ORIGINAL RESEARCH article

Front. Neurosci.

Sec. Neuromorphic Engineering

Volume 19 - 2025 | doi: 10.3389/fnins.2025.1551143

This article is part of the Research TopicTheoretical Advances and Practical Applications of Spiking Neural Networks, Volume IIView all 3 articles

SpyKing -Privacy-Preserving framework for Spiking Neural Networks

Provisionally accepted
  • 1Polytechnic University of Turin, Turin, Italy
  • 2New York University Abu Dhabi, Abu Dhabi, United Arab Emirates

The final, formatted version of the article will be published soon.

Artificial intelligence (AI) models, frequently built using deep neural networks (DNNs), have become integral to many aspects of modern life. However, the vast amount of data they process is not always secure, posing potential risks to privacy and safety. Fully Homomorphic Encryption (FHE) enables computations on encrypted data while preserving its confidentiality, making it a promising approach for privacy-preserving AI. This study evaluates the performance of FHE when applied to DNNs and compares it with Spiking Neural Networks (SNNs), which more closely resemble biological neurons and, under certain conditions, may achieve superior results.Using the SpyKing framework, we analyze key challenges in encrypted neural computations, particularly the limitations of FHE in handling non-linear operations. To ensure a comprehensive evaluation, we conducted experiments on the MNIST, FashionMNIST, and CIFAR10 datasets while systematically varying encryption parameters to optimize SNN performance. Our results show that FHE significantly increases computational costs but remains viable in terms of accuracy and data security. Furthermore, SNNs achieved up to 35% higher absolute accuracy than DNNs on encrypted data with low values of the plaintext modulus t. These findings highlight the potential of SNNs in privacy-preserving AI and underscore the growing need for secure yet efficient neural computing solutions.

Keywords: artificial intelligence, CIFAR10, Deep neural network (DNN), FashionMNIST, Homomorphic encryption (HE), LeNet5, machine learning, MNIST

Received: 24 Dec 2024; Accepted: 28 Apr 2025.

Copyright: © 2025 Nikfam, Marchisio, Martina and Shafique. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Farzad Nikfam, Polytechnic University of Turin, Turin, Italy

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.