{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T03:18:09Z","timestamp":1777519089208,"version":"3.51.4"},"reference-count":32,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T00:00:00Z","timestamp":1661385600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B010164003"],"award-info":[{"award-number":["2020B010164003"]}]},{"name":"the Science and Technology Program of Guangzhou, China","award":["201904010209"],"award-info":[{"award-number":["201904010209"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2022,12,31]]},"DOI":"10.1080\/09540091.2022.2111406","type":"journal-article","created":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T07:03:11Z","timestamp":1661410991000},"page":"2219-2239","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":8,"title":["A multimodal differential privacy framework based on fusion representation learning"],"prefix":"10.1080","volume":"34","author":[{"given":"Chaoxin","family":"Cai","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, People's Republic of China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2085-4359","authenticated-orcid":false,"given":"Yingpeng","family":"Sang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, People's Republic of China"}]},{"given":"Hui","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Information and Communication Technology, Griffith University, Nathan, Australia"}]}],"member":"301","published-online":{"date-parts":[[2022,8,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.80"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-010-0182-0"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2798607"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476277"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-008-9076-6"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-2197-4_25"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1137\/16M1084717"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_10"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2019.00140"},{"key":"CIT0016","unstructured":"Fan, L. (n.d.). Image pixelization with differential privacy, 14."},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17138-4_6"},{"issue":"1","key":"CIT0018","first-page":"703","volume":"14","author":"Hall R.","year":"2013","journal-title":"The Journal of Machine Learning Research"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102875"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1002\/sapm19287139"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1209"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401260"},{"key":"CIT0023","volume-title":"Programming differential privacy (Chapter 6)","author":"Near J. P.","year":"2021"},{"key":"CIT0024","unstructured":"Ngiam, J., Khosla, A., Kim, M., Nam, J., Lee, H. & Ng, A. Y. (2011). Multimodal deep learning. In Proceedings of the 28th International Conference on Machine Learning (ICML'11) (pp. 689\u2013696). Omnipress."},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663260"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"CIT0027","unstructured":"Wang, T., Blocki, J., Li, N. & Jha, S. (2017). Locally differentially private protocols for frequency estimation. In 26th USENIX Security Symposium (USENIX security 17) (pp. 729\u2013745). USENIX Association."},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8829523"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3089884"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Yue, X., Du, M., Wang, T., Li, Y., Sun, H. & Chow, S. S. (2021). Differential privacy for text analytics via natural text sanitization. In Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021 (pp. 3853\u20133866). Association for Computational Linguistics.","DOI":"10.18653\/v1\/2021.findings-acl.337"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1115"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.94"}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2022.2111406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T15:53:19Z","timestamp":1681746799000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2022.2111406"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,25]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12,31]]}},"alternative-id":["10.1080\/09540091.2022.2111406"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2022.2111406","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"value":"0954-0091","type":"print"},{"value":"1360-0494","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-05-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}