{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:44:15Z","timestamp":1775695455528,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["210YBXM2024106007 and 2022YFB3207700"],"award-info":[{"award-number":["210YBXM2024106007 and 2022YFB3207700"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272022, 62306061, 62276254, and InnoHK program"],"award-info":[{"award-number":["62272022, 62306061, 62276254, and InnoHK program"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NTU-PKU Joint Research Institute","award":["Sponsored by the Ng Teng Fong Charitable Foundation"],"award-info":[{"award-number":["Sponsored by the Ng Teng Fong Charitable Foundation"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680806","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:27Z","timestamp":1729925967000},"page":"8110-8119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["HideMIA: Hidden Wavelet Mining for Privacy-Enhancing Medical Image Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8387-4245","authenticated-orcid":false,"given":"Xun","family":"Lin","sequence":"first","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2730-9553","authenticated-orcid":false,"given":"Yi","family":"Yu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6505-3304","authenticated-orcid":false,"given":"Zitong","family":"Yu","sequence":"additional","affiliation":[{"name":"Great Bay University, Dongguan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4221-0842","authenticated-orcid":false,"given":"Ruohan","family":"Meng","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2080-4905","authenticated-orcid":false,"given":"Jiale","family":"Zhou","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-9368","authenticated-orcid":false,"given":"Ajian","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6129-3260","authenticated-orcid":false,"given":"Yizhong","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7253-785X","authenticated-orcid":false,"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0530-4201","authenticated-orcid":false,"given":"Wenzhong","family":"Tang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0791-189X","authenticated-orcid":false,"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[{"name":"MAIS, CASIA &amp; School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6262-8125","authenticated-orcid":false,"given":"Alex","family":"Kot","sequence":"additional","affiliation":[{"name":"Rapid-Rich Object Search Lab (ROSE), Nanyang Technological University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Dataset of breast ultrasound images. Data in Brief","author":"Al-Dhabyani Walid","year":"2020","unstructured":"Walid Al-Dhabyani, Mohammed Gomaa, Hussien Khaled, and Aly Fahmy. 2020. Dataset of breast ultrasound images. Data in Brief (2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1053-z"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656458"},{"key":"e_1_3_2_1_4_1","volume-title":"Hiding images in plain sight: Deep steganography","author":"Baluja Shumeet","year":"2017","unstructured":"Shumeet Baluja. 2017. Hiding images in plain sight: Deep steganography., Vol. 30 (2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"McDonald","author":"Candemir Sema","year":"2014","unstructured":"Sema Candemir, Stefan Jaeger, Kannappan Palaniappan, Jonathan P. Musco, Rahul K. Singh, Zhiyun Xue, Alexandros Karargyris, Sameer K. Antani, George R. Thoma, and Clement J. McDonald. 2014. Lung Segmentation in Chest Radiographs Using Anatomical Atlases With Nonrigid Registration. IEEE Transactions on Medical Imaging (2014)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00041"},{"key":"e_1_3_2_1_7_1","volume-title":"TransUNet: Transformers Make Strong Encoders for Medical Image Segmentation. arXiv","author":"Chen Jieneng","year":"2021","unstructured":"Jieneng Chen, Yongyi Lu, Qihang Yu, Xiangde Luo, Ehsan Adeli, Yan Wang, Le Lu, Alan L. Yuille, and Yuyin Zhou. 2021. TransUNet: Transformers Make Strong Encoders for Medical Image Segmentation. arXiv, Vol. abs\/2102.04306 (2021)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02044"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1495"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01453-z"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110424"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3141725"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Neural Information Processing Systems. 1954--1963","author":"Hayes Jamie","year":"2017","unstructured":"Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. In Proceedings of the Neural Information Processing Systems. 1954--1963."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.014"},{"key":"e_1_3_2_1_15_1","volume-title":"McDonald","author":"Jaeger Stefan","year":"2014","unstructured":"Stefan Jaeger, Alexandros Karargyris, Sema Candemir, Les R. Folio, Jenifer Siegelman, Fiona M. Callaghan, Zhiyun Xue, Kannappan Palaniappan, Rahul K. Singh, Sameer K. Antani, George R. Thoma, Yi-Xiang J. Wang, Pu-Xuan Lu, and Clement J. McDonald. 