{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:53:01Z","timestamp":1772934781690,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB0803400"],"award-info":[{"award-number":["2018YFB0803400"]}]},{"DOI":"10.13039\/501100005153","name":"China National Funds for Distinguished Young Scientists","doi-asserted-by":"publisher","award":["61625205"],"award-info":[{"award-number":["61625205"]}],"id":[{"id":"10.13039\/501100005153","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["QYZDY-SSW-JSC002"],"award-info":[{"award-number":["QYZDY-SSW-JSC002"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61520106007"],"award-info":[{"award-number":["61520106007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61751211"],"award-info":[{"award-number":["61751211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572453"],"award-info":[{"award-number":["61572453"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["1526638"],"award-info":[{"award-number":["1526638"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/tifs.2018.2848657","type":"journal-article","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T18:17:42Z","timestamp":1529345862000},"page":"223-234","source":"Crossref","is-referenced-by-count":41,"title":["AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-0357","authenticated-orcid":false,"given":"Taeho","family":"Jung","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6070-6625","authenticated-orcid":false,"given":"Xiang-Yang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2043-2439","authenticated-orcid":false,"given":"Wenchao","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1276-4115","authenticated-orcid":false,"given":"Zhongying","family":"Qiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2859-3632","authenticated-orcid":false,"given":"Jianwei","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Linlin","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2042-9854","authenticated-orcid":false,"given":"Junze","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3340-8585","authenticated-orcid":false,"given":"Jiahui","family":"Hou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1743384.1743409"},{"key":"ref33","author":"leskovec","year":"2015","journal-title":"SNAP Datasets Stanford large network dataset collection"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15549-9_47"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2495122"},{"key":"ref30","first-page":"221","article-title":"Key frame extraction methodology for video annotation","volume":"4","author":"khurana","year":"2013","journal-title":"Int J Comput Aided Eng Technol"},{"key":"ref37","author":"lichman","year":"2013","journal-title":"UCI Machine Learning Repository"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1264824"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524584"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139924801"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2309134"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2577034"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057004"},{"key":"ref2","year":"2015","journal-title":"Ftc charges data broker with facilitating the theft of millions of dollars from consumers' accounts"},{"key":"ref1","year":"2015","journal-title":"Data Markets Compared&#x2014;A Look at Data Market Offerings from Four Providers"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.438"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.157"},{"key":"ref24","first-page":"119","article-title":"Accountable virtual machines","author":"haeberlen","year":"2010","journal-title":"Proc OSDI"},{"key":"ref23","year":"2017","journal-title":"The Home of the U S Government's Open Data"},{"key":"ref26","first-page":"242","article-title":"The append-only Web bulletin board","author":"heather","year":"2008","journal-title":"Formal Aspects in Security and Trust"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294279"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2015.104"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.39"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2366773"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223855"},{"key":"ref11","first-page":"21","article-title":"On the resemblance and containment of documents","author":"broder","year":"1997","journal-title":"Proc Compression Complexity Sequences"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626306"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00031-7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7953278"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282359"},{"key":"ref16","year":"2014","journal-title":"Data Brokers A Call for Transparency and Accountability"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/800157.805047"},{"key":"ref18","article-title":"Application-aware end-to-end delay and message loss estimation in Internet of Things (IoT)&#x2014;MQTT-SN protocols","author":"roy","year":"0","journal-title":"Future Gener Comput Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2046265"},{"key":"ref4","year":"2015","journal-title":"Ftc complaint offers lessons for data broker industry"},{"key":"ref3","year":"2015","journal-title":"Ftc charges data brokers with helping scammer take more than $7 million from consumers' accounts"},{"key":"ref6","article-title":"A practical and secure coercion-resistant scheme for remote elections","author":"ara\u00fajo","year":"2008","journal-title":"Proc Dagstuhl Seminar"},{"key":"ref5","year":"2015","journal-title":"Multimedia computing and computer vision lab"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10082-1_3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24085-0_21"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3233\/SW-150175"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref46","first-page":"526","article-title":"Accountability: Definition and relationship to verifiability","author":"k\u00fcsters","year":"2010","journal-title":"Proc CCS"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2009.03.001"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.5274919"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126295"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAW.2011.37"},{"key":"ref41","year":"2017","journal-title":"Json-Similarity"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1021\/ci600526a"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14778\/2311906.2311907"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/10206\/8410643\/8387863-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8410643\/08387863.pdf?arnumber=8387863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:09:48Z","timestamp":1657746588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8387863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":52,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2848657","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}