{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:39:01Z","timestamp":1775122741267,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Research Institute for Artificial Intelligence of Things"},{"DOI":"10.13039\/501100004377","name":"Hong Kong Polytechnic University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004377","id-type":"DOI","asserted-by":"publisher"}]},{"name":"HK RGC General Research Fund","award":["PolyU 15220020"],"award-info":[{"award-number":["PolyU 15220020"]}]},{"name":"HK RGC General Research Fund","award":["PolyU 15204921"],"award-info":[{"award-number":["PolyU 15204921"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1109\/tii.2022.3203397","type":"journal-article","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T19:39:25Z","timestamp":1662061165000},"page":"1623-1633","source":"Crossref","is-referenced-by-count":58,"title":["Blockchain-based Collaborative Edge Intelligence for Trustworthy and Real-Time Video Surveillance"],"prefix":"10.1109","volume":"19","author":[{"given":"Mingjin","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Yuvraj","family":"Sahni","sequence":"additional","affiliation":[{"name":"Department of Building Environment and Energy Engineering, The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Qianyi","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4727-4856","authenticated-orcid":false,"given":"Shan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Lei","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, South China University of Technology, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref33","article-title":"In defense of the triplet loss for person re-identification","author":"hermans","year":"2017"},{"key":"ref32","article-title":"Re-ID done right: Towards good practices for person re-identification","author":"almazan","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102078"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2999323"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986665"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2739804"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SEC50012.2020.00016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3349614.3356025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430721"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3098317"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103138"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s20236902"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3046129"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016825"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448628"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108146"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137664"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2014.02.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14778\/3229863.3236256"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3458305.3463377"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938527"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00062"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218251"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3641638"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134459"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954804"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230574"},{"key":"ref23","first-page":"377","article-title":"Live video analytics at scale with approximation and delay-tolerance","author":"zhang","year":"0","journal-title":"Proc USENIX Symp Netw Syst Des Implementation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3349614.3356026"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302366"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9989328\/09873983.pdf?arnumber=9873983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:18:35Z","timestamp":1673896715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9873983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":35,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tii.2022.3203397","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2]]}}}