{"id":"https://openalex.org/W4414458655","doi":"https://doi.org/10.1109/tdsc.2025.3613745","title":"Privacy-Preserving Automated Deep Learning for Secure Inference Service","display_name":"Privacy-Preserving Automated Deep Learning for Secure Inference Service","publication_year":2025,"publication_date":"2025-09-24","ids":{"openalex":"https://openalex.org/W4414458655","doi":"https://doi.org/10.1109/tdsc.2025.3613745"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3613745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3613745","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102793940","display_name":"Fuyi Wang","orcid":"https://orcid.org/0000-0002-8216-3238"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Fuyi Wang","raw_affiliation_strings":["Enterprise AI and Data Analytics Hub, RMIT University, Waurn Ponds, VIC, Australia","School of Information Technology, Deakin University, Waurn Ponds, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Enterprise AI and Data Analytics Hub, RMIT University, Waurn Ponds, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Waurn Ponds, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101740893","display_name":"Jinsong Ouyang","orcid":"https://orcid.org/0000-0003-4245-170X"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinzhi Ouyang","raw_affiliation_strings":["School of Informatics, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"School of Informatics, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015011245","display_name":"Leo Yu Zhang","orcid":"https://orcid.org/0000-0001-9330-2662"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Leo Yu Zhang","raw_affiliation_strings":["School of Information and Communication Technology, Griffith University, Gold Coast, QLD, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Technology, Griffith University, Gold Coast, QLD, Australia","institution_ids":["https://openalex.org/I11701301"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045991464","display_name":"Lei Pan","orcid":"https://orcid.org/0000-0002-4691-8330"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Pan","raw_affiliation_strings":["School of Information Technology, Deakin University, Waurn Ponds, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Waurn Ponds, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081287468","display_name":"Shengshan Hu","orcid":"https://orcid.org/0000-0003-0042-9045"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengshan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100778754","display_name":"Xiaoning Liu","orcid":"https://orcid.org/0000-0002-9874-8839"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiaoning Liu","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077501988","display_name":"Robin Doss","orcid":"https://orcid.org/0000-0001-6143-6850"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Robin Doss","raw_affiliation_strings":["School of Information Technology, Deakin University, Waurn Ponds, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Waurn Ponds, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102793940"],"corresponding_institution_ids":["https://openalex.org/I149704539","https://openalex.org/I82951845"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13453535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"1081","last_page":"1095"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9315000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9187999963760376,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.7620000243186951},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.6948999762535095},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6428999900817871},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.582099974155426},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5738000273704529},{"id":"https://openalex.org/keywords/softmax-function","display_name":"Softmax function","score":0.5116000175476074},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4625999927520752},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4203999936580658},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4180000126361847}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8689000010490417},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.7620000243186951},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.6948999762535095},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6428999900817871},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.582099974155426},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5738000273704529},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5404000282287598},{"id":"https://openalex.org/C188441871","wikidata":"https://www.wikidata.org/wiki/Q7554146","display_name":"Softmax