{"id":"https://openalex.org/W3155648414","doi":"https://doi.org/10.1145/3453483.3454094","title":"Vectorized secure evaluation of decision forests","display_name":"Vectorized secure evaluation of decision forests","publication_year":2021,"publication_date":"2021-06-18","ids":{"openalex":"https://openalex.org/W3155648414","doi":"https://doi.org/10.1145/3453483.3454094","mag":"3155648414"},"language":"en","primary_location":{"id":"doi:10.1145/3453483.3454094","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3453483.3454094","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3453483.3454094","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3453483.3454094","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Raghav Malik","orcid":"https://orcid.org/0000-0002-6660-6609"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Raghav Malik","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Vidush Singhal","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vidush Singhal","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Benjamin Gottfried","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benjamin Gottfried","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":null,"display_name":"Milind Kulkarni","orcid":"https://orcid.org/0000-0001-6827-345X"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milind Kulkarni","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.5599,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.72406269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1049","last_page":"1063"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7627000212669373},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7035999894142151},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6560999751091003},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6380000114440918},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5756999850273132},{"id":"https://openalex.org/keywords/simd","display_name":"SIMD","score":0.5648000240325928},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5436999797821045},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48829999566078186},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4187000095844269}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7681000232696533},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7627000212669373},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7035999894142151},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6560999751091003},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6380000114440918},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5756999850273132},{"id":"https://openalex.org/C150552126","wikidata":"https://www.wikidata.org/wiki/Q339387","display_name":"SIMD","level":2,"score":0.5648000240325928},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5436999797821045},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48829999566078186},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4187000095844269},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40869998931884766},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4002000093460083},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38199999928474426},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37610000371932983},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.37540000677108765},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3515999913215637},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.34709998965263367},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.31630000472068787},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.26589998602867126},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2639999985694885},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.2623000144958496},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2556000053882599},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.25380000472068787},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3453483.3454094","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3453483.3454094","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3453483.3454094","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2104.09583","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2104.09583","pdf_url":"https://arxiv.org/pdf/2104.09583","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3453483.3454094","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3453483.3454094","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3453483.3454094","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3929072778","display_name":null,"funder_award_id":"2019-19020700004","funder_id":"https://openalex.org/F4320333051","funder_display_name":"Intelligence Advanced Research Projects Activity"},{"id":"https://openalex.org/G4306970418","display_name":null,"funder_award_id":"contract #2019-19020700004","funder_id":"https://openalex.org/F4320333051","funder_display_name":"Intelligence Advanced Research Projects Activity"},{"id":"https://openalex.org/G4484280681","display_name":null,"funder_award_id":"CCF-1725672","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5638990845","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320337349","funder_display_name":"NIH Office of the Director"},{"id":"https://openalex.org/G5645695314","display_name":"Collaborative Research:  Digitization TCN:  Digitizing collections to trace parasite-host associations and predict the spread of vector-borne disease","funder_award_id":"1902070","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G782747244","display_name":null,"funder_award_id":"17256","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8345018822","display_name":null,"funder_award_id":"1919197","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8377180531","display_name":"SPX: Collaborative Research: Eat your Wheaties: Multi-Grain Compilers for Parallel Builds at Every Scale","funder_award_id":"1725672","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G93225853","display_name":null,"funder_award_id":"CCF-1919197","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320312530","display_name":"Office of the Director of National Intelligence","ror":"https://ror.org/01v3fsc55"},{"id":"https://openalex.org/F4320333051","display_name":"Intelligence Advanced Research Projects Activity","ror":"https://ror.org/01v3fsc55"},{"id":"https://openalex.org/F4320337349","display_name":"NIH Office of the Director","ror":"https://ror.org/00fj8a872"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3155648414.pdf","grobid_xml":"https://content.openalex.org/works/W3155648414.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1874619058","https://openalex.org/W2031738616","https://openalex.org/W2162726111","https://openalex.org/W2177209050","https://openalex.org/W2398935881","https://openalex.org/W2766141585","https://openalex.org/W2890611886","https://openalex.org/W2943497929","https://openalex.org/W2955401130","https://openalex.org/W2970696446","https://openalex.org/W2997591727"],"related_works":[],"abstract_inverted_index":{"As":[0],"the":[1,20,38,79,102],"demand":[2],"for":[3,22,117],"machine":[4,24],"learning\u2013based":[5],"inference":[6],"increases":[7],"in":[8,26,124],"tandem":[9],"with":[10],"concerns":[11],"about":[12],"privacy,":[13],"there":[14],"is":[15,69],"a":[16,109],"growing":[17],"recognition":[18],"of":[19,72,81,93],"need":[21],"secure":[23,64],"learning,":[25],"which":[27],"secret":[28],"models":[29,141],"can":[30,114],"be":[31,52,115],"used":[32],"to":[33,51,61,84,138,149],"classify":[34],"private":[35],"data":[36,41],"without":[37],"model":[39],"or":[40],"being":[42],"leaked.":[43],"Fully":[44],"Homomorphic":[45],"Encryption":[46],"(FHE)":[47],"allows":[48],"arbitrary":[49],"computation":[50,68,113],"done":[53],"over":[54],"encrypted":[55],"data,":[56],"providing":[57,62],"an":[58,90],"attractive":[59],"approach":[60],"such":[63,67,95,142],"inference.":[65],"While":[66],"often":[70],"orders":[71],"magnitude":[73],"slower":[74],"than":[75],"its":[76],"plaintext":[77],"counterpart,":[78],"ability":[80],"FHE":[82],"cryptosystems":[83],"do":[85],"ciphertext":[86],"packing\u2014that":[87],"is,":[88],"encrypting":[89],"entire":[91],"vector":[92],"plaintexts":[94],"that":[96],"operations":[97],"are":[98],"evaluated":[99],"elementwise":[100],"on":[101],"vector\u2014helps":[103],"ameliorate":[104],"this":[105,125],"overhead,":[106],"effectively":[107],"creating":[108],"SIMD":[110],"architecture":[111],"where":[112],"vectorized":[116],"more":[118],"efficient":[119],"evaluation.":[120],"Most":[121],"recent":[122],"research":[123],"area":[126],"has":[127],"targeted":[128],"regular,":[129],"easily":[130],"vectorizable":[131],"neural":[132],"network":[133],"models.":[134],"Applying":[135],"similar":[136],"techniques":[137],"irregular":[139],"ML":[140],"as":[143],"decision":[144],"forests":[145],"remains":[146],"unexplored,":[147],"due":[148],"their":[150],"complex,":[151],"hard-to-vectorize":[152],"structures.":[153]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2021-04-26T00:00:00"}
