{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:24:56Z","timestamp":1774160696542,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/jiot.2017.2732735","type":"journal-article","created":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T18:09:40Z","timestamp":1501178980000},"page":"2896-2903","source":"Crossref","is-referenced-by-count":75,"title":["Privacy-Preserving Double-Projection Deep Computation Model With Crowdsourcing on Cloud for Big Data Feature Learning"],"prefix":"10.1109","volume":"5","author":[{"given":"Qingchen","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7986-4244","authenticated-orcid":false,"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9209-2189","authenticated-orcid":false,"given":"Zhikui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]},{"given":"M. Jamal","family":"Deen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SocialSec2015.10"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.96"},{"key":"ref30","first-page":"238","article-title":"Personal health records integrity verification using attribute based proxy signature in cloud computing","author":"liu","year":"2013","journal-title":"Proc Int Conf Internet Distrib Comput Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2581593"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2016.2601934"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2684807"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.08.135"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/430814"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.309"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2015.069871"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2969-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3107956"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2701816"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2375793"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2304728"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2432120"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2711040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.04.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNANO.2011.941951"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2779"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2672554"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2007.911765"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6122530"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600719"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218385"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-015-0856-x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2325029"},{"key":"ref22","first-page":"689","article-title":"Multimodal deep learning","author":"ngiam","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2497705"},{"key":"ref23","first-page":"2222","article-title":"Multimodal learning with deep Boltzmann machines","author":"srivastava","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2227738"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470255"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8430490\/07994599.pdf?arnumber=7994599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:42:39Z","timestamp":1643211759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7994599\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2017.2732735","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}