{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:29:51Z","timestamp":1764937791947,"version":"3.37.3"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"JSPS KAKENHI","award":["JP21H04907","JP21H01327","23K19983","JP24H00732"],"award-info":[{"award-number":["JP21H04907","JP21H01327","23K19983","JP24H00732"]}]},{"name":"JST CREST through including AIP Challenge Program","award":["JPMJCR18A6","JPMJCR20D3"],"award-info":[{"award-number":["JPMJCR18A6","JPMJCR20D3"]}]},{"name":"JST AIP Acceleration","award":["JPMJCR24U3"],"award-info":[{"award-number":["JPMJCR24U3"]}]},{"name":"JST K Program, Japan","award":["JPMJKP24C2"],"award-info":[{"award-number":["JPMJKP24C2"]}]},{"name":"Project for the development and demonstration of countermeasures against disinformation and misinformation on the Internet with the Ministry of Internal Affairs and Communications of Japan"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3454199","type":"journal-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:34:18Z","timestamp":1725561258000},"page":"126415-126425","source":"Crossref","is-referenced-by-count":2,"title":["On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0036-6577","authenticated-orcid":false,"given":"April Pyone","family":"Maung Maung","sequence":"first","affiliation":[{"name":"National Institute of Informatics, Chiyoda-ku, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4908-1860","authenticated-orcid":false,"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[{"name":"National Institute of Informatics, Chiyoda-ku, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8061-3090","authenticated-orcid":false,"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Tokyo Metropolitan University, Hino-shi, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2291625"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-75562-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1861-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/841045"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PCS.2015.7170059"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2018.8448772"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959017"},{"key":"ref9","first-page":"1","article-title":"Block-wise scrambled image recognition using adaptation network","volume-title":"Proc. Workshop Artif. Intell. Things (AAAI-WS)","author":"Madono"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2022.3168441"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO55093.2022.9909972"},{"key":"ref12","first-page":"191","article-title":"Health insurance portability and accountability act of 1996","volume":"104","author":"Act","year":"1996","journal-title":"Public Law"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref14","article-title":"NeuraCrypt: Hiding private health data via random neural networks for public training","author":"Yala","year":"2021","journal-title":"arXiv:2106.02484"},{"key":"ref15","article-title":"Attacks on image encryption schemes for privacy-preserving deep neural networks","author":"Chang","year":"2020","journal-title":"arXiv:2004.13263"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3112684"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074968"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPAASC55919.2022.9980347"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref20","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","author":"Radford","year":"2021","journal-title":"Proc. ICML"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447103"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.4108"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419420"},{"key":"ref28","first-page":"1","article-title":"Federated learning: Strategies for improving communication efficiency","volume-title":"Proc. NIPS Workshop Private Multi-Party Mach. Learn.","author":"Kone{\u010d}n{\\`y}"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref32","first-page":"26409","article-title":"Enabling fast differentially private SGD via just-in-time compilation and vectorization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Subramani"},{"key":"ref33","first-page":"19680","article-title":"Fast and memory efficient differentially private-SGD via JL projections","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Bu"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1561\/116.00000048"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging8090233"},{"key":"ref36","first-page":"2709","article-title":"Block-wise image transformation with secret key for adversarially robust defense","volume":"16","author":"MaungMaung","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2021.9"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1561\/116.00000013"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2022MUP0002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178165"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.2238"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2018.8486525"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952538"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019487"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017MUP0001"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00232"},{"key":"ref47","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"34","author":"Dhariwal"},{"key":"ref48","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sohl-Dickstein"},{"key":"ref49","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00355"},{"key":"ref52","article-title":"Classifier-free diffusion guidance","author":"Ho","year":"2022","journal-title":"arXiv:2207.12598"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref56","first-page":"1","article-title":"Progressive growing of GANs for improved quality, stability, and variation","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Karras"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref58","article-title":"LAION-5B: An open large-scale dataset for training next generation image-text models","author":"Schuhmann","year":"2022","journal-title":"arXiv:2210.08402"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00132"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref61","first-page":"1","article-title":"Decoupled weight decay regularization","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Loshchilov"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10666663.pdf?arnumber=10666663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T06:33:38Z","timestamp":1726641218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10666663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3454199","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}