{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:01:58Z","timestamp":1763348518286,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2047"],"award-info":[{"award-number":["U22B2047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["20ZR1419700","22ZR1481000"],"award-info":[{"award-number":["20ZR1419700","22ZR1481000"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1109\/tii.2023.3246992","type":"journal-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:38:04Z","timestamp":1677091084000},"page":"11518-11530","source":"Crossref","is-referenced-by-count":6,"title":["Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6787-9297","authenticated-orcid":false,"given":"Mingyun","family":"Bian","sequence":"first","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6656-6240","authenticated-orcid":false,"given":"Joseph","family":"Liu","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Monash University, Clayton, VC, Australia"}]},{"given":"Shifeng","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5867-1315","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4510-7883","authenticated-orcid":false,"given":"Yanli","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2845456"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2568460"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.017094"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2913217"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142933"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3032147"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036891"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","article-title":"Image feature extraction in encrypted domain with privacy-preserving SIFT","volume":"21","author":"hsu","year":"2012","journal-title":"IEEE Trans Image Process"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3106482"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701204"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3110808"},{"key":"ref16","first-page":"24","article-title":"Fully homomorphic encryption over the integers","author":"dijk","year":"0","journal-title":"Proc Annu Int Conf Theory Appl Cryptology Technol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3064691"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3077005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/157"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00009"},{"key":"ref26","article-title":"The deepfake detection challenge dataset","volume":"abs 2006 7397","author":"dolhansky","year":"2020","journal-title":"CoRR"},{"key":"ref25","article-title":"DeepFakes: A new threat to face recognition? Assessment and detection","volume":"abs 1812 8685","author":"korshunov","year":"2018","journal-title":"CoRR"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3126611"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-5550-8"},{"article-title":"A fully homomorphic encryption scheme","year":"2009","author":"gentry","key":"ref21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3425780"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00480"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2737980"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3172139"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3100873"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3106780"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-179720"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISMODE53584.2022.9742852"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6210054"},{"key":"ref5","article-title":"Deep learning model for deep fake face recognition and detection","volume":"8","author":"suganthi","year":"2022","journal-title":"PeerJ Comput Sci"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/10288179\/10049502.pdf?arnumber=10049502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T20:09:47Z","timestamp":1699301387000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10049502\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":32,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tii.2023.3246992","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"type":"print","value":"1551-3203"},{"type":"electronic","value":"1941-0050"}],"subject":[],"published":{"date-parts":[[2023,12]]}}}