{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:25:52Z","timestamp":1773779152846,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education through Priority Research Centers Program","award":["2017R1A6A1A03015562"],"award-info":[{"award-number":["2017R1A6A1A03015562"]}]},{"name":"Multi-Material Machining Innovative Technology Research Center"},{"name":"GRRC Program of Gyeonggi Province","award":["GRRC TU Korea2020-B03"],"award-info":[{"award-number":["GRRC TU Korea2020-B03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1109\/tnse.2022.3188575","type":"journal-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T19:29:21Z","timestamp":1657222161000},"page":"2607-2616","source":"Crossref","is-referenced-by-count":21,"title":["Get Your Foes Fooled: Proximal Gradient Split Learning for Defense Against Model Inversion Attacks on IoMT Data"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4586-4131","authenticated-orcid":false,"given":"Sunder Ali","family":"Khowaja","sequence":"first","affiliation":[{"name":"Department of Mechatronics Engineering, Tech University of Korea, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0605-7572","authenticated-orcid":false,"given":"Ik Hyun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Mechatronics Engineering, Tech University of Korea, Siheung-si, Gyeonggi-do 15073, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1262-8594","authenticated-orcid":false,"given":"Kapal","family":"Dev","sequence":"additional","affiliation":[{"name":"Munster Technological University, Bishopstown, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5332-1698","authenticated-orcid":false,"given":"Muhammad Aslam","family":"Jarwar","sequence":"additional","affiliation":[{"name":"Department of Computing, Sheffield Hallam University, Sheffield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5035-2640","authenticated-orcid":false,"given":"Nawab Muhammad Faseeh","family":"Qureshi","sequence":"additional","affiliation":[{"name":"Department of Computer Education, Sungkyunkwan University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051414"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1148\/radiol.2019182716"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2021.101971"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-0301-z"},{"key":"ref5","article-title":"Evaluation of inference attack models for deep learning on medical data","author":"Wu","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref7","article-title":"Split learning for health: Distributed deep learning without sharing raw patient data","author":"Vepakomma","year":"2018"},{"key":"ref8","first-page":"1","article-title":"Practical defenses against model inversion attacks for split neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Titcombe","year":"2021"},{"key":"ref9","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Representations","author":"Szegedy","year":"2014"},{"key":"ref10","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36802-9_31"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3384942.3406867"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9191084"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2797930"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359824"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01587"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s21113874"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref24","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369498"},{"key":"ref26","first-page":"1","article-title":"Reducing leakage in distributed deep learning for sensitive health data","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Vepakomma","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17387"},{"key":"ref28","article-title":"Maximal Jacobian-based saliency map attack","author":"Wiyatno","year":"2018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116420"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.567"},{"key":"ref31","article-title":"Fast convex optimization algorithms for exact recovery of a corrupted low-rank matrix","author":"Lin","year":"2009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2021.1211"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04578-y"},{"key":"ref34","first-page":"375","article-title":"The mammographic image analysis society digital mammogram database","volume-title":"Proc. Exerpta Medica. Int. Congr. Ser. 1069","year":"1994"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/10256239\/09817817.pdf?arnumber=9817817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:31:52Z","timestamp":1706765512000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":37,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2022.3188575","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}