{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T22:33:54Z","timestamp":1767911634817,"version":"3.49.0"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Open Foundation for the University Innovation Platform in the Hunan Province","award":["16K013"],"award-info":[{"award-number":["16K013"]}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2017JJ2016"],"award-info":[{"award-number":["2017JJ2016"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"name":"2016 Science Research Project of Hunan Provincial Department of Education","award":["16C0269"],"award-info":[{"award-number":["16C0269"]}]},{"name":"Accurate Crawler Design and Implementation with a Data Cleaning Function, National Students Innovation and Entrepreneurship of Training Program","award":["201811532010"],"award-info":[{"award-number":["201811532010"]}]},{"name":"2011 Collaborative Innovation Center for Development and Utilization of Finance and Economics Big Data Property, Universities of Hunan Province"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2896284","type":"journal-article","created":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T20:41:03Z","timestamp":1548880863000},"page":"38162-38167","source":"Crossref","is-referenced-by-count":1,"title":["Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2207-1681","authenticated-orcid":false,"given":"Sun","family":"Guang","sequence":"first","affiliation":[]},{"given":"F.","family":"Xiaoping","sequence":"additional","affiliation":[]},{"given":"J.","family":"Wangdong","sequence":"additional","affiliation":[]},{"given":"L.","family":"Fenghua","sequence":"additional","affiliation":[]},{"given":"J.","family":"Yuewei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2017.02.005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0208-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43862-6_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810058"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.59"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2386290"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685434"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2760830"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2539698"},{"key":"ref19","first-page":"7","article-title":"A framework for obfuscated interpretation","volume":"32","author":"monden","year":"2004","journal-title":"Proc 2nd Workshop Australas Inf Secur Data Mining Web Intell Softw Internationalisation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/fi4020469"},{"key":"ref3","first-page":"109","article-title":"An analysis of security issues for cloud computing","volume":"4","author":"keiko","year":"2013","journal-title":"J Internet Services Appl"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.280"},{"key":"ref5","first-page":"865","article-title":"Software watermarking for java program based on method name encoding","author":"chen","year":"2017","journal-title":"Advanced Intelligent Systems and Informatics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2015.410.418"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5373-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1088"},{"key":"ref1","year":"2018","journal-title":"Top Threats to Cloud Computing Deep Dive"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/17061-7468"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICAECC.2014.7002457"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454508"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08629870.pdf?arnumber=8629870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:43Z","timestamp":1628624443000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8629870\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2896284","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}