{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:04:34Z","timestamp":1766599474709,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202247"],"award-info":[{"award-number":["62202247"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tcc.2024.3459789","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T17:58:36Z","timestamp":1726163916000},"page":"1260-1272","source":"Crossref","is-referenced-by-count":6,"title":["Generative Adversarial Privacy for Multimedia Analytics Across the IoT-Edge Continuum"],"prefix":"10.1109","volume":"12","author":[{"given":"Xin","family":"Wang","sequence":"first","affiliation":[{"name":"Northeastern University, Shenyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0884-6601","authenticated-orcid":false,"given":"Jianhui","family":"Lv","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6555-3464","authenticated-orcid":false,"given":"Byung-Gyu","family":"Kim","sequence":"additional","affiliation":[{"name":"Sookmyung Women&#x0027;s University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4715-212X","authenticated-orcid":false,"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[{"name":"Secure Cyber Systems Research Group (SCSRG), WMG, University of Warwick, Coventry, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3997-5070","authenticated-orcid":false,"given":"B. D.","family":"Parameshachari","sequence":"additional","affiliation":[{"name":"Meenakshi Institute of Technology, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2542-9842","authenticated-orcid":false,"given":"Adam","family":"Slowik","sequence":"additional","affiliation":[{"name":"Koszalin University of Technology, Koszalin, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-4048","authenticated-orcid":false,"given":"Keqin","family":"Li","sequence":"additional","affiliation":[{"name":"State University of New York, Buffalo, NY, USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s11036-021-01796-4"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.26599\/TST.2021.9010095"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TNSM.2021.3103509"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/JIOT.2022.3187621"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1089\/big.2020.0282"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s11042-021-10513-y"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s11042-022-12466-2"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIFS.2022.3220030"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/COMST.2022.3218527"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TCC.2021.3059448"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MNET.211.2000526"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s10586-022-03755-4"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TETCI.2021.3111636"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TBDATA.2017.2705807"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s11277-021-08268-8"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TBDATA.2017.2702176"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TKDE.2020.3014246"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TKDE.2021.3073062"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3436755"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/3589207"},{"issue":"9","key":"ref21","article-title":"Generative adversarial networks: A survey toward private and secure applications","volume":"54","author":"Cai","year":"2021","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3446374"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TNSE.2021.3139671"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s10586-021-03377-2"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/s11227-023-05412-y"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/JIOT.2021.3077449"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/JIOT.2020.2971325"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/LWC.2019.2950250"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.neucom.2021.10.027"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TSG.2022.3230671"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/3510032"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/s10619-021-07346-x"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TIFS.2019.2897874"},{"key":"ref34","first-page":"1","article-title":"PATE-GAN: Generating synthetic data with differential privacy guarantees","volume-title":"Proc. ICLR Conf.","author":"Jordan"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TIFS.2018.2812146"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3514221.3526190"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TIFS.2020.3032021"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/j.jksuci.2023.01.008"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.tcs.2022.06.032"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/JSYST.2021.3123809"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/LGRS.2019.2918719"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TNNLS.2020.3042537"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/s10489-020-01813-1"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.jnca.2021.103066"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1016\/j.patrec.2021.07.006"},{"year":"2015","author":"Han","article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding","key":"ref46"},{"year":"2017","author":"Ullrich","article-title":"Soft weight-sharing for neural network compression","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/SP.2019.00019"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1016\/j.neucom.2023.02.035"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1016\/j.cviu.2021.103329"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6245519\/10780435\/10679090.pdf?arnumber=10679090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T01:59:49Z","timestamp":1733882389000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":50,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2024.3459789","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}