{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:45:26Z","timestamp":1774716326232,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071095"],"award-info":[{"award-number":["62071095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tdsc.2024.3376929","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T20:30:44Z","timestamp":1710793844000},"page":"5526-5537","source":"Crossref","is-referenced-by-count":4,"title":["LocGuard: A Location Privacy Defender for Image Sharing"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6305-1740","authenticated-orcid":false,"given":"Wanlun","family":"Ma","sequence":"first","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1388-7715","authenticated-orcid":false,"given":"Derui","family":"Wang","sequence":"additional","affiliation":[{"name":"CSIRO&#x0027;s D61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1355-3870","authenticated-orcid":false,"given":"Chao","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Accounting, Information Systems and Supply Chain, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0655-666X","authenticated-orcid":false,"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6529-3666","authenticated-orcid":false,"given":"Gaolei","family":"Fei","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Hawthorn, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"ref2","first-page":"1269","article-title":"Aggregating local deep features for image retrieval","volume-title":"Proc. IEEE Int. Conf. Comput. Vis.","author":"Babenko"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_38"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.39"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806249"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995610"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871535"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124303"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874197"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2151-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2013.07.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587784"},{"key":"ref13","first-page":"513","article-title":"AttriGuard: A practical defense against attribute inference attacks via adversarial machine learning","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Jia"},{"key":"ref14","article-title":"CERTH\/CEA LIST at mediaeval placing task 2015","volume-title":"Proc. MediaEval Workshop","volume":"1436","author":"Kordopatis-Zilos"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2763323"},{"key":"ref16","article-title":"Analyzing user activities, demographics, social network structure and user-generated content on Instagram","author":"Manikonda","year":"2014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4186\/ej.2017.21.3.295"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01258-8_35"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2876752"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2561281"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078729"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873950"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020575"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572025"},{"key":"ref26","first-page":"6103","article-title":"Poison frogs! Targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Shafahi"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref29","article-title":"The Cambridge analytica scandal changed the world\u2013 but it didn\u2019t change Facebook","author":"Wong"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3032352"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00077"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963443"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2636090"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2712148"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2671188.2749308"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186095"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685287"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10750463\/10472060.pdf?arnumber=10472060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T15:31:53Z","timestamp":1732721513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10472060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":37,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3376929","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}