function","level":3,"score":0.5116000175476074},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4625999927520752},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4203999936580658},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4180000126361847},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4113999903202057},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39629998803138733},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39089998602867126},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3776000142097473},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.34790000319480896},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.3467000126838684},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3325999975204468},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.3228999972343445},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.31929999589920044},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3138999938964844},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.28299999237060547},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26649999618530273},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.25360000133514404},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2508000135421753}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2025.3613745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3613745","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/30381460","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/30381460","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1524288918","https://openalex.org/W2035476608","https://openalex.org/W2106217851","https://openalex.org/W2233233025","https://openalex.org/W2701059868","https://openalex.org/W2955401130","https://openalex.org/W2967733054","https://openalex.org/W3004309651","https://openalex.org/W3016063723","https://openalex.org/W3093021001","https://openalex.org/W3133749795","https://openalex.org/W3141585064","https://openalex.org/W3169910258","https://openalex.org/W3201683074","https://openalex.org/W3201788422","https://openalex.org/W3204984335","https://openalex.org/W4205505117","https://openalex.org/W4206320562","https://openalex.org/W4312392365","https://openalex.org/W4360993799","https://openalex.org/W4385080274","https://openalex.org/W4385992398","https://openalex.org/W4386432218","https://openalex.org/W4386765144"],"related_works":[],"abstract_inverted_index":{"Automated":[0],"deep":[1,11],"learning":[2],"(AutoDL)":[3],"aims":[4],"to":[5,114,160,174,228],"automatically":[6],"discover":[7],"optimal":[8],"architectures":[9,40],"of":[10,75,129,163,180,194],"neural":[12],"networks":[13],"(DNNs)":[14],"for":[15,21,34,143,156],"secure":[16,106,130,165],"inference":[17,215],"without":[18,47],"the":[19,32,49,101,126,168,178,200,208,214],"studies":[20,33,59],"time-consuming":[22],"and":[23,53,69,105,146,184,221],"error-prone":[24],"manual":[25],"design.":[26],"Privacy":[27],"concerns":[28],"have":[29],"increasingly":[30],"motivated":[31],"privacy-preserving":[35,85],"AutoDL":[36,86],"(PrivAutoDL),":[37],"where":[38],"DNN":[39,55,116],"are":[41,109],"searched":[42,209],"directly":[43],"on":[44,100,219,224],"encrypted":[45],"data":[46],"revealing":[48],"client's":[50,120],"confidential":[51],"inputs":[52],"well-trained":[54],"architectures.":[56],"However,":[57],"existing":[58,164],"encounter":[60],"problems":[61],"in":[62,167],"achieving":[63],"a":[64,84,91,161],"balance":[65],"between":[66],"provable":[67],"security":[68,193],"efficiency":[70],"while":[71],"avoiding":[72],"significant":[73],"degradation":[74],"model":[76],"utility.":[77],"To":[78],"tackle":[79],"these":[80],"problems,":[81],"we":[82,124],"design":[83],"scheme,":[87],"named":[88],"2PCAutoDL,":[89],"utilizing":[90],"two-party":[92],"(two":[93],"non-colluding":[94],"cloud":[95],"servers)":[96],"computation":[97,107],"model.":[98,203],"Based":[99],"two-server":[102],"model,":[103],"efficient":[104],"protocols":[108,134],"customized":[110],"layer":[111,113],"by":[112,217,222],"protect":[115],"models":[117,210],"associated":[118],"with":[119],"data.":[121],"In":[122],"particular,":[123],"reduce":[125],"computational":[127],"overhead":[128],"DNN:":[131],"our":[132,171],"optimized":[133],"achieve":[135],"<inline-formula":[136,147],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[137,148],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[138,149],"notation=\"LaTeX\">$1.34\\times":[139],"\\sim":[140,152],"2.05\\times$</tex-math></inline-formula>":[141],"speedup":[142,155],"linear":[144],"layers":[145],"notation=\"LaTeX\">$1.33":[150],"\\times":[151],"45":[153],"\\times$</tex-math></inline-formula>":[154],"non-linear":[157],"layers,":[158],"compared":[159,227],"range":[162],"implementations":[166],"literature.":[169],"Moreover,":[170],"fresh":[172],"alternative":[173],"approximate":[175],"Softmax":[176],"avoids":[177],"drawbacks":[179],"approximating":[181],"exponential":[182],"operation":[183],"yields":[185],"slightly":[186],"higher":[187],"accuracy":[188,216],"under":[189,199],"appropriate":[190],"configurations.":[191],"The":[192],"2PCAutoDL":[195,212],"is":[196],"formally":[197],"analyzed":[198],"semi-honest":[201],"adversary":[202],"Extensive":[204],"experiments":[205],"demonstrate":[206],"that":[207],"from":[211],"improve":[213],"0.6%":[218],"MNIST":[220],"0.5%":[223],"CIFAR-10":[225],"when":[226],"state-of-the-art":[229],"(SOTA)":[230],"PrivAutoDL.":[231]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
