{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:12:35Z","timestamp":1774685555354,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"JSPS KAKENHI","award":["JP21H01327"],"award-info":[{"award-number":["JP21H01327"]}]},{"name":"JST CREST","award":["JPMJCR20D3"],"award-info":[{"award-number":["JPMJCR20D3"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE MultiMedia"],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1109\/mmul.2022.3168441","type":"journal-article","created":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T19:30:56Z","timestamp":1650396656000},"page":"23-33","source":"Crossref","is-referenced-by-count":38,"title":["Privacy-Preserving Image Classification Using an Isotropic Network"],"prefix":"10.1109","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0036-6577","authenticated-orcid":false,"given":"MaungMaung","family":"AprilPyone","sequence":"first","affiliation":[{"name":"Tokyo Metropolitan University, Hachioji, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8061-3090","authenticated-orcid":false,"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University, Hachioji, Japan"}]}],"member":"263","reference":[{"key":"ref10","first-page":"4507","article-title":"Instahide: Instance-hiding schemes for private distributed learning","author":"huang","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref11","article-title":"Neuracrypt: Hiding private health data via random neural networks for public training","author":"yala","year":"2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00099"},{"key":"ref13","article-title":"Neuracrypt is not private","author":"carlini","year":"2021"},{"key":"ref14","article-title":"Patches are all you need","author":"trockman","year":"2022","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref15","article-title":"An image is worth 16&#x00D7;16 words: Transformers for image recognition at scale","author":"dosovitskiy","year":"0","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref16","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref17","article-title":"A smaller subset of 10 easily classified classes from Imagenet, and a little more french","author":"howard","year":"2019"},{"key":"ref18","article-title":"Attacks on image encryption schemes for privacy-preserving deep neural networks","author":"chang","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3112684"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2018.8448772"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/116.00000048"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959017"},{"key":"ref5","article-title":"Block-wise scrambled image recognition using adaptation network","author":"madono","year":"0","journal-title":"Workshop Artif Intell Things"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3062977"},{"key":"ref2","first-page":"1310","article-title":"Privacy-preserving deep learning","author":"shokri","year":"0","journal-title":"Proc 22nd ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref1","first-page":"1","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n?","year":"0","journal-title":"NIPS Workshop on Private Multi-Party Machine Learning PMPML '16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"}],"container-title":["IEEE MultiMedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/93\/9830637\/09760030.pdf?arnumber=9760030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:24:39Z","timestamp":1661808279000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9760030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":20,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mmul.2022.3168441","relation":{},"ISSN":["1070-986X","1941-0166"],"issn-type":[{"value":"1070-986X","type":"print"},{"value":"1941-0166","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,1]]}}}