{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T04:27:20Z","timestamp":1767155240625,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Three Three Three Talent Project Funding Project in Hebei Province","award":["A202001017"],"award-info":[{"award-number":["A202001017"]}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2021405001"],"award-info":[{"award-number":["F2021405001"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772006"],"award-info":[{"award-number":["61772006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013091","name":"Science and Technology Major Project of Guangxi","doi-asserted-by":"publisher","award":["AA17204096"],"award-info":[{"award-number":["AA17204096"]}],"id":[{"id":"10.13039\/501100013091","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Project of Guangxi","award":["AB17129012"],"award-info":[{"award-number":["AB17129012"]}]},{"name":"Special Fund for Bagui Scholars of Guangxi"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tits.2021.3102266","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T20:12:49Z","timestamp":1628626369000},"page":"16799-16809","source":"Crossref","is-referenced-by-count":16,"title":["Generating and Restoring Private Face Images for Internet of Vehicles Based on Semantic Features and Adversarial Examples"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2751-2930","authenticated-orcid":false,"given":"Jingjing","family":"Yang","sequence":"first","affiliation":[{"name":"Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2527-6017","authenticated-orcid":false,"given":"Jiaxing","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Hebei North University, Zhangjiakou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8369-8798","authenticated-orcid":false,"given":"Runkai","family":"Han","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Hebei North University, Zhangjiakou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8284-6514","authenticated-orcid":false,"given":"Jinzhao","family":"Wu","sequence":"additional","affiliation":[{"name":"Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9081188"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2945923"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922236"},{"key":"ref4","article-title":"Responses to critiques on machine learning of criminality perceptions (Addendum of arXiv:1611.04135)","author":"Wu","year":"2016","journal-title":"arXiv:1611.04135"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1037\/pspa0000098"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.173"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1143518.1143519"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358935"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-019-1898-8"},{"key":"ref10","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413906"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647189"},{"key":"ref13","article-title":"MediaEval 2019: Concealed FGSM perturbations for privacy preservation","author":"Linardos","year":"2019","journal-title":"arXiv:1910.11603"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/12.2524274"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2999449"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/34.895972"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.03.037"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2572683"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106824"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref23","article-title":"Adversarial examples in modern machine learning: A review","author":"Reza Wiyatno","year":"2019","journal-title":"arXiv:1911.05268"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/9781108891530.013"},{"key":"ref25","first-page":"1","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","volume":"abs\/1511.06434","author":"Radford","year":"2016","journal-title":"CoRR"},{"key":"ref26","article-title":"Conditional generative adversarial nets","author":"Mirza","year":"2014","journal-title":"arXiv:1411.1784"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00445"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"issue":"1","key":"ref30","first-page":"143","article-title":"A literature review on various recent steganography techniques","volume":"4","author":"Arya","year":"2018","journal-title":"Int. J. Future Revolution Comput. Sci. Commun. Eng."},{"issue":"5","key":"ref31","first-page":"527","article-title":"Coverless information hiding based on bag-of-words model of image","volume":"34","author":"Zhou","year":"2016","journal-title":"J. Appl. Sci."},{"issue":"2","key":"ref32","first-page":"371","article-title":"Coverless information hiding based on generative adversarial networks","volume":"36","author":"Liu","year":"2018","journal-title":"J. Appl. Sci."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref34","article-title":"Learning global additive explanations for neural nets using model distillation","author":"Tan","year":"2018","journal-title":"arXiv:1801.08640"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref38","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900289"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2800756"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3066054"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9893028\/09511319.pdf?arnumber=9511319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T22:39:12Z","timestamp":1705012752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9511319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":41,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tits.2021.3102266","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"type":"print","value":"1524-9050"},{"type":"electronic","value":"1558-0016"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}