{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:12:44Z","timestamp":1724112764262},"reference-count":50,"publisher":"SPIE-Intl Soc Optical Eng","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Electron. Imag."],"published-print":{"date-parts":[[2024,8,16]]},"DOI":"10.1117\/1.jei.33.4.043049","type":"journal-article","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T19:28:07Z","timestamp":1723836487000},"source":"Crossref","is-referenced-by-count":0,"title":["Frequency domain-based reversible adversarial attacks for privacy protection in Internet of Things"],"prefix":"10.1117","volume":"33","author":[{"given":"Yang","family":"Lu","sequence":"first","affiliation":[{"name":"Henan University, School of Artificial Intelligence, Henan Engineering Research Center for Industrial Internet of Things, Zhengzhou, China"}]},{"given":"Tianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"Henan University, School of Artificial Intelligence, Henan Engineering Research Center for Industrial Internet of Things, Zhengzhou, China"}]},{"given":"Zilong","family":"Pang","sequence":"additional","affiliation":[{"name":"Henan University, Institute of Intelligent Network System, School of Software, Intelligent Data Processing Engineering Research Center of Henan Province, Kaifeng, China"}]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[{"name":"Henan University, School of Artificial Intelligence, Henan Engineering Research Center for Industrial Internet of Things, Zhengzhou, China"}]},{"given":"Zhen","family":"Chen","sequence":"additional","affiliation":[{"name":"Henan University, School of Artificial Intelligence, Henan Engineering Research Center for Industrial Internet of Things, Zhengzhou, China"}]},{"given":"Zongwei","family":"Tang","sequence":"additional","affiliation":[{"name":"Henan University, School of Artificial Intelligence, Henan Engineering Research Center for Industrial Internet of Things, Zhengzhou, China"}]}],"member":"189","reference":[{"key":"r1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3228781"},{"key":"r2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3373636"},{"article-title":"Generative adversarial nets","year":"2014","author":"Goodfellow","key":"r3"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"Szegedy","key":"r4"},{"key":"r5","first-page":"1589","article-title":"Fawkes: protecting privacy against unauthorized deep learning models","author":"Shan","year":"2020"},{"key":"r6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2987694"},{"key":"r7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3210010"},{"key":"r8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.05.020"},{"key":"r9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15383-0"},{"key":"r10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.12.018"},{"key":"r11","doi-asserted-by":"publisher","DOI":"10.1109\/ICME51207.2021.9428115"},{"key":"r12","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859698"},{"key":"r13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3207008"},{"key":"r14","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.31.6.063046"},{"key":"r15","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.33.2.023039"},{"key":"r16","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.33.2.023047"},{"key":"r17","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.31.4.043040"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"r18"},{"key":"r19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"r20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"r21","doi-asserted-by":"publisher","DOI":"10.3390\/app14083315"},{"article-title":"A frequency perspective of adversarial robustness","year":"2021","author":"Maiya","key":"r22"},{"article-title":"Unauthorized AI cannot recognize me: reversible adversarial example","year":"2018","author":"Liu","key":"r23"},{"article-title":"Reversible adversarial attack based on reversible image transformation","year":"2019","author":"Yin","key":"r24"},{"key":"r25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.11.014"},{"key":"r26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109549"},{"article-title":"Hiding images in plain sight: deep steganography","year":"2017","author":"Baluja","key":"r27"},{"key":"r28","first-page":"87","article-title":"High-capacity convolutional video steganography with temporal residual modeling","author":"Weng","year":"2019"},{"article-title":"ESRGAN: enhanced super-resolution generative adversarial networks","year":"2018","author":"Wang","key":"r29"},{"article-title":"Discovering adversarial examples with momentum","year":"2017","author":"Dong","key":"r30"},{"key":"r31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58604-1_19"},{"key":"r32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.150"},{"key":"r33","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"article-title":"Caltech-256 object category dataset","year":"2007","author":"Griffin","key":"r34"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"r35"},{"key":"r36","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"r37","doi-asserted-by":"crossref","DOI":"10.2478\/popets-2021-0006","article-title":"On the (IM) practicality of adversarial perturbation for image privacy","author":"Rajabi","year":"2021"},{"key":"r38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3186791"},{"key":"r39","first-page":"4322","article-title":"Decoupling direction and norm for efficient gradient-based l2 adversarial attacks and defenses","author":"Rony","year":"2019"},{"article-title":"Countering adversarial images using input transformations","year":"2017","author":"Guo","key":"r40"},{"key":"r41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00894"},{"key":"r42","first-page":"196","article-title":"Shield: fast, practical defense and vaccination for deep learning using JPEG compression","author":"Das","year":"2018"},{"key":"r43","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2940533"},{"key":"r44","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683044"},{"key":"r45","first-page":"12835","article-title":"Towards defending against adversarial examples via attack-invariant features","author":"Zhou","year":"2021"},{"key":"r46","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2528162"},{"key":"r47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"r48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"article-title":"Delving into transferable adversarial examples and black-box attacks","year":"2016","author":"Liu","key":"r49"},{"key":"r50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"}],"container-title":["Journal of Electronic Imaging"],"original-title":[],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T21:26:54Z","timestamp":1724102814000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.spiedigitallibrary.org\/journals\/journal-of-electronic-imaging\/volume-33\/issue-04\/043049\/Frequency-domain-based-reversible-adversarial-attacks-for-privacy-protection-in\/10.1117\/1.JEI.33.4.043049.full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":50,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2024,7,1]]}},"URL":"https:\/\/doi.org\/10.1117\/1.jei.33.4.043049","relation":{},"ISSN":["1017-9909"],"issn-type":[{"type":"print","value":"1017-9909"}],"subject":[],"published":{"date-parts":[[2024,8,16]]}}}