{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:11:49Z","timestamp":1753888309576,"version":"3.41.2"},"reference-count":49,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":181,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009377","name":"Education Department of Hunan Province","doi-asserted-by":"publisher","award":["20K046"],"award-info":[{"award-number":["20K046"]}],"id":[{"id":"10.13039\/100009377","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836217"],"award-info":[{"award-number":["U1836217"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The device group based on the Internet of Things (IoT) has been used in face recognition in real life, so it is more necessary to discuss the current data security issues and social hot issues. The Internet of Things device combines edge conditions and many recognizers to generative adversarial networks. On the premise of meeting the needs of partial occlusion of users, face recovery is completed through information reorganization. CelebA training set is used to simulate face occlusion, and the model is trained and tested. The results show that the method can recover the complete image of the protection for the facial privacy of specific people. At the same time, the IoT device using this method ensures that the face information is not easy to have tampered with when attacked.<\/jats:p>","DOI":"10.1155\/2021\/6948293","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T12:21:19Z","timestamp":1625142079000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks"],"prefix":"10.1155","volume":"2021","author":[{"given":"Wenqiu","family":"Zhu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoyi","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3618-6068","authenticated-orcid":false,"given":"Yuezhong","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guang","family":"Zou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","published-online":{"date-parts":[[2021,7]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_10_1_2","DOI":"10.1109\/COMST.2020.2988293"},{"doi-asserted-by":"publisher","key":"e_1_2_10_2_2","DOI":"10.1109\/JIOT.2019.2962863"},{"doi-asserted-by":"publisher","key":"e_1_2_10_3_2","DOI":"10.1109\/TETC.2020.3005610"},{"doi-asserted-by":"publisher","key":"e_1_2_10_4_2","DOI":"10.1109\/tcc.2021.3057771"},{"doi-asserted-by":"publisher","key":"e_1_2_10_5_2","DOI":"10.1109\/tsc.2019.2953033"},{"doi-asserted-by":"publisher","key":"e_1_2_10_6_2","DOI":"10.11959\/j.issn.1000-436x.2018037"},{"doi-asserted-by":"publisher","key":"e_1_2_10_7_2","DOI":"10.1109\/jiot.2019.2960631"},{"doi-asserted-by":"publisher","key":"e_1_2_10_8_2","DOI":"10.1155\/2020\/8843803"},{"doi-asserted-by":"crossref","unstructured":"CaiZ.andHeZ. Trading private range counting over big IoT data 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) July 2019 Dallas TX USA 144\u2013153 https:\/\/doi.org\/10.1109\/icdcs.2019.00023.","key":"e_1_2_10_9_2","DOI":"10.1109\/ICDCS.2019.00023"},{"doi-asserted-by":"publisher","key":"e_1_2_10_10_2","DOI":"10.1109\/TETC.2018.2860051"},{"doi-asserted-by":"publisher","key":"e_1_2_10_11_2","DOI":"10.1109\/JSAC.2020.2980802"},{"doi-asserted-by":"publisher","key":"e_1_2_10_12_2","DOI":"10.1109\/TII.2021.3061419"},{"doi-asserted-by":"publisher","key":"e_1_2_10_13_2","DOI":"10.1109\/TII.2020.2975227"},{"doi-asserted-by":"publisher","key":"e_1_2_10_14_2","DOI":"10.1109\/TII.2020.3022432"},{"doi-asserted-by":"publisher","key":"e_1_2_10_15_2","DOI":"10.1080\/10867651.2004.10487596"},{"doi-asserted-by":"publisher","key":"e_1_2_10_16_2","DOI":"10.1007\/978-3-540-30502-6_18"},{"doi-asserted-by":"publisher","key":"e_1_2_10_17_2","DOI":"10.1145\/1400181.1400202"},{"doi-asserted-by":"publisher","key":"e_1_2_10_18_2","DOI":"10.1145\/2018396.2018421"},{"doi-asserted-by":"crossref","unstructured":"SunJ. Computing nearest-neighbor fields via Propagation-Assisted KD-Trees 2012 IEEE Conference on Computer Vision and Pattern Recognition June 2012 Providence RI USA 111\u2013118 https:\/\/doi.org\/10.1109\/cvpr.2012.6247665 2-s2.0-84866668394.","key":"e_1_2_10_19_2","DOI":"10.1109\/CVPR.2012.6247665"},{"doi-asserted-by":"publisher","key":"e_1_2_10_20_2","DOI":"10.1109\/tdsc.2016.2613521"},{"doi-asserted-by":"publisher","key":"e_1_2_10_21_2","DOI":"10.1109\/TNSE.2018.2830307"},{"doi-asserted-by":"publisher","key":"e_1_2_10_22_2","DOI":"10.1109\/TNSE.2020.2976697"},{"doi-asserted-by":"publisher","key":"e_1_2_10_23_2","DOI":"10.1002\/cpe.5556"},{"doi-asserted-by":"publisher","key":"e_1_2_10_24_2","DOI":"10.1109\/tii.2020.3012157"},{"doi-asserted-by":"publisher","key":"e_1_2_10_25_2","DOI":"10.1109\/TII.2020.2977886"},{"doi-asserted-by":"publisher","key":"e_1_2_10_26_2","DOI":"10.1109\/tii.2020.3047675"},{"doi-asserted-by":"publisher","key":"e_1_2_10_27_2","DOI":"10.1109\/TNSE.2021.3055762"},{"doi-asserted-by":"publisher","key":"e_1_2_10_28_2","DOI":"10.1109\/tcbb.2020.2994780"},{"doi-asserted-by":"publisher","key":"e_1_2_10_29_2","DOI":"10.1145\/3422622"},{"volume-title":"Generative Adversarial Networks: A Survey Towards Private and Secure Applications","year":"2021","author":"Cai Z.","key":"e_1_2_10_30_2"},{"doi-asserted-by":"crossref","unstructured":"KrahenbuhlP. DonahueJ. DarrellT. andEfrosA. Context-encoders: feature