{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:36:52Z","timestamp":1729636612464,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybconf.2017.7985756","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T20:38:12Z","timestamp":1500583092000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["An ELM-Based Privacy Preserving Protocol for Implementing Aware Agents"],"prefix":"10.1109","author":[{"given":"Masato","family":"Hashimoto","sequence":"first","affiliation":[]},{"given":"Qiangfu","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Bottle","year":"2014","author":"hellkamp","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2168604"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","article-title":"Extreme learning machine: theory and applications","volume":"70","author":"guang-bin","year":"2006","journal-title":"Neurocomputing"},{"journal-title":"UCI Machine Learning Repository","year":"2013","author":"lichman","key":"ref6"},{"key":"ref5","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume":"48","author":"nathan","year":"2016","journal-title":"International Conference on Machine Learning ICML"},{"journal-title":"SciPy Open source scientifictools for Python","year":"2001","author":"jones","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2011.37"},{"key":"ref2","article-title":"An ELM-based privacy preserving protocol for cloud sysetms","author":"masato","year":"2016","journal-title":"IEEE Symposium Series on Computational Intelligence"},{"key":"ref1","article-title":"Stealing machine learning models via prediction apis","author":"florian","year":"2016","journal-title":"Usenix Security"},{"key":"ref9","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Resaerch"}],"event":{"name":"2017 3rd IEEE International Conference on Cybernetics (CYBCONF)","start":{"date-parts":[[2017,6,21]]},"location":"Exeter, United Kingdom","end":{"date-parts":[[2017,6,23]]}},"container-title":["2017 3rd IEEE International Conference on Cybernetics (CYBCONF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7984317\/7985735\/07985756.pdf?arnumber=7985756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:37:16Z","timestamp":1569908236000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7985756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cybconf.2017.7985756","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}