2014. Automatic Tuberculosis Screening Using Chest Radiographs. IEEE Transactions on Medical Imaging (2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"Johansen","author":"Jha Debesh","year":"2020","unstructured":"Debesh Jha, Pia H. Smedsrud, Michael A. Riegler, P\u00e5l Halvorsen, Thomas de Lange, Dag Johansen, and H\u00e5vard D. Johansen. 2020. Kvasir-SEG: A Segmented Polyp Dataset. In MMM."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0186-1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00337-8"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the British Machine Vision Conference. 375","author":"Kim Bach Ngoc","year":"2021","unstructured":"Bach Ngoc Kim, Jose Dolz, Christian Desrosiers, and Pierre-Marc Jodoin. 2021. Privacy Preserving for Medical Image Analysis via Non-Linear Deformation Proxy. In Proceedings of the British Machine Vision Conference. 375."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2021.3065727"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34048-2_55"},{"key":"e_1_3_2_1_23_1","volume-title":"Kot","author":"Kong Chenqi","year":"2023","unstructured":"Chenqi Kong, Anwei Luo, Shiqi Wang, Haoliang Li, Anderson Rocha, and Alex C. Kot. 2023. Pixel-Inconsistency Modeling for Image Manipulation Localization. arXiv, Vol. abs\/2310.00234 (2023)."},{"key":"e_1_3_2_1_24_1","volume-title":"Kot","author":"Kong Chenqi","year":"2024","unstructured":"Chenqi Kong, Anwei Luo, Song Xia, Yi Yu, Haoliang Li, and Alex C. Kot. 2024. MoE-FFD: Mixture of Experts for Generalized and Parameter-Efficient Face Forgery Detection. arXiv, Vol. abs\/2404.08452 (2024)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.281"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02603"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3257546"},{"key":"e_1_3_2_1_28_1","volume-title":"Microsoft COCO: Common Objects in Context. In Proceedings of the European Conference on Computer Vision","volume":"8693","author":"Lin Tsung-Yi","unstructured":"Tsung-Yi Lin, Michael Maire, Serge J. Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C. Lawrence Zitnick. 2014. Microsoft COCO: Common Objects in Context. In Proceedings of the European Conference on Computer Vision, Vol. 8693. 740--755."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00028"},{"key":"e_1_3_2_1_30_1","volume-title":"Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations. arXiv","author":"Lin Xun","year":"2024","unstructured":"Xun Lin, Yi Yu, Song Xia, Jue Jiang, Haoran Wang, Zitong Yu, Yizhong Liu, Ying Fu, Shuai Wang, Wenzhong Tang, and Alex Kot. 2024. Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations. arXiv, Vol. 2403.14250 (2024)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2017.07.005"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-024-02135-2"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Liu Dongyang","year":"2023","unstructured":"Dongyang Liu, Meina Kan, Shiguang Shan, and Xilin Chen. 2023. Function-Consistent Feature Distillation. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Liu Dongyang","year":"2023","unstructured":"Dongyang Liu, Meina Kan, Shiguang Shan, and Xilin Chen. 2023. Function-Consistent Feature Distillation. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01024"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107022"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103163"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 10816--10825","author":"Lu Shao-Ping","unstructured":"Shao-Ping Lu, Rong Wang, Tao Zhong, and Paul L. Rosin. 2021. Large-Capacity Image Steganography Based on Invertible Neural Networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 10816--10825."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700364"},{"key":"e_1_3_2_1_40_1","volume-title":"Kot","author":"Meng Ruohan","year":"2024","unstructured":"Ruohan Meng, Chenyu Yi, Yi Yu, Siyuan Yang, Bingquan Shen, and Alex C. Kot. 2024. Semantic Deep Hiding for Robust Unlearnable Examples. IEEE Transactions on Information Forensics and Security (2024)."},{"key":"e_1_3_2_1_41_1","first-page":"262","article-title":"Deep Learning-Based Anonymization of Chest Radiographs: A Utility-Preserving Measure for Patient Privacy","volume":"14222","author":"Packh\u00e4user Kai","year":"2023","unstructured":"Kai Packh\u00e4user, Sebastian G\u00fcndel, Florian Thamm, Felix Denzinger, and Andreas K. Maier. 2023. Deep Learning-Based Anonymization of Chest Radiographs: A Utility-Preserving Measure for Patient Privacy. In Proceedings of International Conference on Medical Image Computing and Computer Assisted Intervention, Vol. 14222. 