{"id":"https://openalex.org/W4224088737","doi":"https://doi.org/10.1145/3508398.3511503","title":"GINN","display_name":"GINN","publication_year":2022,"publication_date":"2022-04-14","ids":{"openalex":"https://openalex.org/W4224088737","doi":"https://doi.org/10.1145/3508398.3511503"},"language":"en","primary_location":{"id":"doi:10.1145/3508398.3511503","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398.3511503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054851057","display_name":"Aref Asvadishirehjini","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aref Asvadishirehjini","raw_affiliation_strings":["University of Texas at Dallas, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Dallas, TX, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087192873","display_name":"Murat Kantarc\u0131o\u011flu","orcid":"https://orcid.org/0000-0001-9795-9063"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Murat Kantarcioglu","raw_affiliation_strings":["University of Texas at Dallas, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Dallas, Dallas, TX, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090647314","display_name":"Bradley Malin","orcid":"https://orcid.org/0000-0003-3040-5175"},"institutions":[{"id":"https://openalex.org/I901861585","display_name":"Vanderbilt University Medical Center","ror":"https://ror.org/05dq2gs74","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I4210162197","https://openalex.org/I901861585"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bradley Malin","raw_affiliation_strings":["Vanderbilt University Medical Center, Nashville, TN, USA"],"affiliations":[{"raw_affiliation_string":"Vanderbilt University Medical Center, Nashville, TN, USA","institution_ids":["https://openalex.org/I901861585"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054851057"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7957,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75868206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"4","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8585654497146606},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.556817352771759},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.517892599105835},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.48722043633461},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.47385361790657043},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.4376010000705719},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.432686448097229},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4267072081565857},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3908749520778656},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3403875529766083},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24024778604507446},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1384018361568451}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8585654497146606},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.556817352771759},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.517892599105835},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.48722043633461},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.47385361790657043},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.4376010000705719},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.432686448097229},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4267072081565857},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3908749520778656},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3403875529766083},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24024778604507446},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1384018361568451},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508398.3511503","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398.3511503","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G2479062512","display_name":null,"funder_award_id":"CNS-1837627, OAC-1828467, IIS-1939728, DMS-1925346, CNS-2029661","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5321078674","display_name":null,"funder_award_id":"W911NF-17-1-0356","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2067713319","https://openalex.org/W2097117768","https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2701059868","https://openalex.org/W2986013765","https://openalex.org/W3030621456","https://openalex.org/W3175329822","https://openalex.org/W4252033442","https://openalex.org/W4300853399","https://openalex.org/W6712237015"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4390846322"],"abstract_inverted_index":{"Machine":[0],"learning":[1],"models":[2],"based":[3],"on":[4,86],"Deep":[5],"Neural":[6],"Networks":[7],"(DNNs)":[8],"are":[9,52],"increasingly":[10],"deployed":[11],"in":[12],"a":[13,33,117,155,180,187],"wide":[14],"variety":[15],"of":[16,70,112,144,151,197],"applications,":[17],"ranging":[18],"from":[19],"self-driving":[20],"cars":[21],"to":[22,31,61,66,72,81,97,165,182,203],"COVID-19":[23],"diagnosis.":[24],"To":[25,121],"support":[26,44,98],"the":[27,59,123,162,167,175],"computational":[28,74],"power":[29],"necessary":[30],"train":[32],"DNN,":[34],"cloud":[35],"environments":[36,89],"with":[37,57,148,201],"dedicated":[38],"Graphical":[39],"Processing":[40],"Unit":[41],"(GPU)":[42],"hardware":[43],"have":[45,78],"emerged":[46],"as":[47],"critical":[48],"infrastructure.":[49],"However,":[50],"there":[51],"many":[53],"integrity":[54,198],"challenges":[55],"associated":[56],"outsourcing":[58],"computation":[60,146],"use":[62],"GPU":[63,135],"power,":[64],"due":[65],"its":[67],"inherent":[68],"lack":[69],"safeguards":[71],"ensure":[73],"integrity.":[75],"Various":[76],"approaches":[77],"been":[79],"developed":[80],"address":[82],"these":[83],"challenges,":[84],"building":[85],"trusted":[87],"execution":[88],"(TEE).":[90],"Yet,":[91],"no":[92,137],"existing":[93],"approach":[94,177],"scales":[95],"up":[96],"realistic":[99],"integrity-preserving":[100],"DNN":[101,152,205],"model":[102,168],"training":[103,113],"for":[104],"heavy":[105],"workloads":[106],"(e.g.,":[107,154,199],"deep":[108],"architectures":[109],"and":[110,133],"millions":[111],"examples)":[114],"without":[115],"sustaining":[116],"significant":[118],"performance":[119,184],"hit.":[120],"mitigate":[122],"running":[124],"time":[125],"difference":[126],"between":[127],"pure":[128,134,188],"TEE":[129],"(i.e.,":[130,136],"full":[131],"integrity)":[132,138],",":[139],"we":[140],"combine":[141],"random":[142],"verification":[143],"selected":[145],"steps":[147],"systematic":[149],"adjustments":[150],"hyperparameters":[153],"narrow":[156],"gradient":[157],"clipping":[158],"range),":[159],"which":[160],"limits":[161],"attacker's":[163],"ability":[164],"shift":[166],"parameters":[169],"arbitrarily.":[170],"Experimental":[171],"analysis":[172],"shows":[173],"that":[174],"new":[176],"can":[178],"achieve":[179],"2X":[181],"20X":[183],"improvement":[185],"over":[186],"TEE-based":[189],"solution":[190],"while":[191],"guaranteeing":[192],"an":[193],"extremely":[194],"high":[195],"probability":[196],"0.999)":[200],"respect":[202],"state-of-the-art":[204],"backdoor":[206],"attacks.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-04-19T00:00:00"}
