{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:08:54Z","timestamp":1775855334861,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,11]],"date-time":"2022-09-11T00:00:00Z","timestamp":1662854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation of China","award":["62071369"],"award-info":[{"award-number":["62071369"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,11]]},"DOI":"10.1145\/3544793.3560405","type":"proceedings-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T16:03:23Z","timestamp":1682352203000},"page":"438-443","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-preserved Intermediate Feature Compression for Cyber-Physical Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0032-8631","authenticated-orcid":false,"given":"Zixi","family":"Wang","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Telecom, China"}]},{"given":"Le","family":"Yang","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"given":"Fan","family":"Li","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413943"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2968375"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3034270"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.06.007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190843"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2941660"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350849"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451100"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2018.8547134"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCAS.2021.3072884"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2019.8824955"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Lixin Fan Kam\u00a0Woh Ng Ce Ju Tianyu Zhang Chang Liu Chee\u00a0Seng Chan and Qiang Yang. 2020. Rethinking privacy preserving deep learning: How to evaluate and thwart privacy attacks. In Federated Learning. 32\u201350.","DOI":"10.1007\/978-3-030-63076-8_3"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of International Conference on Machine Learning. 1180\u20131189","author":"Ganin Yaroslav","year":"2015","unstructured":"Yaroslav Ganin and Victor Lempitsky. 2015. Unsupervised domain adaptation by backpropagation. In Proceedings of International Conference on Machine Learning. 1180\u20131189."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/VCIP49819.2020.9301807"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154306"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of International Conference on Embedded Wireless Systems and Networks. 341\u2013346","author":"Jiang Linshan","year":"2019","unstructured":"Linshan Jiang, Xin Lou, Rui Tan, and Jun Zhao. 2019. Differentially Private Collaborative Learning for the IoT Edge.. In Proceedings of International Conference on Embedded Wireless Systems and Networks. 341\u2013346."},{"key":"e_1_3_2_1_19_1","unstructured":"Alex Krizhevsky Geoffrey Hinton 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000374"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412388"},{"key":"e_1_3_2_1_24_1","volume-title":"Split computing and early exiting for deep learning applications: Survey and research challenges. Comput. Surveys","author":"Matsubara Yoshitomo","year":"2021","unstructured":"Yoshitomo Matsubara, Marco Levorato, and Francesco Restuccia. 2021. Split computing and early exiting for deep learning applications: Survey and research challenges. Comput. Surveys (2021), 1\u201328."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449965"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378522"},{"key":"e_1_3_2_1_27_1","volume-title":"A mathematical theory of communication. The Bell system technical journal 27, 3","author":"Shannon Claude\u00a0Elwood","year":"1948","unstructured":"Claude\u00a0Elwood Shannon. 1948. A mathematical theory of communication. The Bell system technical journal 27, 3 (1948), 379\u2013423."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145068"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2221191"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3107716"},{"key":"e_1_3_2_1_31_1","volume-title":"Elements of information theory","author":"Thomas MTCAJ","unstructured":"MTCAJ Thomas and A\u00a0Thomas Joy. 2006. Elements of information theory. Wiley-Interscience."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133169"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of International Conference on Learning Representations Workshop on Distributed and Private Machine Learning. 1\u201310","author":"Titcombe Tom","year":"2021","unstructured":"Tom Titcombe, Adam\u00a0J Hall, Pavlos Papadopoulos, and Daniele Romanini. 2021. Practical defences against model inversion attacks for split neural networks. In Proceedings of International Conference on Learning Representations Workshop on Distributed and Private Machine Learning. 1\u201310."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220106"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110886"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150417"},{"key":"e_1_3_2_1_37_1","volume-title":"From wireless sensor networks towards cyber physical systems. Pervasive and Mobile computing 7, 4","author":"Wu Fang-Jing","year":"2011","unstructured":"Fang-Jing Wu, Yu-Fen Kao, and Yu-Chee Tseng. 2011. From wireless sensor networks towards cyber physical systems. Pervasive and Mobile computing 7, 4 (2011), 397\u2013413."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2018.1442934"},{"key":"e_1_3_2_1_39_1","first-page":"1831","article-title":"ilocus: Incentivizing vehicle mobility to optimize sensing distribution in crowd sensing","volume":"19","author":"Xu Susu","year":"2019","unstructured":"Susu Xu, Xinlei Chen, Xidong Pi, Carlee Joe-Wong, Pei Zhang, and Hae\u00a0Young Noh. 2019. ilocus: Incentivizing vehicle mobility to optimize sensing distribution in crowd sensing. IEEE Transactions on Mobile Computing 19, 8 (2019), 1831\u20131847.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800506"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2939713"}],"event":{"name":"UbiComp\/ISWC '22: The 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing","location":"Cambridge United Kingdom","acronym":"UbiComp\/ISWC '22","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544793.3560405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544793.3560405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:28:31Z","timestamp":1775852911000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544793.3560405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,11]]},"references-count":41,"alternative-id":["10.1145\/3544793.3560405","10.1145\/3544793"],"URL":"https:\/\/doi.org\/10.1145\/3544793.3560405","relation":{},"subject":[],"published":{"date-parts":[[2022,9,11]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}