262--272.","journal-title":"Proceedings of International Conference on Medical Image Computing and Computer Assisted Intervention"},{"key":"e_1_3_2_1_42_1","first-page":"1","article-title":"Lung Diseases Detection Using Various Deep Learning Algorithms","volume":"2023","author":"Jasmine","year":"2023","unstructured":"Jasmine pemeena priyadarsini, Ketan Kotecha, G. Rajini, K. Hariharan, K. Raj, K. Ram, V. Indragandhi, V. Subramaniyaswamy, and Sharnil Pandya. 2023. Lung Diseases Detection Using Various Deep Learning Algorithms. Journal of Healthcare Engineering, Vol. 2023 (2023), 1--13.","journal-title":"Journal of Healthcare Engineering"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2018.8451588"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102430"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2024.104583"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00507"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the IEEE International Symposium on Biomedical Imaging.","author":"Tang Fenghe","unstructured":"Fenghe Tang, Jianrui Ding, Lingtao Wang, Chunping Ning, and S. Kevin Zhou. 2024. Carnegie Mellon UniversityNeXt: An Efficient Medical Image Segmentation Network based on Large Kernel and Skip Fusion. In Proceedings of the IEEE International Symposium on Biomedical Imaging."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the Neural Information Processing Systems. 24261--24272","author":"Tolstikhin Ilya O.","year":"2021","unstructured":"Ilya O. Tolstikhin, Neil Houlsby, Alexander Kolesnikov, Lucas Beyer, Xiaohua Zhai, Thomas Unterthiner, Jessica Yung, Andreas Steiner, Daniel Keysers, Jakob Uszkoreit, Mario Lucic, and Alexey Dosovitskiy. 2021. MLP-Mixer: An all-MLP Architecture for Vision. In Proceedings of the Neural Information Processing Systems. 24261--24272."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10446953"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the International Conference on Learning Representations.","author":"Xia Song","year":"2024","unstructured":"Song Xia, Yi Yu, Xudong Jiang, and Henghui Ding. 2024. Mitigating the Curse of Dimensionality for Certified Robustness via Dual Randomized Smoothing. In Proceedings of the International Conference on Learning Representations."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_8"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00622"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01721-8"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3317632"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the International Conference on Machine Learning (Proceedings of Machine Learning Research).","author":"Yu Yi","year":"2024","unstructured":"Yi Yu, Yufei Wang, Song Xia, Wenhan Yang, Shijian Lu, Yap-Peng Tan, and Alex C Kot. 2024. Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders. In Proceedings of the International Conference on Machine Learning (Proceedings of Machine Learning Research)."},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 12250--12259","author":"Yu Yi","unstructured":"Yi Yu, Yufei Wang, Wenhan Yang, Shijian Lu, Yap-Peng Tan, and Alex C. Kot. 2023. Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 12250--12259."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 6013--6022","author":"Yu Yi","unstructured":"Yi Yu, Wenhan Yang, Yap-Peng Tan, and Alex C. Kot. 2022. Towards Robust Rain Removal Against Adversarial Attacks: A Comprehensive Benchmark Analysis and Beyond. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 6013--6022."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Peng Zhang Li Su Liang Li Bing-Kun Bao Pamela C. Cosman Guorong Li and Qingming Huang. 2019. Training Efficient Saliency Prediction Models with Knowledge Distillation. In ACM MM. 512--520.","DOI":"10.1145\/3343031.3351089"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01928"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the Neural Information Processing Systems.","author":"Zhou Yanqi","year":"2022","unstructured":"Yanqi Zhou, Tao Lei, Hanxiao Liu, Nan Du, Yanping Huang, Vincent Y. Zhao, Andrew M. Dai, Zhifeng Chen, Quoc V. Le, and James Laudon. 2022. Mixture-of-Experts with Expert Choice Routing. In Proceedings of the Neural Information Processing Systems."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3263974"},{"key":"e_1_3_2_1_64_1","volume-title":"MP-Net: A Multi-Center Privacy-Preserving Network for Medical Image Segmentation","author":"Zhu Enjun","year":"2024","unstructured":"Enjun Zhu, Haiyu Feng, Long Chen, Yongqiang Lai, and Senchun Chai. 2024. MP-Net: A Multi-Center Privacy-Preserving Network for Medical Image Segmentation. IEEE Transactions on Medical Imaging (2024)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:07Z","timestamp":1750295887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":65,"alternative-id":["10.1145\/3664647.3680806","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680806","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}