{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T14:50:03Z","timestamp":1762095003179,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,21]]},"DOI":"10.1109\/pst58708.2023.10320167","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:06:27Z","timestamp":1700679987000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Selective EEG Signal Anonymization using Multi-Objective Autoencoders"],"prefix":"10.1109","author":[{"given":"Girijesh","family":"Singh","sequence":"first","affiliation":[{"name":"Lakehead University,Department of Computer Science,Thunder Bay,Ontario,Canada"}]},{"given":"Palak","family":"Patel","sequence":"additional","affiliation":[{"name":"Lakehead University,Department of Computer Science,Thunder Bay,Ontario,Canada"}]},{"given":"Muhammad","family":"Asaduzzaman","sequence":"additional","affiliation":[{"name":"Lakehead University,Department of Computer Science,Thunder Bay,Ontario,Canada"}]},{"given":"Garima","family":"Bajwa","sequence":"additional","affiliation":[{"name":"Lakehead University,Department of Computer Science,Thunder Bay,Ontario,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2016.2628861"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clinph.2008.03.034"},{"key":"ref3","article-title":"Brain computer interface anonymizer","volume-title":"United States Patent Application Publication","author":"Howard","year":"2014"},{"year":"2023","key":"ref4","article-title":"Emotiv epoc+ 14-channel wireless eeg headset"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2020.3019849"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2018.2838158"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2019.2926965"},{"article-title":"On the feasibility of side- channel attacks with brain- computer interfaces","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Martinovic","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/10.64464"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.06.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/86.895948"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2019.8848115"},{"key":"ref13","first-page":"103494","article-title":"One-dimensional convolutional neural network architecture for classification of mental tasks from electroencephalogram","volume-title":"Biomedical Signal Processing and Control","volume":"74","author":"Saini","year":"2022"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR52729.2023.01389","article-title":"High-resolution image reconstruction with latent diffusion models from human brain activity","author":"Takagi","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-06527-7"},{"issue":"16","key":"ref16","article-title":"Privacy preserving classification of eeg data using machine learning and homomorphic encryption","volume-title":"Applied Sciences","volume":"11","author":"Popescu","year":"2021"},{"key":"ref17","first-page":"44","article-title":"A survey on privacy preserving time-series data mining","volume-title":"3rd International Conference on Intelligent Computational Systems (ICICS2013)","author":"Hong"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066163"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/s021848850200165x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.249"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3485557.3485581"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.026"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00204"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310068"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453534"},{"key":"ref26","first-page":"55","article-title":"Inexpensive brainwave authentication: New techniques and insights on user acceptance","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Arias-Cabarcos"}],"event":{"name":"2023 20th Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2023,8,21]]},"location":"Copenhagen, Denmark","end":{"date-parts":[[2023,8,23]]}},"container-title":["2023 20th Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10320127\/10319983\/10320167.pdf?arnumber=10320167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T20:53:05Z","timestamp":1709412785000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10320167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,21]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/pst58708.2023.10320167","relation":{},"subject":[],"published":{"date-parts":[[2023,8,21]]}}}