Research Article
Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT
Table 4
Data dimensions, parameters, and decryption time in different layers.
| Layer (type) | Output shape | Param | Decrypt time (seconds) |
| Input | (28, 28, 1) | 0 | N/A | Conv layer | (26, 26, 20) | 200 | 2.073 | Activation layer | (26, 26, 20) | 0 | N/A | Average pooling layer | (25, 25, 20) | 0 | 2.511 | Conv layer | (23, 23, 50) | 9050 | 5.291 | Activation layer | (23, 23, 50 | 0 | N/A | Average pooling layer | (11, 11, 50) | 0 | 1.211 | Flatten layer | (6050) | 0 | N/A | Dense layer | (256) | 1549056 | 0.055 | Activation layer | (256) | 0 | N/A | Dense layer | (10) | 2570 | 0.002 | Activation layer | (10) | 0 | N/A |
|
|
Total params: 1,560,876; total time: 11.143 s.
|