{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:48:56Z","timestamp":1725601736867},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icme46284.2020.9102960","type":"proceedings-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T17:40:07Z","timestamp":1591724407000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Privacy-Preserving Scheme For Convolutional Neural Network-Based Applications In Mobile Cloud"],"prefix":"10.1109","author":[{"given":"Chang","family":"Xia","sequence":"first","affiliation":[]},{"given":"Jingyu","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Tong","sequence":"additional","affiliation":[]},{"given":"Yayuan","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00139"},{"article-title":"Mobile sensing through deep learning 2017","year":"0","author":"zeng","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref14","article-title":"Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers","author":"ateniese","year":"2013","journal-title":"arXiv preprint arXiv 1306 4447"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref16","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","author":"fredrikson","year":"2014","journal-title":"Usenix Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref18","article-title":"C ir cnn: accelerating and compressing deep neural networks using block-circulant weight matrices","author":"ding","year":"2017","journal-title":"Micro"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080215"},{"key":"ref4","article-title":"Hiding images in plain sight: Deep steganography","author":"baluja","year":"2017","journal-title":"NIPS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71273-4_19"},{"key":"ref6","article-title":"Notjust privacy: Improving performance of private deep learning in mobile cloud","author":"wang","year":"2018","journal-title":"KDD"},{"key":"ref5","article-title":"Image super-resolution using deep convolutional networks","author":"dong","year":"2015","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"ref7","article-title":"Evaluating differentially private machine learning in practice","author":"jayaraman","year":"2019","journal-title":"Usenix Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098086"},{"key":"ref9","article-title":"Federated multi-task learning","author":"smith","year":"2017","journal-title":"NIPS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"ref22","article-title":"Attriguard: A practical defense against attribute inference attacks via adversarial machine learning","author":"jia","year":"2018","journal-title":"Usenix Security"},{"key":"ref21","article-title":"Privacy against statistical inference","author":"du","year":"2012","journal-title":"Allerton"}],"event":{"name":"2020 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2020,7,6]]},"location":"London, United Kingdom","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9099125\/9102711\/09102960.pdf?arnumber=9102960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:15:28Z","timestamp":1656360928000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9102960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icme46284.2020.9102960","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}