{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:08:22Z","timestamp":1755994102090,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T00:00:00Z","timestamp":1700352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,19]]},"DOI":"10.1145\/3689217.3690617","type":"proceedings-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:22:01Z","timestamp":1732040521000},"page":"97-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CryptoTrain: Fast Secure Training on Encrypted Dataset"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8674-7139","authenticated-orcid":false,"given":"Jiaqi","family":"Xue","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6345-8935","authenticated-orcid":false,"given":"Yancheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4433-7839","authenticated-orcid":false,"given":"Yanshan","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9038-4460","authenticated-orcid":false,"given":"Xueqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4391-2774","authenticated-orcid":false,"given":"Hao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5462-2567","authenticated-orcid":false,"given":"Qian","family":"Lou","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. AWS Amazon. https:\/\/aws.amazon.com\/?nc1=h_ls."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Azure Mircrosoft. https:\/\/azure.microsoft.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. California Consumer Privacy Act. https:\/\/oag.ca.gov\/privacy\/ccpa.."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. EzPC. https:\/\/github.com\/mpc-msri\/EzPC.."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. General Data Protection Regulation. https:\/\/gdpr-info.eu\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Google Cloud. https:\/\/cloud.google.com\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"e_1_3_2_1_8_1","volume-title":"Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy.","author":"Aikata Aikata","year":"2023","unstructured":"Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, and Sujoy Sinha Roy. 2023. REED: chiplet-based scalable hardware accelerator for fully homomorphic encryption. arXiv preprint arXiv:2308.02885 (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_1_10_1","volume-title":"Adam in private: Secure and fast training of deep neural networks with adaptive moment estimation. arXiv preprint arXiv:2106.02203","author":"Attrapadung Nuttapong","year":"2021","unstructured":"Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, and Jacob CN Schuldt. 2021. Adam in private: Secure and fast training of deep neural networks with adaptive moment estimation. arXiv preprint arXiv:2106.02203 (2021)."},{"key":"e_1_3_2_1_11_1","volume-title":"Trident: Efficient 4pc framework for privacy preserving machine learning. arXiv preprint arXiv:1912.02631","author":"Chaudhari Harsh","year":"2019","unstructured":"Harsh Chaudhari, Rahul Rachuri, and Ajith Suresh. 2019. Trident: Efficient 4pc framework for privacy preserving machine learning. arXiv preprint arXiv:1912.02631 (2019)."},{"key":"e_1_3_2_1_12_1","volume-title":"Ivan Bjerre Damg\u00e5rd, et al","author":"Cramer Ronald","year":"2015","unstructured":"Ronald Cramer, Ivan Bjerre Damg\u00e5rd, et al. 2015. Secure multiparty computation. Cambridge University Press."},{"key":"e_1_3_2_1_13_1","volume-title":"A guide to convolution arithmetic for deep learning. arXiv preprint arXiv:1603.07285","author":"Dumoulin Vincent","year":"2016","unstructured":"Vincent Dumoulin and Francesco Visin. 2016. A guide to convolution arithmetic for deep learning. arXiv preprint arXiv:1603.07285 (2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"e_1_3_2_1_15_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and fast secure {two-party} deep neural network inference. In 31st USENIX Security Symposium (USENIX Security 22). 809--826."},{"key":"e_1_3_2_1_16_1","volume-title":"Orca: FSS-based Secure Training and Inference with GPUs. Cryptology ePrint Archive","author":"Jawalkar Neha","year":"2023","unstructured":"Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, and Rahul Sharma. 2023. Orca: FSS-based Secure Training and Inference with GPUs. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Backpropagation in convolutional neural networks. Deep- Grid?Organic Deep Learning","volume":"29","author":"Kafunah Jefkine","year":"2016","unstructured":"Jefkine Kafunah. 2016. Backpropagation in convolutional neural networks. Deep- Grid?Organic Deep Learning, Nov 29 (2016), 1--10.","journal-title":"Nov"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Machine Learning. PMLR, 10912--10938","author":"Keller Marcel","year":"2022","unstructured":"Marcel Keller and Ke Sun. 2022. Secure quantized training for deep learning. In International Conference on Machine Learning. PMLR, 10912--10938."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589053"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings, Part II. Springer, 54--70","author":"Kolesnikov Vladimir","year":"2013","unstructured":"Vladimir Kolesnikov and Ranjit Kumaresan. 2013. Improved OT extension for transferring short secrets. In Advances in Cryptology--CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2013. Proceedings, Part II. Springer, 54--70."},{"key":"e_1_3_2_1_21_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_22_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems 25 (2012)."