{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T17:08:12Z","timestamp":1762276092068,"version":"build-2065373602"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Special Funds of the National Natural Science Foundation of China","award":["72442025","72442025"],"award-info":[{"award-number":["72442025","72442025"]}]},{"name":"Special Research Foundation of the Education Department of Liaoning Province, China","award":["LJ212410173085","LJ212410173085"],"award-info":[{"award-number":["LJ212410173085","LJ212410173085"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09747-3","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T17:03:24Z","timestamp":1762275804000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cheating recognition in examination halls based on improved YOLOv8"],"prefix":"10.1007","volume":"28","author":[{"given":"Enliang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jiahe","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Shiyuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"issue":"6","key":"9747_CR1","doi-asserted-by":"publisher","first-page":"4699","DOI":"10.1007\/s11276-022-03115-5","volume":"30","author":"Y Li","year":"2024","unstructured":"Li Y, Lu Y, Cui H, Velipasalar S. Improving robustness and efficiency of edge computing models. Wireless Netw. 2024;30(6):4699\u2013711.","journal-title":"Wireless Netw"},{"issue":"5","key":"9747_CR2","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TC.2025.3540649","volume":"74","author":"S Xu","year":"2025","unstructured":"Xu S, Chen X, Guo Y, Yang Y, Wang S, Yiu S-M, et al. Lattice-based forward secure multi-user authenticated searchable encryption for cloud storage systems. IEEE Trans Comput. 2025;74(5):1663\u201377.","journal-title":"IEEE Trans Comput"},{"key":"9747_CR3","doi-asserted-by":"publisher","first-page":"3646","DOI":"10.1109\/TIFS.2025.3552199","volume":"20","author":"X Chen","year":"2025","unstructured":"Chen X, Gao S, Xu S, Chen L, Yiu S-M, Xiao B. From $$\\sum $$-protocol-based signatures to ring signatures: general construction and applications. IEEE Trans Inf Forensics Secur. 2025;20:3646\u201361.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8002","key":"9747_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1038\/s41586-024-07146-0","volume":"627","author":"L Messeri","year":"2024","unstructured":"Messeri L, Crockett M. Artificial intelligence and illusions of understanding in scientific research. Nature. 2024;627(8002):49\u201358.","journal-title":"Nature"},{"key":"9747_CR5","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1109\/TIFS.2024.3520007","volume":"20","author":"S Xu","year":"2025","unstructured":"Xu S, Chen X, Guo Y, Yiu S-M, Gao S, Xiao B. Efficient and secure post-quantum certificateless signcryption with linkability for iomt. IEEE Trans Inf Forensics Secur. 2025;20:1119\u201334.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"9747_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3711118","volume":"57","author":"D Zha","year":"2025","unstructured":"Zha D, Bhat ZP, Lai K-H, Yang F, Jiang Z, Zhong S, et al. Data-centric artificial intelligence: a survey. ACM Comput Surv. 2025;57(5):1\u201342.","journal-title":"ACM Comput Surv"},{"key":"9747_CR7","doi-asserted-by":"publisher","first-page":"8875","DOI":"10.1109\/TIFS.2024.3455772","volume":"19","author":"X Chen","year":"2024","unstructured":"Chen X, Xu S, Gao S, Guo Y, Yiu S-M, Xiao B. Fs-llrs: lattice-based linkable ring signature with forward security for cloud-assisted electronic medical records. IEEE Trans Inf Forensics Secur. 2024;19:8875\u201391. https:\/\/doi.org\/10.1109\/TIFS.2024.3455772.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9747_CR8","doi-asserted-by":"crossref","unstructured":"Redmon J, Divvala S, Girshick R, Farhadi A. You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016. p. 779\u2013788.","DOI":"10.1109\/CVPR.2016.91"},{"key":"9747_CR9","first-page":"24261","volume":"34","author":"IO Tolstikhin","year":"2021","unstructured":"Tolstikhin IO, Houlsby N, Kolesnikov A, Beyer L, Zhai X, Unterthiner T, et al. Mlp-mixer: an all-mlp architecture for vision. Adv Neural Inf Process Syst. 2021;34:24261\u201372.","journal-title":"Adv Neural Inf Process Syst"},{"key":"9747_CR10","doi-asserted-by":"publisher","first-page":"86191","DOI":"10.1109\/ACCESS.2022.3198954","volume":"10","author":"E G\u00fcney","year":"2022","unstructured":"G\u00fcney E, Bayilmi\u015f C, \u00c7akan B. An implementation of real-time traffic signs and road objects detection based on mobile gpu platforms. IEEE Access. 