{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:53:41Z","timestamp":1772254421759,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Direcci\u00f3n General de Investigaci\u00f3n, Innovaci\u00f3n y Postgrado through the Security in Cyber-Physical Systems for Power Grids Project, Federico Santa Mar\u00eda Technical University, Chile","award":["UTFSM-DGIP PI.L.17.15"],"award-info":[{"award-number":["UTFSM-DGIP PI.L.17.15"]}]},{"name":"Advanced Center for Electrical and Electronic Engineering CONICYT-Basal Project","award":["FB0008"],"award-info":[{"award-number":["FB0008"]}]},{"name":"Microsoft Azure for Research","award":["0518798"],"award-info":[{"award-number":["0518798"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2017.2787422","type":"journal-article","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T19:30:05Z","timestamp":1514403005000},"page":"8029-8041","source":"Crossref","is-referenced-by-count":31,"title":["Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1077-4790","authenticated-orcid":false,"given":"Ahmed M.","family":"Elmisery","sequence":"first","affiliation":[]},{"given":"Mirela","family":"Sertovic","sequence":"additional","affiliation":[]},{"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2005.1458323"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2514\/6.2012-2544"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-015-0789-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6116285"},{"key":"ref31","first-page":"54","article-title":"Dynamic fire 3D modeling using a real-time stereovision system","volume":"6","author":"lucile","year":"2009","journal-title":"J Commun Comput"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/S0167-8655(01)00135-0","article-title":"Flame recognition in video","volume":"23","author":"iii","year":"2002","journal-title":"Pattern Recognit Lett"},{"key":"ref37","first-page":"9","article-title":"Remotely piloted vehicles as fire imaging platforms: The future is here","volume":"11","author":"ambrosia","year":"2002","journal-title":"Wildfire Mag"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9707-1_73"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2737\/PSW-GTR-105"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1139\/cjfr-2014-0347"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.firesaf.2011.03.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/12.2001624"},{"key":"ref29","article-title":"Multi-modal video analysis for early fire detection","author":"verstockt","year":"2011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5772\/28441"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066860"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066163"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s110606328"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.07.002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2012.0056"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1088\/0957-0233\/22\/12\/125504"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2009.2024147"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180416"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"ref10","article-title":"MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks","author":"storm","year":"2015"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73958-6_8"},{"key":"ref11","first-page":"10","article-title":"Enhanced middleware for collaborative privacy in IPTV recommender services","volume":"2","author":"elmisery","year":"2011","journal-title":"J Converg"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2011.5941096"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1067-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/13614568.2014.889222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2631546"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/406940"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4950-0"},{"key":"ref18","first-page":"161","article-title":"Experimental demonstration of a hybrid privacy-preserving recommender system","author":"esma","year":"2008","journal-title":"Proc ARES"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"ref4","article-title":"Mix, match, and mutate","author":"hof","year":"2005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.123"},{"key":"ref6","first-page":"57","article-title":"&#x2019;I didn&#x2019;t buy it for myself&#x2019;: Privacy and ecommerce personalization","author":"cranor","year":"2003","journal-title":"Proc ACM Workshop Privacy Electron Soc"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"ref7","year":"2001","journal-title":"Cyber Dialogue Survey Data Reveals Lost Revenue for Retailers Due to Widespread Consumer Privacy Concerns"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45053-X_48"},{"key":"ref9","first-page":"34","article-title":"On the feasibility of side-channel attacks with brain-computer interfaces","author":"martinovic","year":"2012","journal-title":"Proc 21st USENIX Conf Security Symp"},{"key":"ref46","first-page":"4","article-title":"Naive (Bayes) at forty: The independence assumption in information retrieval","author":"lewis","year":"1998","journal-title":"Proc 10th Eur Conf Mach Learn"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.06.052"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1400815"},{"key":"ref47","first-page":"2957","article-title":"Non-local image smoothing by applying anisotropic diffusion PDE&#x2019;s in the space of patches","author":"tschumperl\u00e9","year":"2009","journal-title":"Proc ICIP"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-9707-1_74"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-011-9560-x"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244092"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08240886.pdf?arnumber=8240886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T03:00:17Z","timestamp":1633921217000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8240886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2787422","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}