learning by inpainting 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) June 2016 Las Vegas NV USA 2536\u20132544 https:\/\/doi.org\/10.1109\/cvpr.2016.278 2-s2.0-84986294165.","key":"e_1_2_10_31_2","DOI":"10.1109\/CVPR.2016.278"},{"doi-asserted-by":"publisher","key":"e_1_2_10_32_2","DOI":"10.1145\/3072959.3073659"},{"doi-asserted-by":"crossref","unstructured":"YuJ. LinZ. YangJ. ShenX. andLuX. Generative image inpainting with contextual attention In Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition 2018 Salt Lake City UT USA 5505\u20135514.","key":"e_1_2_10_33_2","DOI":"10.1109\/CVPR.2018.00577"},{"unstructured":"ZhangH. GoodfellowI. MetaxasD. andOdenaA. Self-attention generative adversarial networks 2018 https:\/\/arxiv.org\/pdf\/1805.08318.pdf.","key":"e_1_2_10_34_2"},{"doi-asserted-by":"crossref","unstructured":"YuJ. LinZ. YangJ. ShenX. LuX. andHuangT. Free-form image inpainting with gated convolution In Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV) 2019; Seoul Korea(South) 4470\u20134479.","key":"e_1_2_10_35_2","DOI":"10.1109\/ICCV.2019.00457"},{"key":"e_1_2_10_36_2","first-page":"129","article-title":"Face completion algorithm based on condition generation adversarial network","volume":"38","author":"Kun C.","year":"2019","journal-title":"Transducer and Microsystem Technologies(China)"},{"doi-asserted-by":"crossref","unstructured":"XieC. LiuS. LiC. ChengM. ZuoW. LiuX. WenS. andDingE. Image inpainting with learnable bidirectional attention maps In Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV) 2019 Seoul Korea(South) 8857\u20138866.","key":"e_1_2_10_37_2","DOI":"10.1109\/ICCV.2019.00895"},{"unstructured":"NazeriK. NgE. JosephF. QureshiF. andEbrahimiM. EdgeConnect: generative image inpainting with adversarial edge learning 2019 https:\/\/arxiv.org\/pdf\/1901.00212v3.pdf.","key":"e_1_2_10_38_2"},{"unstructured":"MiyatoT. KataokaT. KoyamaM. andYoshidaY. Spectral Normalization for Generative Adversarial Networks 2018 International Conference on Learning Representations Vancouver Convention Center Vancouver Canada.","key":"e_1_2_10_39_2"},{"doi-asserted-by":"crossref","unstructured":"LiuG. RedaF. ShihK. WangT.-C. TaoA. andCatanzaroB. Image inpainting for irregular holes using partial convolutions In Proceedings of the European Conference on Computer Vision 2018 89\u2013105.","key":"e_1_2_10_40_2","DOI":"10.1007\/978-3-030-01252-6_6"},{"doi-asserted-by":"publisher","key":"e_1_2_10_41_2","DOI":"10.1126\/science.1127647"},{"doi-asserted-by":"crossref","unstructured":"MokrisI.andSkovajsovaL. Proposal of cascade neural network model for text document space dimension reduction by latent semantic indexing In Proceedings of the 2008 6th International Symposium on Applied Machine Intelligence and Informatics 2008 79\u201384.","key":"e_1_2_10_42_2","DOI":"10.1109\/SAMI.2008.4469139"},{"doi-asserted-by":"crossref","unstructured":"LatrecheA.andGuezouliL. Similarity measure for semi-structured information retrieval based on the path and neighborhood In Proceedings of the 2012 International Conference on Information Technology and e-Services 2012 1\u20135.","key":"e_1_2_10_43_2","DOI":"10.1109\/ICITeS.2012.6216597"},{"doi-asserted-by":"crossref","unstructured":"JohnsonJ. AlahiA. andFei-FeiL. Perceptual losses for real-time style transfer and super-resolution In Proceedings of the Computer Vision - ECCV 2016 2016 Amsterdam The Netherlands 694\u2013711.","key":"e_1_2_10_44_2","DOI":"10.1007\/978-3-319-46475-6_43"},{"doi-asserted-by":"crossref","unstructured":"HeK. ZhangX. RenS. andSunJ. Deep residual learning for image recognition In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016 Las Vegas NV USA 770\u2013778.","key":"e_1_2_10_45_2","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_10_46_2","first-page":"150","article-title":"Face inpainting algorithm combining edge information with gated convolution","volume":"15","author":"Fupin W.","year":"2021","journal-title":"Journal of Frontiers of Computer Science and Technology(China)"},{"key":"e_1_2_10_47_2","first-page":"1409","article-title":"Very deep convolutional networks for large-scale image recognition","volume":"4","author":"Simonyan K.","year":"2014","journal-title":"Computer Science"},{"doi-asserted-by":"crossref","unstructured":"LiuZ. LuoP. WangX. andTangX. Deep learning face attributes in the wild In Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV) 2015 Sadversarial ago Chile 3730\u20133738.","key":"e_1_2_10_48_2","DOI":"10.1109\/ICCV.2015.425"},{"key":"e_1_2_10_49_2","first-page":"1","article-title":"Adam: a method for stochastic optimization","volume":"12","author":"Kingma D.","year":"2014","journal-title":"Computer Research Repository"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6948293.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6948293.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6948293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:59:15Z","timestamp":1723039155000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6948293"}},"subtitle":[],"editor":[{"given":"Zhuojun","family":"Duan","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6948293"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6948293","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6948293"}}