{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:48:13Z","timestamp":1776876493473,"version":"3.51.2"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100016808","name":"Natural Science Foundation of Xiamen Municipality","doi-asserted-by":"publisher","award":["3502Z20227067"],"award-info":[{"award-number":["3502Z20227067"]}],"id":[{"id":"10.13039\/100016808","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Fujian Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2023J011430"],"award-info":[{"award-number":["2023J011430"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115142","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:01:42Z","timestamp":1774972902000},"page":"115142","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["SEMPRA: Secure medical privacy-reversible adversarial framework"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5480-8908","authenticated-orcid":false,"given":"Xiaozhu","family":"Xie","sequence":"first","affiliation":[]},{"given":"Chao","family":"Ouyang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6298-846X","authenticated-orcid":false,"given":"Xia","family":"Du","sequence":"additional","affiliation":[]},{"given":"Jizhe","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chi-Man","family":"Pun","sequence":"additional","affiliation":[]},{"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.asoc.2026.115142_bib0005","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-09101-z","article-title":"Resnet-based image processing approach for precise detection of cracks in photovoltaic panels","volume":"15","author":"Abdelsattar","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115142_bib0010","first-page":"1","article-title":"Advanced machine learning techniques for predicting power generation and fault detection in solar photovoltaic systems","author":"Abdelsattar","year":"2025","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"10.1016\/j.asoc.2026.115142_bib0015","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-98607-7","article-title":"Comparative analysis of machine learning techniques for temperature and humidity prediction in photovoltaic environments","volume":"15","author":"Abdelsattar","year":"2025","journal-title":"Sci. Rep."},{"issue":"1","key":"10.1016\/j.asoc.2026.115142_bib0020","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-96945-0","article-title":"Comparative analysis of automated foul detection in football using deep learning architectures","volume":"15","author":"Rabee","year":"2025","journal-title":"Sci. Rep."},{"issue":"3","key":"10.1016\/j.asoc.2026.115142_bib0025","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3702638","article-title":"Survey on adversarial attack and defense for medical image analysis: methods and challenges","volume":"57","author":"Dong","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"10.1016\/j.asoc.2026.115142_bib0030","doi-asserted-by":"crossref","first-page":"155","DOI":"10.3390\/jimaging8060155","article-title":"Digital watermarking as an adversarial attack on medical image analysis with deep learning","volume":"8","author":"Apostolidis","year":"2022","journal-title":"J. Imaging."},{"key":"10.1016\/j.asoc.2026.115142_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.110078","article-title":"Privacy-preserving federated learning compatible with robust aggregators","volume":"143","author":"Alebouyeh","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.115142_bib0040","series-title":"Proceedings of the 2021 SIAM International Conference on Data Mining (SDM), SIAM","first-page":"208","article-title":"Turning attacks into protection: social media privacy protection using adversarial attacks","author":"Li","year":"2021"},{"key":"10.1016\/j.asoc.2026.115142_bib0045","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"15014","article-title":"Protecting facial privacy: generating adversarial identity masks via style-robust makeup transfer","author":"Hu","year":"2022"},{"key":"10.1016\/j.asoc.2026.115142_bib0050","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"LowKey: leveraging adversarial attacks to protect social media users from facial recognition","author":"Cherepanova","year":"2021"},{"issue":"8","key":"10.1016\/j.asoc.2026.115142_bib0055","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.asoc.2026.115142_bib0060","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.108923","article-title":"Robust convolutional neural networks against adversarial attacks on medical images","volume":"132","author":"Shi","year":"2022","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.asoc.2026.115142_bib0065","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s12880-020-00530-y","article-title":"Universal adversarial attacks on deep neural networks for medical image classification","volume":"21","author":"Hirano","year":"2021","journal-title":"BMC Med. Imaging"},{"key":"10.1016\/j.asoc.2026.115142_bib0070","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.107245","article-title":"Adversarial attack and training for deep neural network based power quality disturbance classification","volume":"127","author":"Zhang","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.115142_bib0075","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2020.104085","article-title":"Adversarial robustness and attacks for multi-view deep models","volume":"97","author":"Sun","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"6","key":"10.1016\/j.asoc.2026.115142_bib0080","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","article-title":"A computational approach to edge detection","volume":"PAMI-8","author":"Canny","year":"1986","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.115142_bib0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.102111","article-title":"Mask-guided noise restriction adversarial attacks for image classification","volume":"100","author":"Duan","year":"2021","journal-title":"Comput. Secur."