{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:19:16Z","timestamp":1775578756557,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB0204301"],"award-info":[{"award-number":["2018YFB0204301"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072466"],"award-info":[{"award-number":["62072466"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872372"],"award-info":[{"award-number":["61872372"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52177067"],"award-info":[{"award-number":["52177067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102429"],"award-info":[{"award-number":["62102429"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102422"],"award-info":[{"award-number":["62102422"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172436"],"award-info":[{"award-number":["62172436"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102452"],"award-info":[{"award-number":["62102452"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202500"],"award-info":[{"award-number":["62202500"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62177046"],"award-info":[{"award-number":["62177046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Graduate Research and Innovation Projects in Hunan Province","award":["CX20210008"],"award-info":[{"award-number":["CX20210008"]}]},{"DOI":"10.13039\/501100007085","name":"National University of Defense Technology","doi-asserted-by":"publisher","award":["ZK19-38"],"award-info":[{"award-number":["ZK19-38"]}],"id":[{"id":"10.13039\/501100007085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/tsg.2022.3214194","type":"journal-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:43:17Z","timestamp":1665603797000},"page":"2301-2312","source":"Crossref","is-referenced-by-count":20,"title":["<i>p2Detect<\/i>: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4314-3592","authenticated-orcid":false,"given":"Liqiang","family":"Wu","sequence":"first","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9040-7247","authenticated-orcid":false,"given":"Heyuan","family":"Shi","sequence":"additional","affiliation":[{"name":"Big Data Institute, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8155-7462","authenticated-orcid":false,"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0720-4925","authenticated-orcid":false,"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3127649"},{"key":"ref2","volume-title":"96$Billion Is Lost Every Year to Electricity Theft. Internet Draft","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2030890"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2017.7977752"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2892595"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3030238"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545748"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2973681"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903312"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026692"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925322"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6650784"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110784"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1370731"},{"key":"ref17","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. 33rd Int. Conf. Int. Conf. Mach. Learn. (ICML)","volume":"48","author":"Dowlin"},{"key":"ref18","first-page":"1501","article-title":"XONN: XNOR-based oblivious deep neural network inference","volume-title":"Proc. 28th USENIX Conf. Security Symp. (SEC)","author":"Riazi"},{"key":"ref19","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Conf. Security Symp. (SEC)","author":"Juvekar"},{"key":"ref20","first-page":"2505","article-title":"Delphi: A cryptographic inference service for neural networks","volume-title":"Proc. 29th USENIX Security Symp. (USENIX Security)","author":"Mishra"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref22","volume-title":"Low Latency Privacy Preserving Inference","author":"Brutzkus","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"ref24","article-title":"Privacy-preserving classification on deep neural network","author":"Chabanne","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484797"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.121"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2429117"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref32","volume-title":"PALISADE Lattice Cryptography Library User Manual","author":"Polyakov","year":"2021"},{"key":"ref33","volume-title":"Correction to Improving the DGK Comparison Protocol","author":"Veugen","year":"2018"},{"key":"ref34","first-page":"1027","article-title":"K-means++: The advantages of careful seeding","volume-title":"Proc. SODA","volume":"8","author":"Arthur"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833648"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/10106635\/09917455.pdf?arnumber=9917455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:21:52Z","timestamp":1705018912000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9917455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":35,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2022.3214194","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5]]}}}