{"id":"https://openalex.org/W3108285671","doi":"https://doi.org/10.1109/tdsc.2020.3040012","title":"Securely and Efficiently Outsourcing Decision Tree Inference","display_name":"Securely and Efficiently Outsourcing Decision Tree Inference","publication_year":2020,"publication_date":"2020-11-25","ids":{"openalex":"https://openalex.org/W3108285671","doi":"https://doi.org/10.1109/tdsc.2020.3040012","mag":"3108285671"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2020.3040012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3040012","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086945099","display_name":"Yifeng Zheng","orcid":"https://orcid.org/0000-0001-7852-6051"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yifeng Zheng","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043471850","display_name":"Huayi Duan","orcid":"https://orcid.org/0000-0002-1162-2337"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Huayi Duan","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390514","display_name":"Cong Wang","orcid":"https://orcid.org/0000-0003-0547-315X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]},{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Cong Wang","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong","City University of Hong Kong Shenzhen Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"City University of Hong Kong Shenzhen Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I168719708","https://openalex.org/I4210105229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080683301","display_name":"Ruochen Wang","orcid":"https://orcid.org/0000-0003-2014-4282"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ruochen Wang","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO, Marsfield, NSW, Australia","Cyber Security Cooperative Research Centre (CRC), Joondalup, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Marsfield, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Cyber Security Cooperative Research Centre (CRC), Joondalup, WA, Australia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086945099"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":2.8808,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.9266049,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"19","issue":"3","first_page":"1841","last_page":"1855"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8542793989181519},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.7452374696731567},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.637962818145752},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.58295738697052},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5396059155464172},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.47019562125205994},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4481102228164673},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.43109577894210815},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4106212556362152},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3923293352127075},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3471226990222931},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33325695991516113},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3041413724422455},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.08969736099243164}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8542793989181519},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.7452374696731567},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.637962818145752},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.58295738697052},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5396059155464172},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.47019562125205994},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4481102228164673},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.43109577894210815},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4106212556362152},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3923293352127075},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3471226990222931},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33325695991516113},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3041413724422455},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.08969736099243164},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2020.3040012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3040012","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4994309936","display_name":null,"funder_award_id":"61572412","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W44936433","https://openalex.org/W1505191356","https://openalex.org/W1520270249","https://openalex.org/W1524288918","https://openalex.org/W1971991172","https://openalex.org/W1982067074","https://openalex.org/W2031738616","https://openalex.org/W2037877289","https://openalex.org/W2053637704","https://openalex.org/W2088492763","https://openalex.org/W2096733369","https://openalex.org/W2152926062","https://openalex.org/W2166939545","https://openalex.org/W2167094273","https://openalex.org/W2337093093","https://openalex.org/W2398092817","https://openalex.org/W2398935881","https://openalex.org/W2410319475","https://openalex.org/W2473418344","https://openalex.org/W2573908344","https://openalex.org/W2580334333","https://openalex.org/W2599930814","https://openalex.org/W2603813905","https://openalex.org/W2701059868","https://openalex.org/W2744061387","https://openalex.org/W2744327779","https://openalex.org/W2754935323","https://openalex.org/W2765200655","https://openalex.org/W2793722525","https://openalex.org/W2803199352","https://openalex.org/W2808472310","https://openalex.org/W2899635708","https://openalex.org/W2907745774","https://openalex.org/W2953030092","https://openalex.org/W2953483183","https://openalex.org/W2963106566","https://openalex.org/W2963540401","https://openalex.org/W2963752132","https://openalex.org/W2964056778","https://openalex.org/W2973629179","https://openalex.org/W2984644945","https://openalex.org/W2990399857","https://openalex.org/W2998768810","https://openalex.org/W3217809002","https://openalex.org/W4297952240","https://openalex.org/W6735438999","https://openalex.org/W6748082217","https://openalex.org/W6776906142"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W2382515644","https://openalex.org/W1930396972","https://openalex.org/W4366990902","https://openalex.org/W4388550696","https://openalex.org/W4321636153","https://openalex.org/W4313289487"],"abstract_inverted_index":{"Outsourcing":[0],"machine":[1],"learning":[2],"inference":[3,30,90,187],"services":[4],"to":[5,18,70,148,162],"the":[6,19,24,62,76,99,121,145,166,171,182],"cloud":[7],"is":[8,129],"getting":[9],"increasingly":[10],"popular.":[11],"However,":[12],"this":[13,34],"also":[14,180],"entails":[15],"privacy":[16,49],"risks":[17],"provider's":[20],"proprietary":[21],"model":[22],"and":[23,41,50,74,89,101,126,155,191],"client's":[25],"sensitive":[26],"data.":[27],"Focusing":[28],"on":[29],"with":[31],"decision":[32,44,86,194],"trees,":[33],"article":[35],"proposes":[36],"a":[37,54,107],"framework":[38],"for":[39,113,144,174,184],"securely":[40],"efficiently":[42],"outsourcing":[43],"tree":[45],"inference.":[46,67],"Targeting":[47],"both":[48],"efficiency,":[51,137],"we":[52,179],"propose":[53],"customized":[55],"protocol":[56,94],"using":[57],"only":[58],"lightweight":[59],"cryptography":[60],"in":[61,78,153,158,165],"online":[63,104],"execution":[64],"of":[65,151,188],"secure":[66,82,105,185],"We":[68],"resort":[69],"additive":[71],"secret":[72],"sharing":[73],"tackle":[75],"problems":[77],"various":[79],"components":[80],"including":[81],"input":[83],"feature":[84],"selection,":[85],"node":[87],"evaluation,":[88],"result":[91],"generation.":[92],"Our":[93],"requires":[95],"no":[96],"interaction":[97,128],"from":[98],"provider":[100],"client":[102,146],"during":[103],"inference,":[106],"distinct":[108],"advantage":[109],"over":[110],"prior":[111,163],"works":[112],"practical":[114,172],"deployment":[115],"as":[116,138,140,160],"they":[117],"all":[118],"operate":[119],"under":[120],"client-provider":[122],"setting":[123],"where":[124],"synchronous":[125],"continuous":[127],"required.":[130],"Performance":[131],"evaluation":[132],"demonstrates":[133],"our":[134],"security":[135],"design's":[136],"well":[139],"substantial":[141],"performance":[142],"benefits":[143],"(up":[147],"four":[149],"orders":[150],"magnitude":[152],"computation":[154],"163":[156],"times":[157],"communication),":[159],"opposed":[161],"art":[164],"non-outsourcing":[167],"setting.":[168],"To":[169],"facilitate":[170],"usage":[173],"meeting":[175],"more":[176],"service":[177],"demands,":[178],"investigate":[181],"extensions":[183],"outsourced":[186],"random":[189],"forests":[190],"categorical":[192],"feature-based":[193],"trees.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