},{"issue":"5","key":"10.1016\/j.asoc.2026.115142_bib0090","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1016\/j.cell.2018.02.010","article-title":"Identifying medical diagnoses and treatable diseases by image-based deep learning","volume":"172","author":"Kermany","year":"2018","journal-title":"cell"},{"issue":"2","key":"10.1016\/j.asoc.2026.115142_bib0095","doi-asserted-by":"crossref","first-page":"194","DOI":"10.3390\/bioengineering10020194","article-title":"The threat of adversarial attack on a COVID-19 CT image-based deep learning system","volume":"10","author":"Li","year":"2023","journal-title":"Bioengineering"},{"key":"10.1016\/j.asoc.2026.115142_bib0100","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.asoc.2026.115142_bib0105","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2015"},{"key":"10.1016\/j.asoc.2026.115142_bib0110","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"10012","article-title":"Swin transformer: hierarchical vision transformer using shifted windows","author":"Liu","year":"2021"},{"key":"10.1016\/j.asoc.2026.115142_bib0115","series-title":"Proceedings of the 32nd ACM International Conference on Multimedia","first-page":"671","article-title":"DP-RAE: a dual-phase merging reversible adversarial example for image privacy protection","author":"Zhu","year":"2024"},{"key":"10.1016\/j.asoc.2026.115142_bib0120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.patrec.2022.12.018","article-title":"Reversible attack based on adversarial perturbation and reversible data hiding in YUV colorspace","volume":"166","author":"Yin","year":"2023","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.asoc.2026.115142_bib0125","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"10.1016\/j.asoc.2026.115142_bib0130","series-title":"Artificial Intelligence Safety and Security","first-page":"99","article-title":"Adversarial examples in the physical world","author":"Kurakin","year":"2018"},{"key":"10.1016\/j.asoc.2026.115142_bib0135","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2018"},{"key":"10.1016\/j.asoc.2026.115142_bib0140","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"4630","article-title":"Transferable adversarial attack for both vision transformers and convolutional networks via momentum integrated gradients","author":"Ma","year":"2023"},{"key":"10.1016\/j.asoc.2026.115142_bib0145","series-title":"Advances in Neural Information Processing Systems (NeurIPS)","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume":"vol. 25","author":"Krizhevsky","year":"2012"},{"key":"10.1016\/j.asoc.2026.115142_bib0150","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"15244","article-title":"Improving the transferability of targeted adversarial examples through object-based diverse input","author":"Byun","year":"2022"},{"key":"10.1016\/j.asoc.2026.115142_bib0155","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"9185","article-title":"Boosting adversarial attacks with momentum","author":"Dong","year":"2018"},{"key":"10.1016\/j.asoc.2026.115142_bib0160","series-title":"Proceedings of the 28th ACM International Conference on Multimedia","first-page":"1634","article-title":"Adversarial image attacks using multi-sample and most-likely ensemble methods","author":"Du","year":"2020"},{"key":"10.1016\/j.asoc.2026.115142_bib0165","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Ensemble adversarial training: attacks and defenses","author":"Tram\u00e8r","year":"2018"},{"issue":"2","key":"10.1016\/j.asoc.2026.115142_bib0170","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TCSVT.2018.2803303","article-title":"Reversible data hiding in color image with grayscale invariance","volume":"29","author":"Hou","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"10.1016\/j.asoc.2026.115142_bib0175","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","article-title":"Secure, privacy-preserving and federated machine learning in medical imaging","volume":"2","author":"Kaissis","year":"2020","journal-title":"Nat. Mach. Intell."},{"issue":"1","key":"10.1016\/j.asoc.2026.115142_bib0180","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3485133","article-title":"Adversarial machine learning in image classification: a survey toward the defender\u2019s perspective","volume":"55","author":"Machado","year":"2021","journal-title":"ACM Comput. Surv."