{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:32Z","timestamp":1775912732241,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Huawei Technologies Canada"},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/tdsc.2023.3326299","type":"journal-article","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T20:01:20Z","timestamp":1699300880000},"page":"3422-3438","source":"Crossref","is-referenced-by-count":8,"title":["Data Protection: Privacy-Preserving Data Collection With Validation"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3340-8585","authenticated-orcid":false,"given":"Jiahui","family":"Hou","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2595-6757","authenticated-orcid":false,"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3769-7211","authenticated-orcid":false,"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0488-511X","authenticated-orcid":false,"given":"Weihua","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4140-287X","authenticated-orcid":false,"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Rob","family":"Sun","sequence":"additional","affiliation":[{"name":"Huawei Technologies Canada, Ottawa, ON, Canada"}]},{"given":"Bidi","family":"Ying","sequence":"additional","affiliation":[{"name":"Huawei Technologies Canada, Ottawa, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.06.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41563-019-0345-0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300117"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421355"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973762"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2020.1759961"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0316"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2845388"},{"key":"ref12","first-page":"090","article-title":"Using randomized response for differential privacy preserving data collection","volume-title":"Proc. EDBT\/ICDT Workshops","author":"Wang"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2949041"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644952"},{"key":"ref16","first-page":"1","article-title":"Semi-supervised knowledge transfer for deep learning from private training data","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Papernot"},{"key":"ref17","first-page":"4579","article-title":"Are your sensitive attributes private? Novel model inversion attribute inference attacks on classification models","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Mehnaz"},{"key":"ref18","first-page":"1257","article-title":"Proxy discrimination in the age of artificial intelligence and big data","volume":"105","author":"Prince","year":"2020","journal-title":"Iowa Law Rev."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1561\/2200000056"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310068"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2018.00025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967734"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453534"},{"key":"ref24","first-page":"3483","article-title":"Learning structured output representation using deep conditional generative models","volume-title":"Proc. Neural Inf. Process. Syst.","author":"Sohn"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC49849.2020.9238921"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.10.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3110101"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2868382"},{"key":"ref31","article-title":"Privacy-preserving machine learning through data obfuscation","author":"Zhang","year":"2018","journal-title":"arXiv: 1807.01860"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457159"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.83"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2949041"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2599873"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3078086"},{"key":"ref37","article-title":"Adversarial autoencoders","author":"Makhzani","year":"2015","journal-title":"arXiv:1511.05644"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417278"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3068195"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00057"},{"key":"ref43","article-title":"Agatha: Smart contract for DNN computation","author":"Zheng","year":"2021","journal-title":"arXiv:2105.04919"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417243"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0467-3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000666"},{"issue":"86","key":"ref47","first-page":"1","article-title":"Intel SGX explained.","volume":"2016","author":"Costan","year":"2016","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3456631"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345447"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3126315"},{"key":"ref52","first-page":"1","article-title":"Auto-encoding variational Bayes","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kingma"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.07.028"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17053"},{"key":"ref55","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","volume-title":"Proc. USENIX Symp. Operating Syst. Des. Implementation","author":"Abadi"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10592103\/10310022.pdf?arnumber=10310022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T04:48:27Z","timestamp":1721191707000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10310022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":55,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3326299","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}