{"id":"https://openalex.org/W4361805434","doi":"https://doi.org/10.1109/tifs.2023.3262932","title":"pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing","display_name":"pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4361805434","doi":"https://doi.org/10.1109/tifs.2023.3262932"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3262932","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3262932","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025556550","display_name":"Jiasi Weng","orcid":"https://orcid.org/0000-0002-5876-7875"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiasi Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","Pazhou Lab, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-5876-7875","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Pazhou Lab, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China","Pazhou Lab, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4067-8230","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Pazhou Lab, Guangzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008349813","display_name":"Gui Hong Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gui Tang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China","Pazhou Lab, Guangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Pazhou Lab, Guangzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025910280","display_name":"Anjia Yang","orcid":"https://orcid.org/0000-0002-7958-6571"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anjia Yang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","Pazhou Lab, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7958-6571","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Pazhou Lab, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100351377","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-0874-5010"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China","Pazhou Lab, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-0874-5010","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Pazhou Lab, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000372510","display_name":"Jia-Nan Liu","orcid":"https://orcid.org/0000-0003-3140-2320"},"institutions":[{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia-Nan Liu","raw_affiliation_strings":["Pazhou Laboratory, Guangzhou, China","Pazhou Lab, China","Guangzhou Fongwell Data Limited Company, Guangzhou, China","School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China"],"raw_orcid":"https://orcid.org/0000-0003-3140-2320","affiliations":[{"raw_affiliation_string":"Pazhou Laboratory, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"Pazhou Lab, China","institution_ids":[]},{"raw_affiliation_string":"Guangzhou Fongwell Data Limited Company, Guangzhou, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","institution_ids":["https://openalex.org/I2799850029"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5025556550"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":7.3276,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.97812585,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"2218","last_page":"2233"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8126333951950073},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6074578166007996},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5947174429893494},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5754566192626953},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5481864809989929},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.47950321435928345},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46858805418014526},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4594185948371887},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42860355973243713},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3126046061515808},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2970244884490967},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24126112461090088}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8126333951950073},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6074578166007996},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5947174429893494},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5754566192626953},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5481864809989929},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.47950321435928345},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46858805418014526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4594185948371887},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42860355973243713},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3126046061515808},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2970244884490967},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24126112461090088},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3262932","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3262932","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4000000059604645}],"awards":[{"id":"https://openalex.org/G1378608539","display_name":null,"funder_award_id":"62032025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G200321169","display_name":null,"funder_award_id":"2021ZD0112802","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4360914524","display_name":null,"funder_award_id":"62102166","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G486975143","display_name":null,"funder_award_id":"2020YFB1005600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4940029293","display_name":null,"funder_award_id":"62072215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6220089879","display_name":null,"funder_award_id":"61825203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7979370059","display_name":null,"funder_award_id":"62102165","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W2071520502","https://openalex.org/W2147800946","