},{"issue":"6433","key":"10.1016\/j.asoc.2026.115142_bib0185","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1126\/science.aaw4399","article-title":"Adversarial attacks on medical machine learning","volume":"363","author":"Finlayson","year":"2019","journal-title":"Science"},{"key":"10.1016\/j.asoc.2026.115142_bib0190","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2020.107332","article-title":"Understanding adversarial attacks on deep learning based medical image analysis systems","volume":"110","author":"Ma","year":"2021","journal-title":"Pattern Recognit."},{"issue":"11","key":"10.1016\/j.asoc.2026.115142_bib0195","doi-asserted-by":"crossref","first-page":"20757","DOI":"10.1109\/JIOT.2024.3373636","article-title":"RAE-VWP: a reversible adversarial example-based privacy and copyright protection method of medical images for internet of medical things","volume":"11","author":"Chen","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.asoc.2026.115142_bib0200","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/s00530-024-01425-6","article-title":"RA-RevGAN: region-aware reversible adversarial example generation network for privacy-preserving applications","volume":"30","author":"Zhao","year":"2024","journal-title":"Multim. Syst."},{"key":"10.1016\/j.asoc.2026.115142_bib0205","series-title":"International Workshop on Advanced Imaging Technology (IWAIT) 2024","first-page":"202","article-title":"Reversible adversarial image examples with beam search attack and grayscale invariance","volume":"vol. 13164","author":"Zhang","year":"2024"},{"issue":"1","key":"10.1016\/j.asoc.2026.115142_bib0210","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/sdata.2018.161","article-title":"The HAM10000 dataset, a large collection of multi-source dermatoscopic images of common pigmented skin lesions","volume":"5","author":"Tschandl","year":"2018","journal-title":"Sci. Data."},{"key":"10.1016\/j.asoc.2026.115142_bib0215","author":"Codella"},{"key":"10.1016\/j.asoc.2026.115142_bib0220","doi-asserted-by":"crossref","first-page":"132665","DOI":"10.1109\/ACCESS.2020.3010287","article-title":"Can AI help in screening viral and COVID-19 pneumonia?","volume":"8","author":"Chowdhury","year":"2020","journal-title":"Ieee Access"},{"key":"10.1016\/j.asoc.2026.115142_bib0225","doi-asserted-by":"crossref","DOI":"10.1016\/j.compbiomed.2021.104319","article-title":"Exploring the effect of image enhancement techniques on COVID-19 detection using chest x-ray images","volume":"132","author":"Rahman","year":"2021","journal-title":"Comput. Biol. Med."},{"key":"10.1016\/j.asoc.2026.115142_bib0230","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"An image is worth 16x16 words: transformers for image recognition at scale","author":"Dosovitskiy","year":"2021"},{"key":"10.1016\/j.asoc.2026.115142_bib0235","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"321","article-title":"Benchmarking adversarial robustness on image classification","author":"Dong","year":"2020"},{"key":"10.1016\/j.asoc.2026.115142_bib0240","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"4312","article-title":"Evading defenses to transferable adversarial examples by translation-invariant attacks","author":"Dong","year":"2019"},{"key":"10.1016\/j.asoc.2026.115142_bib0245","series-title":"International Conference on Learning Representations (ICLR)","article-title":"Nesterov accelerated gradient and scale invariance for adversarial attacks","author":"Lin","year":"2020"},{"key":"10.1016\/j.asoc.2026.115142_bib0250","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","first-page":"16138","article-title":"Admix: enhancing the transferability of adversarial attacks","author":"Wang","year":"2021"},{"key":"10.1016\/j.asoc.2026.115142_bib0255","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"Liu","year":"2017"},{"issue":"6433","key":"10.1016\/j.asoc.2026.115142_bib0260","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1126\/science.aaw4399","article-title":"Adversarial attacks against medical deep learning systems","volume":"363","author":"Finlayson","year":"2019","journal-title":"Science"},{"key":"10.1016\/j.asoc.2026.115142_bib0265","author":"Das"},{"key":"10.1016\/j.asoc.2026.115142_bib0270","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Mitigating adversarial effects through randomization","author":"Xie","year":"2018"},{"key":"10.1016\/j.asoc.2026.115142_bib0275","author":"Brama"},{"key":"10.1016\/j.asoc.2026.115142_bib0280","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1109\/TIP.2019.2940533","article-title":"Image super-resolution as a defense against adversarial attacks","volume":"29","author":"Mustafa","year":"2019","journal-title":"IEEE Trans. Image Process."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626005909?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626005909?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:07:02Z","timestamp":1776874022000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626005909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":56,"alternative-id":["S1568494626005909"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115142","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SEMPRA: Secure medical privacy-reversible adversarial framework","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115142","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115142"}}