{"id":"https://openalex.org/W7106276057","doi":"https://doi.org/10.1145/3680207.3765578","title":"Demo: PP-AICloud for Edge-Assisted Privacy-Preserving AI Inference with Homomorphic Encryption in Cloud-Based Mobile Services","display_name":"Demo: PP-AICloud for Edge-Assisted Privacy-Preserving AI Inference with Homomorphic Encryption in Cloud-Based Mobile Services","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W7106276057","doi":"https://doi.org/10.1145/3680207.3765578"},"language":null,"primary_location":{"id":"doi:10.1145/3680207.3765578","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3680207.3765578","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3680207.3765578","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st Annual International Conference on Mobile Computing and Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3680207.3765578","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chi-Hieu Nguyen","orcid":"https://orcid.org/0009-0002-6903-0163"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Chi-Hieu Nguyen","raw_affiliation_strings":["University of Technology Sydney, Sydney, Australia"],"raw_orcid":"https://orcid.org/0009-0002-6903-0163","affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bui Duc Manh","orcid":"https://orcid.org/0009-0003-1057-8332"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Bui Duc Manh","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0009-0003-1057-8332","affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dinh Thai Hoang","orcid":"https://orcid.org/0000-0002-9528-0863"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dinh Thai Hoang","raw_affiliation_strings":["University of Technology Sydney, Sydney, Australia"],"raw_orcid":"https://orcid.org/0000-0002-9528-0863","affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Diep N. Nguyen","orcid":"https://orcid.org/0000-0003-2659-8648"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Diep N. Nguyen","raw_affiliation_strings":["University of Technology Sydney, Sydney, Australia"],"raw_orcid":"https://orcid.org/0000-0003-2659-8648","affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":null,"display_name":"Lin Wang","orcid":"https://orcid.org/0000-0002-7485-4493"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Lin Wang","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-7485-4493","affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76474526,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1166","last_page":"1168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.4846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.4846000075340271,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.2533000111579895,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.040699999779462814,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5946000218391418},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5881999731063843},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5856999754905701},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5612000226974487},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.536899983882904},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5264999866485596},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4350000023841858},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.42899999022483826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8644999861717224},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5946000218391418},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5856999754905701},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5612000226974487},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.536899983882904},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5264999866485596},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4350000023841858},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.42899999022483826},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4242999851703644},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4092999994754791},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40380001068115234},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39410001039505005},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.388700008392334},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3716999888420105},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3546999990940094},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.34310001134872437},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3409000039100647},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.31290000677108765},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.30480000376701355},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.3025999963283539},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.2851000130176544},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2750999927520752},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2572999894618988}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3680207.3765578","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3680207.3765578","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3680207.3765578","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st Annual International Conference on Mobile Computing and Networking","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3680207.3765578","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3680207.3765578","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3680207.3765578","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st Annual International Conference on Mobile Computing and Networking","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6473492383956909,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G5860117103","display_name":null,"funder_award_id":"210100651","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7106276057.pdf","grobid_xml":"https://content.openalex.org/works/W7106276057.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W2768174108","https://openalex.org/W3135347465","https://openalex.org/W4390828922","https://openalex.org/W4391853594","https://openalex.org/W4392174038","https://openalex.org/W4406266670","https://openalex.org/W4406890495"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"PP-AICloud,":[3],"a":[4,115],"practical":[5],"system":[6,91],"prototype":[7],"designed":[8],"to":[9],"enable":[10],"privacy-preserving":[11,42],"AI":[12],"inference":[13,96],"for":[14,31],"cloud-based":[15],"mobile":[16,66],"services.":[17],"Motivated":[18],"by":[19],"recent":[20],"industry":[21],"efforts,":[22],"such":[23],"as":[24,60],"Apple's":[25],"integration":[26],"of":[27,40,123,131],"Homomorphic":[28],"Encryption":[29],"(HE)":[30],"on-device":[32,54],"intelligence,":[33],"our":[34],"work":[35],"addresses":[36],"the":[37,73,90,129],"key":[38],"limitations":[39],"existing":[41],"machine":[43],"learning":[44],"(PPML)":[45],"solutions,":[46],"i.e.,":[47],"high":[48],"latency,":[49],"bandwidth":[50],"inefficiencies,":[51],"and":[52,68,78,94],"excessive":[53],"computation.":[55],"PP-AICloud":[56,108,132],"leverages":[57],"edge":[58,77],"nodes":[59],"an":[61],"intermediate":[62],"computing":[63],"layer":[64],"between":[65],"devices":[67],"centralized":[69],"AICloud":[70],"infrastructures,":[71],"distributing":[72],"HE":[74,83],"workflow":[75],"across":[76],"cloud":[79],"resources.":[80],"By":[81],"integrating":[82],"with":[84,120],"deep":[85],"convolutional":[86],"neural":[87],"networks":[88],"(CNNs),":[89],"enables":[92],"efficient":[93],"secure":[95],"on":[97,114],"encrypted":[98],"user":[99],"data":[100],"without":[101],"requiring":[102],"decryption.":[103],"Experimental":[104],"results":[105],"demonstrate":[106,128],"that":[107],"achieves":[109],"more":[110],"than":[111],"91%":[112],"accuracy":[113],"real-world":[116],"landmark":[117],"recognition":[118],"task":[119],"real-time":[121],"latency":[122],"under":[124],"0.7":[125],"seconds.":[126],"We":[127],"capabilities":[130],"through":[133],"demo":[134],"videos":[135],"available":[136],"at:":[137],"Demo":[138],"link.":[139]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-11-23T00:00:00"}
