{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:31:08Z","timestamp":1763202668242,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892823","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-preserving time series prediction with temporal convolutional neural networks"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Falcetta","sequence":"first","affiliation":[{"name":"Informazione e Bioingegneria, Politecnico di Milano,Dipartimento di Elettronica,Milano,Italy"}]},{"given":"Manuel","family":"Roveri","sequence":"additional","affiliation":[{"name":"Informazione e Bioingegneria, Politecnico di Milano,Dipartimento di Elettronica,Milano,Italy"}]}],"member":"263","reference":[{"journal-title":"pmdarima Arima estimators for python","year":"2017","author":"smith","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2017.1380080"},{"key":"ref33","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"journal-title":"Adam A method for stochastic optimization","year":"2014","author":"kingma","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01076-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486929"},{"journal-title":"UCI Machine Learning Repository","year":"2017","author":"dua","key":"ref37"},{"journal-title":"Forecasting Methods and Applications","year":"2008","author":"makridakis","key":"ref36"},{"journal-title":"Time Series Analysis Forecasting and Control","year":"2015","author":"box","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486923"},{"journal-title":"Cryptogru Low latency privacy-preserving text analysis with gru","year":"2020","author":"feng","key":"ref10"},{"key":"ref11","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"fan","year":"2012","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref12","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009","journal-title":"Ph D dissertation Stanford Univ"},{"journal-title":"A privacy-preserving distributed architecture for deep-learning-as-a-service","year":"2020","author":"disabato","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref15","first-page":"27","article-title":"Classification of encrypted word embeddings using recurrent neural networks","author":"podschwadt","year":"2020","journal-title":"PrivateNLP WSDM"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"journal-title":"Bag of tricks for efficient text classification","year":"2016","author":"joulin","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3114581"},{"journal-title":"Microsoft SEAL (Release 3 7)","year":"2021","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100403"},{"key":"ref6","first-page":"365","article-title":"Probabilistic encryption & how to play mental poker keeping secret all partial information","author":"shafi","year":"1982","journal-title":"Proceedings of the 14th Annual ACM Symposium on Theory of Computing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2022.3180883"},{"key":"ref5","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"journal-title":"Homomorphic encryption comes to linux on ibm z","year":"2020","author":"bergamaschi","key":"ref8"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023084"},{"key":"ref9","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23956\/ijarcsse.v8i6.711"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3383779"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(70)90092-0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57339-7_11"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref23","first-page":"79","article-title":"A survey on homomorphic encryption schemes: Theory and implementation","volume":"51","author":"acar","year":"2018","journal-title":"ACM Computing Surveys"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892823.pdf?arnumber=9892823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T20:52:08Z","timestamp":1665780728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892823","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}