{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:28:13Z","timestamp":1758709693129,"version":"3.37.3"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004147","name":"Tsinghua University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9839218","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:37:11Z","timestamp":1660246631000},"page":"5633-5638","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-Preserving DNN Model Authorization against Model Theft and Feature Leakage"],"prefix":"10.1109","author":[{"given":"Qiushi","family":"Li","sequence":"first","affiliation":[{"name":"Tsinghua University,BNRist,Department of Computer Science and Technology"}]},{"given":"Ju","family":"Ren","sequence":"additional","affiliation":[{"name":"Tsinghua University,BNRist,Department of Computer Science and Technology"}]},{"given":"Yuezhi","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University,BNRist,Department of Computer Science and Technology"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University,BNRist,Department of Computer Science and Technology"}]}],"member":"263","reference":[{"article-title":"Towards deep neural network training on encrypted data","year":"0","author":"k","key":"ref10"},{"journal-title":"The Algorithmic Foundations of Differential Privacy","year":"0","author":"c","key":"ref11"},{"article-title":"Differentially Private Federated Learning: A Client Level Perspective","year":"0","author":"g","key":"ref12"},{"journal-title":"Deep Learning with Differential Privacy","year":"0","author":"a","key":"ref13"},{"article-title":"Towards efficient and privacy-preserving federated deep learning","year":"0","author":"m","key":"ref14"},{"journal-title":"Applications of the principle of maximum entropy from physics to ecology","year":"0","author":"j","key":"ref15"},{"journal-title":"mia A library for running membership inference attacks against ML models","year":"2018","author":"kulynych","key":"ref16"},{"article-title":"A survey on homomorphic encryption schemes: Theory and implementation","year":"0","author":"a","key":"ref4"},{"article-title":"Deep Models under the GAN: Information leakage from collaborative deep learning","year":"0","author":"b","key":"ref3"},{"article-title":"Delphi: A cryptographic inference service for neural networks","year":"0","author":"m","key":"ref6"},{"article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","year":"0","author":"s","key":"ref5"},{"article-title":"Practical secure aggregation for privacy-preserving machine learning","year":"0","author":"b","key":"ref8"},{"article-title":"Blind justice: Fairness with encrypted sensitive attributes","year":"0","author":"k","key":"ref7"},{"article-title":"Invisiblefl: Federated learning over non-informative intermediate updates against multimedia privacy leakages","year":"0","author":"l","key":"ref2"},{"year":"2021","key":"ref1","article-title":"Ai model marketplace"},{"article-title":"Aby3: A mixed protocol framework for machine learning","year":"0","author":"m","key":"ref9"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","start":{"date-parts":[[2022,5,16]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09839218.pdf?arnumber=9839218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T20:05:38Z","timestamp":1663013138000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9839218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9839218","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}