{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T10:40:02Z","timestamp":1750848002268,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819687305","type":"print"},{"value":"9789819687312","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8731-2_10","type":"book-chapter","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T09:59:29Z","timestamp":1750845569000},"page":"96-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Transformation Method for\u00a0Privacy Protection in\u00a0Image Classification"],"prefix":"10.1007","author":[{"given":"Jiahao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Wenmao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xianchao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308\u2013318. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Addo, P.M., Guegan, D., Hassani, B.: Credit risk analysis using machine and deep learning models. Risks 6(2) (2018). https:\/\/www.mdpi.com\/2227-9091\/6\/2\/38","DOI":"10.3390\/risks6020038"},{"key":"10_CR3","unstructured":"P &D Laboratory - Pathological Anatomy and Cytopathology, Parana, Brazil. Breast cancer histopathological database (breakhis). https:\/\/web.inf.ufpr.br\/vri\/databases\/breast-cancer-histopathological-database-breakhis\/"},{"issue":"5","key":"10_CR4","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S., et al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bakator, M., Radosav, D.: Deep learning and medical diagnosis: a review of literature. Multimodal Technol. Interact. 2(3) (2018). https:\/\/www.mdpi.com\/2414-4088\/2\/3\/47","DOI":"10.3390\/mti2030047"},{"issue":"5","key":"10_CR6","doi-asserted-by":"publisher","first-page":"4659","DOI":"10.1007\/s12652-022-04367-x","volume":"14","author":"R Gupta","year":"2023","unstructured":"Gupta, R., Gupta, I., Saxena, D., Singh, A.K.: A differential approach and deep neural network based data privacy-preserving model in cloud environment. J. Ambient. Intell. Humaniz. Comput. 14(5), 4659\u20134674 (2023)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"10_CR7","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M.: Cryptodl: deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1186\/s12880-022-00793-7","volume":"22","author":"HE Kim","year":"2022","unstructured":"Kim, H.E., Cosa-Linan, A., Santhanam, N., Jannesari, M., Maros, M.E., Ganslandt, T.: Transfer learning for medical image classification: a literature review. BMC Med. Imaging 22(1), 69 (2022)","journal-title":"BMC Med. Imaging"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Li, Q., Cai, W., Wang, X., Zhou, Y., Feng, D.D., Chen, M.: Medical image classification with convolutional neural network. In: 2014 13th International Conference on Control Automation Robotics & Vision (ICARCV), pp. 844\u2013848. IEEE (2014)","DOI":"10.1109\/ICARCV.2014.7064414"},{"issue":"7","key":"10_CR10","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1049\/ipr2.12784","volume":"17","author":"Z Shen","year":"2023","unstructured":"Shen, Z., Zhong, T., Sun, H., Qi, B.: RRN: a differential private approach to preserve privacy in image classification. IET Image Proc. 17(7), 2192\u20132203 (2023)","journal-title":"IET Image Proc."},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Shi, C., Yu, P., Huang, X.: A novel GAN based user desensitization data generation algorithm. In: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering, EITCE 2021, pp. 1068\u20131074. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3501409.3501599","DOI":"10.1145\/3501409.3501599"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"177844","DOI":"10.1109\/ACCESS.2019.2959017","volume":"7","author":"W Sirichotedumrong","year":"2019","unstructured":"Sirichotedumrong, W., Kinoshita, Y., Kiya, H.: Pixel-based image encryption without key management for privacy-preserving deep neural networks. IEEE Access 7, 177844\u2013177855 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2959017","journal-title":"IEEE Access"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Wang, J., Bao, W., Sun, L., Zhu, X., Cao, B., Philip, S.Y.: Private model compression via knowledge distillation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a033, pp. 1190\u20131197 (2019)","DOI":"10.1609\/aaai.v33i01.33011190"},{"issue":"7","key":"10_CR14","doi-asserted-by":"publisher","first-page":"9755","DOI":"10.1109\/TITS.2021.3108520","volume":"23","author":"K Wang","year":"2022","unstructured":"Wang, K., Li, F., Chen, C.M., Hassan, M.M., Long, J., Kumar, N.: Interpreting adversarial examples and robustness for deep learning-based auto-driving systems. IEEE Trans. Intell. Transp. Syst. 23(7), 9755\u20139764 (2022). https:\/\/doi.org\/10.1109\/TITS.2021.3108520","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: Medical image classification using deep learning. Deep learning in healthcare: paradigms and applications, pp. 33\u201351 (2020)","DOI":"10.1007\/978-3-030-32606-7_3"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 586\u2013595 (2018). https:\/\/api.semanticscholar.org\/CorpusID:4766599","DOI":"10.1109\/CVPR.2018.00068"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Zhi, X., Xue, L., Xie, S.: An unstructured data desensitization approach for futures industry. In: Proceedings of the 2022 11th International Conference on Computing and Pattern Recognition, ICCPR 2022, pp. 531\u2013535. Association for Computing Machinery, New York (2023). https:\/\/doi.org\/10.1145\/3581807.3581885","DOI":"10.1145\/3581807.3581885"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Zhou, L., Wang, M., Zhou, N.: Distributed federated learning-based deep learning model for privacy MRI brain tumor detection. arXiv preprint arXiv:2404.10026 (2024)","DOI":"10.62836\/jitp.2023.158"},{"key":"10_CR19","unstructured":"Zhuo, C., Gao, D., Liu, L.: PKDGAN: private knowledge distillation with generative adversarial networks. IEEE Trans. Big Data (2022)"},{"issue":"1","key":"10_CR20","doi-asserted-by":"publisher","first-page":"13524","DOI":"10.1038\/s41598-021-93030-0","volume":"11","author":"A Ziller","year":"2021","unstructured":"Ziller, A., Usynin, D., Braren, R., Makowski, M., Rueckert, D., Kaissis, G.: Medical imaging deep learning with differential privacy. Sci. Rep. 11(1), 13524 (2021)","journal-title":"Sci. Rep."}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8731-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T09:59:34Z","timestamp":1750845574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8731-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819687305","9789819687312"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8731-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2025\/index.html#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}