2022;10:86191\u2013203. https:\/\/doi.org\/10.1109\/ACCESS.2022.3198954.","journal-title":"IEEE Access"},{"key":"9747_CR11","doi-asserted-by":"publisher","first-page":"103587","DOI":"10.1109\/ACCESS.2022.3209832","volume":"10","author":"E G\u00fcney","year":"2022","unstructured":"G\u00fcney E, Bayilmi\u015f C, \u00c7akan B. Corrections to \u201can implementation of real-time traffic signs and road objects detection based on mobile gpu platforms\u2019\u2019. IEEE Access. 2022;10:103587\u2013103587. https:\/\/doi.org\/10.1109\/ACCESS.2022.3209832.","journal-title":"IEEE Access"},{"key":"9747_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122116","volume":"238","author":"E G\u00fcney","year":"2024","unstructured":"G\u00fcney E, Bay\u0131lm\u0131\u015f C, \u00c7akar S, Erol E, Atmaca \u00d6. Autonomous control of shore robotic charging systems based on computer vision. Expert Syst Appl. 2024;238:122116.","journal-title":"Expert Syst Appl"},{"key":"9747_CR13","doi-asserted-by":"publisher","unstructured":"Guney E, Sahin IH, Cakar S, Atmaca O, Erol E, Doganli M, Bayilmis C. Electric shore-to-ship charging socket detection using image processing and yolo. In: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT). 2022. p. 1069\u20131073. https:\/\/doi.org\/10.1109\/ISMSIT56059.2022.9932841.","DOI":"10.1109\/ISMSIT56059.2022.9932841"},{"issue":"2","key":"9747_CR14","first-page":"192","volume":"39","author":"S Dereli","year":"2023","unstructured":"Dereli S, Okuyar M, G\u00fcney E. A conceptual system proposal for real-time detection of jellyfish density in coastal areas from uav images. Erciyes \u00dcniversitesi Fen Bilimleri Enstit\u00fcs\u00fc Fen Bilimleri Dergisi. 2023;39(2):192\u2013203.","journal-title":"Erciyes \u00dcniversitesi Fen Bilimleri Enstit\u00fcs\u00fc Fen Bilimleri Dergisi"},{"issue":"2","key":"9747_CR15","first-page":"216","volume":"5","author":"E G\u00fcney","year":"2022","unstructured":"G\u00fcney E, Bay\u0131lm\u0131\u015f C. An implementation of traffic signs and road objects detection using faster r-cnn. Sakarya Univ J Comput Inf Sci. 2022;5(2):216\u201324.","journal-title":"Sakarya Univ J Comput Inf Sci"},{"issue":"2","key":"9747_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00138-024-01651-y","volume":"36","author":"T Xu","year":"2025","unstructured":"Xu T, Xu S, Chen X, Chen F, Li H. Multi-core token mixer: a novel approach for underwater image enhancement. Mach Vis Appl. 2025;36(2):1\u201316.","journal-title":"Mach Vis Appl"},{"key":"9747_CR17","doi-asserted-by":"crossref","unstructured":"Malhotra M, Chhabra I. Automatic invigilation using computer vision. In: 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021). Atlantis Press; 2021. p. 130\u2013136.","DOI":"10.2991\/ahis.k.210913.017"},{"key":"9747_CR18","doi-asserted-by":"crossref","unstructured":"Fang Y, Ye J, Wang H. Realization of intelligent invigilation system based on adaptive threshold. In: 2020 5th International Conference on Computer and Communication Systems (ICCCS). IEEE; 2020. p. 201\u2013205.","DOI":"10.1109\/ICCCS49078.2020.9118581"},{"key":"9747_CR19","doi-asserted-by":"crossref","unstructured":"Adil M, Simon R, Khatri SK. Automated invigilation system for detection of suspicious activities during examination. In: 2019 Amity International Conference on Artificial Intelligence (AICAI). IEEE; 2019. p. 361\u2013366.","DOI":"10.1109\/AICAI.2019.8701263"},{"key":"9747_CR20","unstructured":"Chen X, Gupta A. An implementation of faster rcnn with study for region sampling. 2017. arXiv preprint arXiv:1702.02138."},{"key":"9747_CR21","doi-asserted-by":"crossref","unstructured":"Malhotra M, Chhabra I. Student invigilation detection using deep learning and machine after Covid-19: a review on taxonomy and future challenges. Future of Organizations and Work after the 4th Industrial Revolution: The Role of Artificial Intelligence, Big Data, Automation, and Robotics. 