{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:23Z","timestamp":1774678343602,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/tii.2019.2912465","type":"journal-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T22:34:05Z","timestamp":1556231645000},"page":"4206-4215","source":"Crossref","is-referenced-by-count":46,"title":["Fog-Embedded Deep Learning for the Internet of Things"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3170-4994","authenticated-orcid":false,"given":"Lingjuan","family":"Lyu","sequence":"first","affiliation":[]},{"given":"James C.","family":"Bezdek","sequence":"additional","affiliation":[]},{"given":"Xuanli","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0306-2691","authenticated-orcid":false,"given":"Jiong","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"3123","article-title":"Binaryconnect: Training deep neural networks with binary weights during propagations","author":"courbariaux","year":"0","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref10","article-title":"Semi-supervised knowledge transfer for deep learning from private training data","author":"papernot","year":"2016"},{"key":"ref11","article-title":"Reading digits in natural images with unsupervised feature learning","author":"netzer","year":"0","journal-title":"Proc NIPS Workshop on Deep Learning and Unsupervised Feature Learning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref14","article-title":"Learning differentially private recurrent language models","author":"mcmahan","year":"0","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref15","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","author":"ohrimenko","year":"0","journal-title":"Proc USENIX Sec Symp"},{"key":"ref16","article-title":"ModelChain: Decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks","author":"kuo","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2709942"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2803782"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.226"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref4","first-page":"1310","article-title":"Privacy-preserving deep learning","author":"shokri","year":"0","journal-title":"Proc 22nd ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"aono","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref6","article-title":"Crypto-nets: Neural networks over encrypted data","author":"xie","year":"2014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126289"},{"key":"ref5","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref7","first-page":"1430","article-title":"Privacy aware learning","author":"wainwright","year":"0","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref2","article-title":"Federated learning of deep networks using model averaging","author":"mcmahan","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132990"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2694469"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502546"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","article-title":"Random projection-based multiplicative data perturbation for privacy preserving distributed data mining","volume":"18","author":"liu","year":"2006","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref24","article-title":"Privacy via the Johnson&#x2013;Lindenstrauss transform","author":"kenthapadi","year":"2012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/026\/737400"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_26"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8755890\/08695142.pdf?arnumber=8695142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:02:53Z","timestamp":1657746173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8695142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":30,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tii.2019.2912465","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}