{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T18:29:15Z","timestamp":1775586555772,"version":"3.50.1"},"reference-count":109,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"CCF-AFSG Research Fund","award":["RF20210007"],"award-info":[{"award-number":["RF20210007"]}]},{"name":"Open Research Projects of the Zhejiang Lab","award":["2021KE0AB04"],"award-info":[{"award-number":["2021KE0AB04"]}]},{"DOI":"10.13039\/501100012456","name":"National Social Science Fund of China","doi-asserted-by":"publisher","award":["19ZDA104"],"award-info":[{"award-number":["19ZDA104"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012456","name":"National Social Science Fund of China","doi-asserted-by":"publisher","award":["20AZD089"],"award-info":[{"award-number":["20AZD089"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Brain Machine Collaborative Intelligence of Zhejiang Province","award":["2020E10010-01"],"award-info":[{"award-number":["2020E10010-01"]}]},{"DOI":"10.13039\/501100019537","name":"Science Fund for Distinguished Young Scholars of Hubei Province","doi-asserted-by":"publisher","award":["2020CFA050"],"award-info":[{"award-number":["2020CFA050"]}],"id":[{"id":"10.13039\/501100019537","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Center","award":["UMO-2016\/20\/W\/NZ4\/00354"],"award-info":[{"award-number":["UMO-2016\/20\/W\/NZ4\/00354"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1109\/tcss.2022.3184818","type":"journal-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:34:45Z","timestamp":1656362085000},"page":"2312-2324","source":"Crossref","is-referenced-by-count":57,"title":["Privacy-Preserving Brain\u2013Computer Interfaces: A Systematic Review"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5280-2035","authenticated-orcid":false,"given":"Kun","family":"Xia","sequence":"first","affiliation":[{"name":"Ministry of Education Key Laboratory of Image Processing and Intelligent Control, School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7882-4729","authenticated-orcid":false,"given":"Wlodzislaw","family":"Duch","sequence":"additional","affiliation":[{"name":"Department of Informatics, Neurocognitive Laboratory, Center for Modern Interdisciplinary Technologies, School of Physics, Astronomy and Informatics, Nicolaus Copernicus University, Toru&#x0144;, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6666-8586","authenticated-orcid":false,"given":"Yu","family":"Sun","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory for Biomedical Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9059-3860","authenticated-orcid":false,"given":"Kedi","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang Lab, Hangzhou, China"}]},{"given":"Weili","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Civil and Hydraulic Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Hanbin","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Civil and Hydraulic Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Public Administration, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Dong","family":"Sang","sequence":"additional","affiliation":[{"name":"NetsUnion Clearing Corporation, Beijing, China"}]},{"given":"Xiaodong","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Public Administration, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9185-3989","authenticated-orcid":false,"given":"Fei-Yue","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Management and Control of Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7153-9703","authenticated-orcid":false,"given":"Dongrui","family":"Wu","sequence":"additional","affiliation":[{"name":"Ministry of Education Key Laboratory of Image Processing and Intelligent Control, School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2021.3052811"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2020.2973434"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2008.2008250"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/srep38580"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3233\/JAD-161037"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949062"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.369"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139559"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC.2018.00022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105932"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346884"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.026"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/551159a"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.4240"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2560\/12\/5\/056019"},{"key":"ref16","article-title":"Brainprint: Identifying unique features of neural activity with machine learning","volume-title":"Proc. Annu. Meeting Cognit. Sci. Soc.","author":"Ruiz-Blondet"},{"key":"ref17","first-page":"143","article-title":"On the feasibility of side-channel attacks with brain-computer interfaces","volume-title":"Proc. 21st USENIX Secur. Symp.","author":"Martinovic"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_12"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWW-BCI.2018.8311515"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/hbm.20320"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2010.5626324"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12162"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/pls.2017.25"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-96193-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0010847"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2021.3059043"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450031"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsycho.2016.12.016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpsycho.2021.06.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/adb.12484"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2019.2908955"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489592"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477452"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.96"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2536479"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_2"},{"key":"ref40","article-title":"Defeating image obfuscation with deep learning","author":"McPherson","year":"2016","journal-title":"arXiv:1609.00408"},{"key":"ref41","first-page":"515","article-title":"P3: Toward privacy-preserving photo sharing","volume-title":"Proc. 10th USENIX Symp. Netw. Syst. Design Implement.","author":"Ra"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2754249"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.77"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363951"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594132"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/aab2f2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2020.3007453"},{"key":"ref48","first-page":"6028","article-title":"Do we really need to access the source data? Source hypothesis transfer for unsupervised domain adaptation","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Liang"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2897554"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1360\/nso\/20220023"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI44817.2019.9002719"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwaa233"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36708-4_39"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/ac0f4c"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM.2018.8621531"},{"key":"ref59","first-page":"1","volume-title":"BCI competition 2008\u2014Graz data set A","volume":"16","author":"Brunner","year":"2008"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2013.00732"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TAMD.2015.2431497"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206006"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3035520"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.032"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"ref66","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285190"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2018.2794611"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"ref72","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Ohrimenko"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134095"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621861"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2019.2926965"},{"key":"ref76","article-title":"Privacy-preserving machine learning through data obfuscation","author":"Zhang","year":"2018","journal-title":"arXiv:1807.01860"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i1.612"},{"key":"ref81","first-page":"1069","article-title":"Differentially private empirical risk minimization","volume":"12","author":"Chaudhuri","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8829523"},{"key":"ref83","article-title":"Privacy-preserving aggregation of time-series data","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Shi"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1897438"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2020.3042574"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.14"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.76"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btz373"},{"key":"ref89","first-page":"1486","article-title":"Deep generative image models using a Laplacian pyramid of adversarial networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Denton"},{"key":"ref90","article-title":"Generative models for simulating mobility trajectories","author":"Kulkarni","year":"2018","journal-title":"arXiv:1811.12801"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451239"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2855136"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9206683"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00023"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00883"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737510"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/INVENTIVE.2016.7824799"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/app11167360"},{"key":"ref101","article-title":"Towards privacy-preserving explanations in medical image analysis","author":"Montenegro","year":"2021","journal-title":"arXiv:2107.09652"},{"key":"ref102","volume-title":"Niedermeyers Electroencephalography Basic Principles, Clinical Applications, and Related Fields","author":"Schomer","year":"2017"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2019.2913914"},{"key":"ref105","article-title":"Unsupervised domain adaptation of black-box source models","author":"Zhang","year":"2021","journal-title":"arXiv:2101.02839"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.2988525"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC44109.2020.9175344"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s12021-021-09525-8"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10268617\/09808103.pdf?arnumber=9808103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:35:19Z","timestamp":1706765719000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9808103\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":109,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2022.3184818","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10]]}}}