{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:18:56Z","timestamp":1725409136542},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802111","61872125"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Pre- Research Project of SongShan Laboratory","award":["YYJC012022011"]},{"name":"Science and Technology Project of Henan Province","award":["232102210109","232102210096"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,1]]},"DOI":"10.1109\/jiot.2024.3373636","type":"journal-article","created":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T19:15:33Z","timestamp":1709666133000},"page":"20757-20768","source":"Crossref","is-referenced-by-count":2,"title":["RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5527-6117","authenticated-orcid":false,"given":"Zhen","family":"Chen","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Henan University, Zhengzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1609-0624","authenticated-orcid":false,"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Henan University, Zhengzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1138-1887","authenticated-orcid":false,"given":"Zhihua","family":"Gan","sequence":"additional","affiliation":[{"name":"School of Software, Henan University, Kaifeng, China"}]},{"given":"Binjie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Henan University, Zhengzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8183-8435","authenticated-orcid":false,"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3228781"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3213875"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3301042"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01459"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC57700.2023.00099"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413976"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3065172"},{"key":"ref9","article-title":"Lowkey: Leveraging adversarial attacks to protect social media users from facial recognition","author":"Cherepanova","year":"2021","journal-title":"arXiv:2101.07922"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976700.24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.109048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109549"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3207008"},{"key":"ref15","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref16","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv:1611.01236"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3134466"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.819579"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247707"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.726"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01128"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.0266"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34120-6_28"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00702"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16205"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00373"},{"key":"ref28","article-title":"Reversible adversarial attack based on reversible image transformation","author":"Yin","year":"2019","journal-title":"arXiv:1911.02360"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859698"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.12.018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723653"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/003754970107600201"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19781-9_1"},{"key":"ref35","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"volume-title":"APTOS 2019 blindness detection","year":"2019","author":"Dane","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2018.161"},{"volume-title":"Brain tumor MRI dataset","year":"2021","author":"Nickparvar","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2018.02.010"},{"volume-title":"BCCD: Blood cell count and detection","year":"2018","author":"Cheng","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-013-9622-7"},{"key":"ref42","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref44","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.l007\/978-3-319-46448-0_2"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref49","first-page":"1","article-title":"Rethinking atrous convolution for semantic image segmentation","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit.","author":"Florian"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1049\/el:20080522"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10536937\/10460291.pdf?arnumber=10460291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T04:36:03Z","timestamp":1725338163000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10460291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,1]]},"references-count":51,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3373636","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,6,1]]}}}