2022. p. 311\u2013326.","DOI":"10.1007\/978-3-030-99000-8_17"},{"key":"9747_CR22","unstructured":"Reis D, Kupec J, Hong J, Daoudi A. Real-time flying object detection with yolov8. 2023. arXiv preprint arXiv:2305.09972."},{"key":"9747_CR23","first-page":"12993","volume":"34","author":"Z Zheng","year":"2020","unstructured":"Zheng Z, Wang P, Liu W, Li J, Ye R, Ren D. Distance-iou loss: faster and better learning for bounding box regression. Proc AAAI Conf Artif Intell. 2020;34:12993\u20133000.","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"9747_CR24","first-page":"21002","volume":"33","author":"X Li","year":"2020","unstructured":"Li X, Wang W, Wu L, Chen S, Hu X, Li J, et al. Generalized focal loss: learning qualified and distributed bounding boxes for dense object detection. Adv Neural Inf Process Syst. 2020;33:21002\u201312.","journal-title":"Adv Neural Inf Process Syst"},{"issue":"4","key":"9747_CR25","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10922-024-09865-1","volume":"32","author":"Q Yang","year":"2024","unstructured":"Yang Q, Yang Y, Xu S, Guo R, Xian H, Lin Y, et al. Ppct: privacy-preserving contact tracing using concise private set intersection cardinality. J Netw Syst Manage. 2024;32(4):97.","journal-title":"J Netw Syst Manage"},{"key":"9747_CR26","doi-asserted-by":"crossref","unstructured":"Girshick R. Fast r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision. 2015. p. 1440\u20131448.","DOI":"10.1109\/ICCV.2015.169"},{"key":"9747_CR27","doi-asserted-by":"crossref","unstructured":"Liu W, Anguelov D, Erhan D, Szegedy C, Reed S, Fu C-Y, Berg AC. Ssd: single shot multibox detector. In: Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I 14, p. 21\u201337. Springer; 2016.","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"9747_CR28","doi-asserted-by":"crossref","unstructured":"Lin T-Y, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Doll\u00e1r P, Zitnick CL. Microsoft coco: common objects in context. In: Computer vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, p. 740\u2013755. Springer; 2014.","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"3","key":"9747_CR29","first-page":"2530","volume":"12","author":"G Xu","year":"2024","unstructured":"Xu G, Kong D-L, Zhang K, Xu S, Cao Y, Mao Y, et al. A model value transfer incentive mechanism for federated learning with smart contracts in aiot. IEEE Int Things J. 2024;12(3):2530\u201344.","journal-title":"IEEE Int Things J"},{"issue":"4","key":"9747_CR30","first-page":"1","volume":"8","author":"C Pan","year":"2024","unstructured":"Pan C, Xu D, Xu S, Wang F, Zheng C, Liu B, et al. Perfat: non-contact abdominal obesity assessment system. Proc ACM Interact Mobile Wearable Ubiquitous Technol. 2024;8(4):1\u201325.","journal-title":"Proc ACM Interact Mobile Wearable Ubiquitous Technol"},{"key":"9747_CR31","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016. p. 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"9747_CR32","unstructured":"Yan X, Gilani SZ, Qin H, Feng M, Zhang L, Mian A. Deep keyframe detection in human action videos. 2018. arXiv preprint arXiv:1804.10021."},{"key":"9747_CR33","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G. Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018. p. 7132\u20137141.","DOI":"10.1109\/CVPR.2018.00745"},{"key":"9747_CR34","unstructured":"Narayanan M. Senetv2: aggregated dense layer for channelwise and global representations. 2023. arXiv preprint arXiv:2311.10807."},{"key":"9747_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108159","volume":"121","author":"X Jin","year":"2022","unstructured":"Jin X, Xie Y, Wei X-S, Zhao B-R, Chen Z-M, Tan X. Delving deep into spatial pooling for squeeze-and-excitation networks. Pattern Recogn. 2022;121:108159.","journal-title":"Pattern Recogn"},{"key":"9747_CR36","first-page":"825","volume":"34","author":"L Ma","year":"2020","unstructured":"Ma L, Gao J, Wang Y, Zhang C, Wang J, Ruan W, et al. Adacare: explainable clinical health status representation learning via scale-adaptive feature extraction and recalibration. Proc AAAI Conf Artif Intell. 