{"id":"https://openalex.org/W7147666415","doi":"https://doi.org/10.48550/arxiv.2603.26781","title":"Efficient Encrypted Computation in Convolutional Spiking Neural Networks with TFHE","display_name":"Efficient Encrypted Computation in Convolutional Spiking Neural Networks with TFHE","publication_year":2026,"publication_date":"2026-03-25","ids":{"openalex":"https://openalex.org/W7147666415","doi":"https://doi.org/10.48550/arxiv.2603.26781"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.26781","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26781","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.26781","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003507322","display_name":"Longfei Guo","orcid":"https://orcid.org/0009-0002-9103-6107"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Guo, Longfei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103061383","display_name":"Pengbo Li","orcid":"https://orcid.org/0009-0005-8425-0801"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Pengbo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132604694","display_name":"Ting Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gao, Ting","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132678498","display_name":"Yonghai Zhong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhong, Yonghai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132695170","display_name":"Haojie Fan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fan, Haojie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5132669628","display_name":"Jinqiao Duan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Duan, Jinqiao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003507322"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.25769999623298645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.25769999623298645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12808","display_name":"Ferroelectric and Negative Capacitance Devices","score":0.22190000116825104,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.15029999613761902,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bootstrapping","display_name":"Bootstrapping (finance)","score":0.763700008392334},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.7552000284194946},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6904000043869019},{"id":"https://openalex.org/keywords/spiking-neural-network","display_name":"Spiking neural network","score":0.6021999716758728},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5839999914169312},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5767999887466431},{"id":"https://openalex.org/keywords/complement","display_name":"Complement (music)","score":0.5246999859809875}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8163999915122986},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.763700008392334},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.7552000284194946},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6904000043869019},{"id":"https://openalex.org/C11731999","wikidata":"https://www.wikidata.org/wiki/Q9067355","display_name":"Spiking neural network","level":3,"score":0.6021999716758728},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5839999914169312},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5767999887466431},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.5246999859809875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49480000138282776},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4934999942779541},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36640000343322754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33799999952316284},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3375999927520752},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.32089999318122864},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.31529998779296875},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.31209999322891235},{"id":"https://openalex.org/C2781390188","wikidata":"https://www.wikidata.org/wiki/Q25203449","display_name":"Spike (software development)","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.28369998931884766},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.27230000495910645}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.26781","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26781","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.26781","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26781","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,81,85,145,162,168,195,205],"rapid":[2],"advancement":[3],"of":[4,88,111,130,170,175,186],"AI":[5],"technology,":[6],"we":[7,74,99,133],"have":[8],"seen":[9],"more":[10,12],"and":[11,52,56,92,143,164,183,203,208],"concerns":[13],"on":[14,22,49,80,107,161],"data":[15],"privacy,":[16],"leading":[17],"to":[18,118,127,140,180],"some":[19],"cutting-edge":[20],"research":[21],"machine":[23],"learning":[24],"with":[25,42,149,172],"encrypted":[26],"computation.":[27],"Fully":[28],"Homomorphic":[29],"Encryption":[30],"(FHE)":[31],"is":[32,116],"a":[33,77,124,173],"crucial":[34],"technology":[35],"for":[36,90],"privacy-preserving":[37],"computation,":[38],"while":[39],"it":[40,47],"struggles":[41],"continuous":[43],"non-polynomial":[44],"functions,":[45],"as":[46],"operates":[48],"discrete":[50,64,86],"integers":[51],"supports":[53],"only":[54],"addition":[55],"multiplication.":[57],"Spiking":[58],"Neural":[59],"Networks":[60],"(SNNs),":[61],"which":[62],"use":[63],"spike":[65],"signals,":[66],"naturally":[67],"complement":[68],"FHE's":[69],"characteristics.":[70],"In":[71],"this":[72],"paper,":[73],"introduce":[75],"FHE-DiCSNN,":[76,171],"framework":[78,115],"built":[79],"TFHE":[82],"scheme,":[83],"utilizing":[84],"nature":[87],"SNNs":[89,110],"secure":[91],"efficient":[93],"computations.":[94],"By":[95],"leveraging":[96],"bootstrapping":[97,157],"techniques,":[98],"successfully":[100],"implement":[101],"Leaky":[102],"Integrate-and-Fire":[103],"(LIF)":[104],"neuron":[105,121],"models":[106],"ciphertexts,":[108],"allowing":[109],"arbitrary":[112],"depth.":[113],"Our":[114],"adaptable":[117],"other":[119],"spiking":[120],"models,":[122],"offering":[123],"novel":[125],"approach":[126],"homomorphic":[128],"evaluation":[129],"SNNs.":[131],"Additionally,":[132],"integrate":[134],"convolutional":[135],"methods":[136],"inspired":[137],"by":[138],"CNNs":[139],"enhance":[141],"accuracy":[142],"reduce":[144],"simulation":[146],"time":[147],"associated":[148],"random":[150],"encoding.":[151],"Parallel":[152],"computation":[153,184],"techniques":[154],"further":[155],"accelerate":[156],"operations.":[158],"Experimental":[159],"results":[160],"MNIST":[163],"FashionMNIST":[165],"datasets":[166],"validate":[167],"effectiveness":[169],"loss":[174],"less":[176],"than":[177],"3\\%":[178],"compared":[179],"plaintext,":[181],"respectively,":[182],"times":[185],"under":[187],"1":[188],"second":[189],"per":[190],"prediction.":[191],"We":[192],"also":[193],"apply":[194],"model":[196],"into":[197],"real":[198],"medical":[199],"image":[200],"classification":[201],"problems":[202],"analyze":[204],"parameter":[206],"optimization":[207],"selection.":[209]},"counts_by_year":[],"updated_date":"2026-04-02T13:53:19.096889","created_date":"2026-04-02T00:00:00"}
