{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:57:02Z","timestamp":1757627822112,"version":"3.44.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,2]]},"DOI":"10.1109\/iwqos65803.2025.11143293","type":"proceedings-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:29:52Z","timestamp":1757438992000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["PP-DACMR: A Privacy-Preserving Deep Adversarial Hashing for Cross-Modal Retrieval"],"prefix":"10.1109","author":[{"given":"Jinzhi","family":"Ouyang","sequence":"first","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen,China"}]},{"given":"Fuyi","family":"Wang","sequence":"additional","affiliation":[{"name":"RMIT University,Melbourne,Australia"}]},{"given":"Ye","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen,China"}]},{"given":"Jianting","family":"Ning","sequence":"additional","affiliation":[{"name":"Wuhan University,Wuhan,China"}]},{"given":"Leo Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Griffith University,Gold Coast,Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00277"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28376"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615504"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA240477"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2024.3372210"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-25027-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2964412"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056955"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2926968"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3674507"},{"key":"ref11","article-title":"Cross-modal retrieval: a systematic review of methods and future directions","author":"Zhu","year":"2023","journal-title":"arXiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10447-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/sym16081084"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3372278.3390711"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref16","first-page":"809","article-title":"Cheetah: Lean and fast secure \\{Two-Party\\} deep neural network inference","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Huang","year":"2022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2025.3526369"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01064"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.466"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.267"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654901"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3174970"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3233\/faia230560"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103440"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462989"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3613837"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3464760"},{"key":"ref28","author":"Fan","journal-title":"Bad-pfl: Exploring backdoor attacks against personalized federated learning"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3263054"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3545799"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICMC60390.2024.00008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"ref33","first-page":"35","article-title":"Aby3: A mixed protocol framework for machine learning","volume-title":"Proceedings of the 2018 ACM SIGSAC conference on computer and communications security","author":"Mohassel","year":"2018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref36","first-page":"4961","article-title":"Crypten: Secure multi-party computation meets machine learning","volume":"34","author":"Knott","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC55528.2022.9913012"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419418"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-200007"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3156818"},{"key":"ref42","article-title":"Bicoptor 2.0: Addressing challenges in probabilistic truncation for enhanced privacypreserving machine learning","author":"Zhou","year":"2023","journal-title":"arXiv preprint"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_30"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_15"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1460096.1460104"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1646396.1646452"}],"event":{"name":"2025 IEEE\/ACM International Symposium on Quality of Service (IWQoS)","location":"Gold Coast, Australia","start":{"date-parts":[[2025,7,2]]},"end":{"date-parts":[[2025,7,4]]}},"container-title":["2025 IEEE\/ACM 33rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11143240\/11143247\/11143293.pdf?arnumber=11143293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:05:53Z","timestamp":1757480753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11143293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/iwqos65803.2025.11143293","relation":{},"subject":[],"published":{"date-parts":[[2025,7,2]]}}}