{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T19:00:09Z","timestamp":1762455609207,"version":"build-2065373602"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"publisher","award":["2021ZD0111602"],"award-info":[{"award-number":["2021ZD0111602"]}],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92370115","62276165"],"award-info":[{"award-number":["92370115","62276165"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai Municipality","doi-asserted-by":"publisher","award":["24ZR1491700"],"award-info":[{"award-number":["24ZR1491700"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tpami.2025.3599592","type":"journal-article","created":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T18:20:42Z","timestamp":1755282042000},"page":"11051-11064","source":"Crossref","is-referenced-by-count":0,"title":["Interpretable Rotation-Equivariant Multiary-Valued Network for Attribute Obfuscation"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6108-2738","authenticated-orcid":false,"given":"Quanshi","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yiting","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2151-4716","authenticated-orcid":false,"given":"Qihan","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9918-3000","authenticated-orcid":false,"given":"Jie","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Xu","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0165-4930","authenticated-orcid":false,"given":"Liyao","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref2","first-page":"40","article-title":"Representation learning and adversarial generation of 3D point clouds","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Achlioptas"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24335"},{"key":"ref4","first-page":"214","article-title":"Wasserstein generative adversrial networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Arjovsky"},{"key":"ref5","first-page":"394","article-title":"Improving the gaussian mechanism for differential privacy: Analytical calibration and optimal denoising","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Balle"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/34.9107"},{"article-title":"ShapeNet: An information-rich 3D model repository","year":"2015","author":"Chang","key":"ref7"},{"key":"ref8","first-page":"1986","article-title":"Associative long short-term memory","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","author":"Danihelka"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12454"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.522"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/14786444808646046"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-543457-7.50017-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref16","article-title":"Gazelle: A low latency framework for secure neural network inference","author":"Juvekar","year":"2018","journal-title":"arXiv:1801:05507"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2015.336"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref18"},{"key":"ref19","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Krizhevsky"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"article-title":"PrivyNet: A flexible framework for privacy-preserving deep neural network training with a fine-grained privacy control","year":"2017","author":"Li","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"article-title":"R\u00e9nyi differential privacy of the sampled Gaussian mechanism","year":"2019","author":"Mironov","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref28","first-page":"4438","article-title":"An end-to-end deep learning architecture for graph classification","volume-title":"Proc. Conf. Assoc. Advance. Artif. Intell.","author":"Mu"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00509"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2967734"},{"article-title":"Quaternion recurrent neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Parcollet","key":"ref31"},{"key":"ref32","first-page":"652","article-title":"PointNet: Deep learning on point sets for 3D classification and segmentation","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Qi"},{"key":"ref33","first-page":"5105","article-title":"PointNet++: Deep hierarchical feature learning on point sets in a metric space","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Qi"},{"author":"Reichert","key":"ref34","article-title":"Neuronal synchrony in complex-valued deep networks"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"Proc. 3rd Int. Conf. Learn. Representations (ICLR)","author":"Simonyan","key":"ref38"},{"article-title":"Deep complex networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Trabelsi","key":"ref39"},{"article-title":"The Caltech-UCSD Birds-200\u20132011 Dataset","year":"2011","author":"Wah","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220106"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298801"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737494"},{"article-title":"Complex-valued neural networks for privacy protection","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xiang","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3089884"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"article-title":"Deep quaternion features for privacy protection","year":"2020","author":"Zhang","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470255"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref50","first-page":"225","article-title":"Adversarial neural network inversion via auxiliary knowledge alignment","volume-title":"Proc. Comput. Commun. Secur.","author":"Zhang"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01237-3_39"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/34\/11230086\/11127007.pdf?arnumber=11127007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:53:12Z","timestamp":1762455192000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11127007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":51,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2025.3599592","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"type":"print","value":"0162-8828"},{"type":"electronic","value":"2160-9292"},{"type":"electronic","value":"1939-3539"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}