{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:48:04Z","timestamp":1756309684456,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cns.2017.8228627","type":"proceedings-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T19:55:49Z","timestamp":1513886149000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["CAPIA: Cloud assisted privacy-preserving image annotation"],"prefix":"10.1109","author":[{"given":"Yifan","family":"Tian","sequence":"first","affiliation":[]},{"given":"Yantian","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Jiawei","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218593"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2015.104"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2009.03.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-010-0338-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2014.6804228"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583030"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1090\/conm\/026\/737400","article-title":"Extensions of lipschitz mappings into a hilbert space","volume":"26","author":"william","year":"1984","journal-title":"Contemporary Mathematics"},{"journal-title":"The labelme dataset","year":"2017","author":"science","key":"ref15"},{"journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","year":"2006","author":"bishop","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","author":"katz","year":"2007","journal-title":"Chapter 11 Introduction to Modern Cryptography"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544870"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/ACCESS.2014.2307057","article-title":"Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization","volume":"2","author":"lu","year":"2014","journal-title":"Access IEEE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33712-3_60"},{"journal-title":"Protecting Data Using Encryption","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2204272"},{"key":"ref5","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Advances in Cryptology - Eurocrypt"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484322"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"journal-title":"Encrypt your files in your dropbox","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"journal-title":"How many digital photos will be taken in 2017","year":"2016","author":"llc","key":"ref1"},{"key":"ref20","article-title":"Numpy","author":"developers","year":"2013","journal-title":"NumPy Numpy Scipy Developers"},{"journal-title":"PyWavelets - Wavelet Transforms in Python","year":"0","author":"wasilewski","key":"ref22"},{"key":"ref21","first-page":"120","article-title":"The opencv library","volume":"25","author":"bradski","year":"2000","journal-title":"DOCTOR DOBBS JOURNAL"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.06.001"},{"key":"ref23","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0090-8"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1109\/CVPR.2006.58","article-title":"Annosearch: Image auto-annotation by search","volume":"2","author":"wang","year":"2006","journal-title":"Computer Vision and Pattern Recognition 2006 IEEE Computer Society Conference on"}],"event":{"name":"2017 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2017,10,9]]},"location":"Las Vegas, NV","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170165\/8228604\/08228627.pdf?arnumber=8228627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T00:24:09Z","timestamp":1693355049000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8228627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cns.2017.8228627","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}