{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:12:12Z","timestamp":1776183132672,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/icccn65249.2025.11133824","type":"proceedings-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:20Z","timestamp":1756489160000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Selective Encryption for Surveillance Videos via Hierarchical Grading and YOLO Detection"],"prefix":"10.1109","author":[{"given":"Weihao","family":"Wang","sequence":"first","affiliation":[{"name":"Qingdao University,College of Computer Science and Technology,Qingdao,China,266071"}]},{"given":"Hequn","family":"Xian","sequence":"additional","affiliation":[{"name":"Qingdao University,College of Computer Science and Technology,Qingdao,China,266071"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3135352"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106904"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3482289"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3470110"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2024.3521724"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3413770"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3545788"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.0150172"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3376572"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114681"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3543824"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114958"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3672568"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2024.06.016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00648-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102734"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3015500"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-022-01037-y"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-024-09368-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2200611"}],"event":{"name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","location":"Tokyo, Japan","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,7]]}},"container-title":["2025 34th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11133715\/11133717\/11133824.pdf?arnumber=11133824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:38:02Z","timestamp":1756532282000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccn65249.2025.11133824","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}