"performance.":[106],"paper":[108],"conducts":[109],"an":[110],"experimental":[111],"evaluation":[112,189],"different":[114,175],"types":[115],"techniques,":[119],"namely,":[120],"Partial,":[121],"Somewhat,":[122],"Fully":[124],"over":[127,201],"several":[128],"models,":[130],"train":[132],"produce":[137],"predictions":[139],"based":[140],"input":[143],"data.":[144,203],"The":[145,166],"results":[146],"demonstrate":[147],"two":[148],"directions":[150],"context":[153],"at":[157],"network":[159],"edge:":[160],"privacy-preserving":[161,164],"training":[162],"classification.":[165],"performance":[167],"encryption-driven":[169],"models":[171,198],"compared":[173],"using":[174],"metrics":[176],"such":[177],"as":[178],"time":[182],"for":[183],"plaintext":[184],"vs.":[185],"text.":[187],"will":[190],"guide":[191],"future":[192],"research":[193],"investigating":[195],"perform":[199],"better":[200]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