2020;34:825\u201332.","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"11","key":"9747_CR37","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.1109\/TCSVT.2019.2915238","volume":"30","author":"Y Hu","year":"2019","unstructured":"Hu Y, Li J, Huang Y, Gao X. Channel-wise and spatial feature modulation network for single image super-resolution. IEEE Trans Circuits Syst Video Technol. 2019;30(11):3911\u201327.","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"9747_CR38","doi-asserted-by":"crossref","unstructured":"Su K, Yu D, Xu Z, Geng X, Wang C. Multi-person pose estimation with enhanced channel-wise and spatial information. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019. p. 5674\u20135682.","DOI":"10.1109\/CVPR.2019.00582"},{"issue":"12","key":"9747_CR39","first-page":"310","volume":"6","author":"S Sharma","year":"2017","unstructured":"Sharma S, Sharma S, Athaiya A. Activation functions in neural networks. Towards Data Sci. 2017;6(12):310\u20136.","journal-title":"Towards Data Sci"},{"key":"9747_CR40","unstructured":"Babenko A, Lempitsky V. Aggregating deep convolutional features for image retrieval. 2015. arXiv preprint arXiv:1510.07493."},{"issue":"10","key":"9747_CR41","doi-asserted-by":"publisher","first-page":"2377","DOI":"10.3390\/math11102377","volume":"11","author":"G Yu","year":"2023","unstructured":"Yu G, Zhou X. An improved yolov5 crack detection method combined with a bottleneck transformer. Mathematics. 2023;11(10):2377.","journal-title":"Mathematics"},{"key":"9747_CR42","doi-asserted-by":"crossref","unstructured":"Chauhan R, Deshmukh M, Singh A. Improved squeeze and excitation-based yolov8-se for object detection. In: 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), p. 1\u20137. IEEE; 2024.","DOI":"10.1109\/ICCCNT61001.2024.10725047"},{"issue":"2","key":"9747_CR43","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6501\/ad0de7","volume":"35","author":"Z Xu","year":"2023","unstructured":"Xu Z, Chen Z. Enhancing measurement precision through noise analysis and fringe optimization in white light interferometry. Meas Sci Technol. 2023;35(2):025031.","journal-title":"Meas Sci Technol"},{"issue":"2","key":"9747_CR44","doi-asserted-by":"publisher","first-page":"072","DOI":"10.53022\/oarjst.2022.4.2.0040","volume":"4","author":"MM Amami","year":"2022","unstructured":"Amami MM, El-Turki AM, Rustum AI, El-Amaari IM, Jabir TA. Topographic surveying using low-cost amateur drones & 4k ultra-high-definition videos. Open Access Res J Sci Technol. 2022;4(2):072\u201382.","journal-title":"Open Access Res J Sci Technol"},{"issue":"8","key":"9747_CR45","doi-asserted-by":"publisher","first-page":"2524","DOI":"10.1109\/TCSVT.2019.2927344","volume":"30","author":"RGDA Azevedo","year":"2019","unstructured":"Azevedo RGDA, Birkbeck N, De Simone F, Janatra I, Adsumilli B, Frossard P. Visual distortions in $$360^\\circ $$ videos. IEEE Trans Circuits Syst Video Technol. 2019;30(8):2524\u201337.","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"9747_CR46","doi-asserted-by":"crossref","unstructured":"Lee SB, Gui X, Manquen M, Hamilton ER. Use of training, validation, and test sets for developing automated classifiers in quantitative ethnography. In: Advances in Quantitative Ethnography: First International Conference, ICQE 2019, Madison, WI, USA, October 20\u201322, 2019, Proceedings 1, p. 117\u2013127. Springer; 2019.","DOI":"10.1007\/978-3-030-33232-7_10"},{"issue":"8","key":"9747_CR47","doi-asserted-by":"publisher","first-page":"2187","DOI":"10.1109\/TKDE.2016.2555310","volume":"28","author":"M Jiang","year":"2016","unstructured":"Jiang M, Beutel A, Cui P, Hooi B, Yang S, Faloutsos C. Spotting suspicious behaviors in multimodal data: a general metric and algorithms. IEEE Trans Knowl Data Eng. 2016;28(8):2187\u2013200.