https://openalex.org/W2326245332","https://openalex.org/W2405356014","https://openalex.org/W2435473771","https://openalex.org/W2496543269","https://openalex.org/W2701059868","https://openalex.org/W2768347741","https://openalex.org/W2774423163","https://openalex.org/W2781091734","https://openalex.org/W2791459719","https://openalex.org/W2804337238","https://openalex.org/W2811014381","https://openalex.org/W2882986534","https://openalex.org/W2886845474","https://openalex.org/W2940691483","https://openalex.org/W2948833786","https://openalex.org/W2951188427","https://openalex.org/W2963208512","https://openalex.org/W2963540401","https://openalex.org/W2964279767","https://openalex.org/W2989230924","https://openalex.org/W2989885118","https://openalex.org/W3003532255","https://openalex.org/W3016063723","https://openalex.org/W3023051856","https://openalex.org/W3028867652","https://openalex.org/W3031226896","https://openalex.org/W3033311948","https://openalex.org/W3096076085","https://openalex.org/W3096609273","https://openalex.org/W3097272009","https://openalex.org/W3111925745","https://openalex.org/W3135955057","https://openalex.org/W3157453869","https://openalex.org/W3161274233","https://openalex.org/W3164110928","https://openalex.org/W3194922745","https://openalex.org/W3202343456","https://openalex.org/W3213013974","https://openalex.org/W3214716770","https://openalex.org/W4324007070","https://openalex.org/W6638673520","https://openalex.org/W6740443968","https://openalex.org/W6746138031","https://openalex.org/W6746897123","https://openalex.org/W6748082217","https://openalex.org/W6753937820","https://openalex.org/W6757555829","https://openalex.org/W6762672335","https://openalex.org/W6783181973","https://openalex.org/W6798046383"],"related_works":["https://openalex.org/W2977925515","https://openalex.org/W3214376140","https://openalex.org/W2232878900","https://openalex.org/W4295127475","https://openalex.org/W4283032222","https://openalex.org/W3087706222","https://openalex.org/W2952720749","https://openalex.org/W1676299812","https://openalex.org/W1802540854","https://openalex.org/W1586131529"],"abstract_inverted_index":{"We":[0,87,181],"propose":[1],"a":[2,15,26,33,92,96,106,126,184,210,221,296],"new":[3,185],"approach":[4,20],"for":[5,136,166,199,287],"privacy-preserving":[6],"and":[7,54,61,79,105,128,207,240,281],"verifiable":[8],"convolutional":[9],"neural":[10],"network":[11],"(CNN)":[12],"testing":[13,151],"in":[14,209,278,284],"distrustful":[16],"multi-stakeholder":[17],"environment.":[18],"The":[19],"is":[21,152,304],"aimed":[22],"to":[23,110,132,220],"enable":[24],"that":[25,242,262],"CNN":[27,40,71,93,142,150,223],"model":[28,53,94,103,224],"<italic":[29,34,46,193,231],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[30,35,47,194,232],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">developer</i>":[31],"convinces":[32],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">user</i>":[36],"of":[37,84,140,147,245,252,299,301],"the":[38,59,70,102,115,120,133,141,145,148,172,175,243,246,250,253,271,292],"truthful":[39],"performance":[41,176],"over":[42,119],"non-public":[43],"data":[44,55,123,229],"from":[45],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">multiple":[48],"testers</i>":[49],",":[50],"while":[51],"respecting":[52],"privacy.":[56],"To":[57],"balance":[58],"security":[60],"efficiency":[62],"issues,":[63],"we":[64,214],"appropriately":[65],"integrate":[66],"three":[67],"tools":[68],"with":[69,89,159,192,218],"testing,":[72],"including":[73],"collaborative":[74],"inference,":[75],"homomorphic":[76],"encryption":[77],"(HE)":[78],"zero-knowledge":[80],"succinct":[81],"non-interactive":[82],"argument":[83],"knowledge":[85],"(zk-SNARK).":[86],"start":[88],"strategically":[90],"partitioning":[91],"into":[95,237],"private":[97,116],"part":[98,108,117,135],"kept":[99],"locally":[100],"by":[101,125,154],"developer,":[104],"public":[107,134],"outsourced":[109],"an":[111,160],"outside":[112],"server.":[113],"Then,":[114],"runs":[118],"HE-protected":[121],"test":[122,228],"sent":[124],"tester,":[127],"transmits":[129],"its":[130],"outputs":[131],"accomplishing":[137],"subsequent":[138],"computations":[139],"testing.":[143],"Second,":[144],"correctness":[146],"above":[149],"enforced":[153],"generating":[155,179],"zk-SNARK":[156,265,277,303],"based":[157],"proofs,":[158],"emphasis":[161],"on":[162,294],"optimizing":[163],"proving":[164,279],"overhead":[165],"two-dimensional":[167],"(2-D)":[168],"convolution":[169,202],"operations,":[170],"since":[171],"operations":[173,203],"dominate":[174],"bottleneck":[177],"during":[178],"proofs.":[180,256],"specifically":[182],"present":[183],"quadratic":[186,273],"matrix":[187,289],"program":[188,275],"(QMP)-based":[189],"arithmetic":[190,274],"circuit":[191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">a":[195],"single":[196],"multiplication":[197],"gate</i>":[198],"expressing":[200],"2-D":[201],"between":[204],"multiple":[205,216,255],"filters":[206],"inputs":[208],"batch":[211],"manner.":[212],"Third,":[213],"aggregate":[215],"proofs":[217],"respect":[219],"same":[222],"but":[225],"different":[226,235],"testers\u2019":[227],"(":[230],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">i.e</i>":[233],".,":[234],"statements)":[236],"one":[238],"proof,":[239],"ensure":[241],"validity":[244,251],"aggregated":[247],"proof":[248],"implies":[249],"original":[254],"Lastly,":[257],"our":[258,263],"experimental":[259],"results":[260],"demonstrate":[261],"QMP-based":[264],"performs":[266],"nearly":[267],"13.9\u00d7":[268],"faster":[269,283],"than":[270],"existing":[272],"(QAP)-based":[276],"time,":[280,286],"17.6\u00d7":[282],"Setup":[285],"high-dimension":[288],"multiplication.":[290],"Besides,":[291],"limitation":[293],"handling":[295],"bounded":[297],"number":[298],"multiplications":[300],"QAP-based":[302],"relieved.":[305]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
