{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T18:15:16Z","timestamp":1770488116440,"version":"3.49.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tii.2020.2994743","type":"journal-article","created":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T00:33:21Z","timestamp":1589589201000},"page":"1-1","source":"Crossref","is-referenced-by-count":112,"title":["Deep Residual Learning based Enhanced JPEG Compression in the Internet of Things"],"prefix":"10.1109","author":[{"given":"Han","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Qinkai","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Gerard","family":"Memmi","sequence":"additional","affiliation":[]},{"given":"Jialiang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"47","article-title":"Image encryption using DCT and stream cipher","volume":"32","author":"krikor","year":"2009","journal-title":"Eur J Sci Res"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2911679"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257528"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2681128"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.881939"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.73"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/30.125072"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/83.766859"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6115738"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556828"},{"key":"ref17","author":"pennebaker","year":"1992","journal-title":"JPEG Still Image Data Compression Standard"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01303-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.300"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.618"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532321"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2013.6694346"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_53"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1974.223784"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2694966"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/382132"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2228873"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.037"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0932-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662206"},{"key":"ref22","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015"},{"key":"ref21","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014"},{"key":"ref24","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007"},{"key":"ref23","first-page":"2483","article-title":"How does batch normalization help optimization?","author":"santurkar","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref26","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","author":"abadi","year":"0","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2766-4_7"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/4389054\/09093951.pdf?arnumber=9093951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:46Z","timestamp":1652194366000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9093951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/tii.2020.2994743","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}