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9747_CR48","doi-asserted-by":"crossref","unstructured":"Henderson P, Ferrari V. End-to-end training of object class detectors for mean average precision. In: Computer Vision\u2013ACCV 2016: 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part V 13, p. 198\u2013213. Springer; 2017.","DOI":"10.1007\/978-3-319-54193-8_13"},{"issue":"3","key":"9747_CR49","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSMCC.2004.829274","volume":"34","author":"W Hu","year":"2004","unstructured":"Hu W, Tan T, Wang L, Maybank S. A survey on visual surveillance of object motion and behaviors. IEEE Trans Syst Man Cybern C Appl Rev. 2004;34(3):334\u201352.","journal-title":"IEEE Trans Syst Man Cybern C Appl Rev"},{"issue":"2","key":"9747_CR50","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/3406183","volume":"3","author":"P Andersson","year":"2020","unstructured":"Andersson P, Nilsson J, Akenine-M\u00f6ller T, Oskarsson M, \u00c5str\u00f6m K, Fairchild MD. Flip: a difference evaluator for alternating images. Proc ACM Comput Graph Interact Tech. 2020;3(2):15\u20131.","journal-title":"Proc ACM Comput Graph Interact Tech"},{"key":"9747_CR51","unstructured":"Smith LN. A disciplined approach to neural network hyper-parameters: part 1\u2013learning rate, batch size, momentum, and weight decay. 2018. arXiv preprint arXiv:1803.09820."},{"key":"9747_CR52","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/TIFS.2023.3328269","volume":"19","author":"Y Guo","year":"2023","unstructured":"Guo Y, Zhao Y, Hou S, Wang C, Jia X. Verifying in the dark: verifiable machine unlearning by using invisible backdoor triggers. IEEE Trans Inf Forensics Secur. 2023;19:708\u201321.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9747_CR53","doi-asserted-by":"crossref","unstructured":"Bai Z, Wang M, Guo F, Guo Y, Cai C, Bie R, Jia X. Secmdp: towards privacy-preserving multimodal deep learning in end-edge-cloud. In: 2024 IEEE 40th International Conference on Data Engineering (ICDE), pp. 1659\u20131670. IEEE; 2024.","DOI":"10.1109\/ICDE60146.2024.00135"},{"key":"9747_CR54","doi-asserted-by":"crossref","unstructured":"Wang H, Jiang T, Guo Y, Guo F, Bie R, Jia X. Label noise correction for federated learning: a secure, efficient and reliable realization. In: 2024 IEEE 40th International Conference on Data Engineering (ICDE), p. 3600\u20133612. IEEE; 2024.","DOI":"10.1109\/ICDE60146.2024.00277"},{"issue":"5","key":"9747_CR55","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1109\/TSC.2024.3441471","volume":"17","author":"Y Guo","year":"2024","unstructured":"Guo Y, Xi Y, Zhang Y, Wang M, Wang S, Jia X. Towards efficient and reliable private set computation in decentralized storage. IEEE Trans Services Comput. 2024;17(5):2945\u201358.","journal-title":"IEEE Trans Services Comput"},{"key":"9747_CR56","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3615931","author":"S Xu","year":"2025","unstructured":"Xu S, Chen X, Guo Y, Wang Y, Gao S, Yiu S-M, et al. Towards efficient multi-user access control encrypted search for web data management. IEEE Trans Dependable Secure Comput. 2025. https:\/\/doi.org\/10.1109\/TDSC.2025.3615931.","journal-title":"IEEE Trans Dependable Secure Comput"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09747-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09747-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09747-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T17:03:44Z","timestamp":1762275824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09747-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"references-count":56,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9747"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09747-3","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"29 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The study was approved by the Ethics Institutional Review Board of Beijing Normal University. All experimental protocols were conducted in accordance with the relevant guidelines and regulations, as well as the principles of the Helsinki Declaration.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Informed consent was obtained from all individual participants and\/or their legal guardian(s) for the publication of any identifiable information\/images in an online open-access publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"256"}}