{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T06:57:16Z","timestamp":1768201036818,"version":"3.49.0"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["NSFC 61833014"],"award-info":[{"award-number":["NSFC 61833014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61722310"],"award-info":[{"award-number":["61722310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LR18F030001"],"award-info":[{"award-number":["LR18F030001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1109\/tii.2021.3104056","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T20:19:10Z","timestamp":1628713150000},"page":"2641-2650","source":"Crossref","is-referenced-by-count":16,"title":["Information Fingerprint for Secure Industrial Big Data Analytics"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4170-5579","authenticated-orcid":false,"given":"Xiaoyu","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2071-4380","authenticated-orcid":false,"given":"Zhiqiang","family":"Ge","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2020.05.010"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2004.04.013"},{"key":"ref31","article-title":"Torchattacks: A pytorch repository for adversarial attacks","author":"kim","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(94)00057-U"},{"key":"ref35","first-page":"2529","article-title":"Robust kernel density estimation","volume":"13","author":"kim","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2009.02.027"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"ref13","article-title":"Inside the cunning, unprecedented hack of Ukraine's power grid","author":"zetter","year":"2016","journal-title":"Wired"},{"key":"ref14","article-title":"The Cyber attack on Saudi Aramco","volume":"55","author":"bronk and e tikk-ringas","year":"2013","journal-title":"Survival"},{"key":"ref15","article-title":"National security commission on artificial intelligence (AI)","author":"schmidt","year":"2021"},{"key":"ref16","article-title":"On artificial intelligence-a European approach to excellence and trust","year":"2020","journal-title":"European Commission"},{"key":"ref17","year":"2019","journal-title":"China Academy of Information and Communications Technology"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102717"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3093386"},{"key":"ref28","first-page":"63","article-title":"Estimating the stability and dispersion of the biometric glottal fingerprint in continuous speech","author":"g\u00f3mez","year":"0","journal-title":"Non-Linear Speech Processing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3056533"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916364"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3076803"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3053106"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymeth.2014.08.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.2998467"},{"key":"ref8","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0","journal-title":"Proc 3rd Int Conf Learn Representations (ICLR)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3075515"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3053128"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00121"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"65520","DOI":"10.1109\/ACCESS.2020.2985089","article-title":"Impact: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction","volume":"8","author":"seo","year":"2020","journal-title":"IEEE Access"},{"key":"ref21","article-title":"On detecting adversarial perturbations","author":"metzen","year":"0","journal-title":"Proc 5th Int Conf Learn Representations (ICLR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134057"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00765"},{"key":"ref25","article-title":"Magnet and&#x2018; efficient defenses against adversarial attacks&#x2019; are not robust to adversarial examples","author":"carlini","year":"2017"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9670747\/09511842.pdf?arnumber=9511842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T19:31:31Z","timestamp":1650396691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9511842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4]]},"references-count":35,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tii.2021.3104056","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4]]}}}