{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:45:33Z","timestamp":1725432333788},"reference-count":17,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1016\/j.future.2022.03.021","type":"journal-article","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T17:01:34Z","timestamp":1647536494000},"page":"169-170","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"special_numbering":"C","title":["Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications"],"prefix":"10.1016","volume":"133","author":[{"given":"Qin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.future.2022.03.021_b1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/TSC.2019.2922177","article-title":"Enabling verifiable and dynamic ranked search over outsourced data","volume":"15","author":"Liu","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"10.1016\/j.future.2022.03.021_b2","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/TNSM.2020.3045467","article-title":"Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing","volume":"18","author":"Liu","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.future.2022.03.021_b3","series-title":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","article-title":"When deep learning meets steganography: Protecting inference privacy in the dark","author":"Liu","year":"2022"},{"key":"10.1016\/j.future.2022.03.021_b4","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1016\/j.future.2020.08.014","article-title":"Privacy-preserving quality prediction for edge-based IoT services","volume":"114","author":"Zhang","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b5","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.future.2021.06.046","article-title":"PBC4occ: A novel contrast pattern-based classifier for one-class classification","volume":"125","author":"Aguilar","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b6","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1016\/j.future.2021.07.027","article-title":"Cloud-based privacy- and integrity-protecting density peaks clustering","volume":"125","author":"Yang","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b7","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.future.2021.08.009","article-title":"STPD: Defending against \u21130-norm attacks with space transformation","volume":"126","author":"Chen","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b8","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2021.09.003","article-title":"A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning","volume":"127","author":"Ren","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b9","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.future.2021.09.016","article-title":"An anti-malicious task allocation mechanism in crowdsensing systems","volume":"127","author":"Wu","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b10","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.future.2021.09.015","article-title":"An adaptive federated learning scheme with differential privacy preserving","volume":"127","author":"Wu","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b11","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.future.2021.09.013","article-title":"Radial basis function network with differential privacy","volume":"127","author":"Bugshan","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b12","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/j.future.2021.09.025","article-title":"Autoencoder-based feature construction for IoT attacks clustering","volume":"127","author":"Haseeb","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b13","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.future.2021.09.039","article-title":"A new detection method for LDoS attacks based on data mining","volume":"128","author":"Tang","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b14","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.future.2021.10.008","article-title":"Efficient algorithms for victim item selection in privacy-preserving utility mining","volume":"128","author":"Jangra","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b15","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.future.2021.10.017","article-title":"Non-interactive verifiable privacy-preserving federated learning","volume":"128","author":"Xu","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b16","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.future.2021.11.005","article-title":"Android malware obfuscation variants detection method based on multi-granularity opcode features","volume":"129","author":"Tang","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2022.03.021_b17","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1016\/j.future.2021.11.032","article-title":"Differentially private facial obfuscation via generative adversarial networks","volume":"129","author":"Croft","year":"2022","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22000966?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22000966?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T03:02:37Z","timestamp":1666062157000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X22000966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":17,"alternative-id":["S0167739X22000966"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2022.03.021","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2022,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2022.03.021","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}