Research Article

Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT

Figure 15

At different key lengths, the encryption and decryption time of one sample.