},{"key":"e_1_3_2_1_23_1","unstructured":"Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann.lecun.com\/exdb\/mnist\/ (1998)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Machine Learning. PMLR","author":"Lee Seewoo","year":"2023","unstructured":"Seewoo Lee, Garam Lee, Jung Woo Kim, Junbum Shin, and Mun-Kyu Lee. 2023. HETAL: efficient privacy-preserving transfer learning with homomorphic encryption. In International Conference on Machine Learning. PMLR, 19010--19035."},{"key":"e_1_3_2_1_26_1","first-page":"8638","article-title":"Autoprivacy: Automated layer-wise parameter selection for secure neural network inference","volume":"33","author":"Lou Qian","year":"2020","unstructured":"Qian Lou, Song Bian, and Lei Jiang. 2020. Autoprivacy: Automated layer-wise parameter selection for secure neural network inference. Advances in Neural Information Processing Systems 33 (2020), 8638--8647.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_27_1","volume-title":"Geoffrey Charles Fox, and Lei Jiang","author":"Lou Qian","year":"2020","unstructured":"Qian Lou, Bo Feng, Geoffrey Charles Fox, and Lei Jiang. 2020. Glyph: Fast and accurately training deep neural networks on encrypted data. Advances in neural information processing systems 33 (2020), 9193--9202."},{"key":"e_1_3_2_1_28_1","volume-title":"She: A fast and accurate deep neural network for encrypted data. Advances in neural information processing systems 32","author":"Lou Qian","year":"2019","unstructured":"Qian Lou and Lei Jiang. 2019. She: A fast and accurate deep neural network for encrypted data. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_29_1","volume-title":"International conference on machine learning. PMLR, 7102--7110","author":"Lou Qian","year":"2021","unstructured":"Qian Lou and Lei Jiang. 2021. Hemet: A homomorphic-encryption-friendly privacy-preserving mobile neural network architecture. In International conference on machine learning. PMLR, 7102--7110."},{"key":"e_1_3_2_1_30_1","first-page":"2364","article-title":"Falcon: Fast spectral inference on encrypted data","volume":"33","author":"Lou Qian","year":"2020","unstructured":"Qian Lou, Wen-jie Lu, Cheng Hong, and Lei Jiang. 2020. Falcon: Fast spectral inference on encrypted data. Advances in Neural Information Processing Systems 33 (2020), 2364--2374.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_31_1","volume-title":"International Conference on Learning Representations.","author":"Lou Qian","year":"2021","unstructured":"Qian Lou, Yilin Shen, Hongxia Jin, and Lei Jiang. 2021. Safenet: A secure, accurate and fast neural network inference. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_32_1","volume-title":"HE is all you need: Compressing FHE Ciphertexts using Additive HE. arXiv preprint arXiv:2303.09043","author":"Mahdavi Rasoul Akhavan","year":"2023","unstructured":"Rasoul Akhavan Mahdavi, Abdulrahman Diaa, and Florian Kerschbaum. 2023. HE is all you need: Compressing FHE Ciphertexts using Additive HE. arXiv preprint arXiv:2303.09043 (2023)."},{"key":"e_1_3_2_1_33_1","unstructured":"Saniya Maheshwari. 2021. Backpropagation in Convolutional Networks. (2021)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1836288"},{"key":"e_1_3_2_1_35_1","unstructured":"Mohammed Ali mnmoustafa. 2017. Tiny ImageNet. https:\/\/kaggle.com\/competi tions\/tiny-imagenet"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00011"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_40_1","volume-title":"Secure Floating-Point Training. Cryptology ePrint Archive","author":"Rathee Deevashwer","year":"2023","unstructured":"Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, and Dawn Song. 2023. Secure Floating-Point Training. Cryptology ePrint Archive (2023)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00086"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","key":"e_1_3_2_1_44_1","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_1_46_1","volume-title":"Falcon: Honest-majority maliciously secure framework for private deep learning. arXiv preprint arXiv:2004.02229","author":"Wagh Sameer","year":"2020","unstructured":"Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. 2020. Falcon: Honest-majority maliciously secure framework for private deep learning. arXiv preprint arXiv:2004.02229 (2020)."},{"key":"e_1_3_2_1_47_1","volume-title":"Audit and improve robustness of private neural networks on encrypted data. arXiv preprint arXiv:2209.09996","author":"Xue Jiaqi","year":"2022","unstructured":"Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, and Qian Lou. 2022. Audit and improve robustness of private neural networks on encrypted data. arXiv preprint arXiv:2209.09996 (2022)."},{"key":"e_1_3_2_1_48_1","volume-title":"PriML: An Electro-Optical Accelerator for Private Machine Learning on Encrypted Data. In 2023 24th International Symposium on Quality Electronic Design (ISQED). IEEE, 1--7.","author":"Zheng Mengxin","year":"2023","unstructured":"Mengxin Zheng, Fan Chen, Lei Jiang, and Qian Lou. 2023. PriML: An Electro-Optical Accelerator for Private Machine Learning on Encrypted Data. In 2023 24th International Symposium on Quality Electronic Design (ISQED). IEEE, 1--7."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247719"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689217.3690617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689217.3690617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:12:41Z","timestamp":1755972761000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689217.3690617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,19]]},"references-count":49,"alternative-id":["10.1145\/3689217.3690617","10.1145\/3689217"],"URL":"https:\/\/doi.org\/10.1145\/3689217.3690617","relation":{},"subject":[],"published":{"date-parts":[[2023,11,19]]},"assertion":[{"value":"2024-11-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}