{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:58:53Z","timestamp":1725515933893},"reference-count":26,"publisher":"World Scientific Pub Co Pte Lt","issue":"16","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61003032"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011151","name":"Key Laboratory of Computer Network and Information Integration","doi-asserted-by":"crossref","award":["CARCH201811"],"id":[{"id":"10.13039\/501100011151","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2019J078"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2020,12,30]]},"abstract":" Model stealing attack may happen by stealing useful data transmitted from embedded end to server end for an artificial intelligent systems. In this paper, we are interested in preventing model stealing of neural network for resource-constrained systems. We propose an Image Encryption based on Class Activation Map (IECAM) to encrypt information before transmitting in embedded end. According to class activation map, IECAM chooses certain key areas of the image to be encrypted with the purpose of reducing the model stealing risk of neural network. With partly encrypted information, IECAM can greatly reduce the time overheads of encryption\/decryption in both embedded and server ends, especially for big size images. The experimental results demonstrate that our method can significantly reduce time overheads of encryption\/decryption and the risk of model stealing compared with traditional methods. <\/jats:p>","DOI":"10.1142\/s0218126620502527","type":"journal-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T07:28:54Z","timestamp":1590737334000},"page":"2050252","source":"Crossref","is-referenced-by-count":9,"title":["A Low-Cost Image Encryption Method to Prevent Model Stealing of Deep Neural Network"],"prefix":"10.1142","volume":"29","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6181-3900","authenticated-orcid":false,"given":"Wei","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, P. R. China"}]},{"given":"Zicheng","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, P. R. China"}]},{"given":"Jinyu","family":"Zhan","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, P. R. China"}]},{"given":"Zhiyuan","family":"He","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, P. R. China"}]},{"given":"Weijia","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2020,5,28]]},"reference":[{"key":"S0218126620502527BIB001","first-page":"1","volume-title":"IEEE\/ACM Proc. Design, Automation Conf.","author":"Wang Y.","year":"2016"},{"key":"S0218126620502527BIB002","first-page":"1","volume-title":"Int. Joint Conf. Neural Networks","author":"Rodrigues J.","year":"2018"},{"key":"S0218126620502527BIB003","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.optcom.2014.12.026","volume":"341","author":"Wen W.","year":"2015","journal-title":"Opt. Commun."},{"key":"S0218126620502527BIB004","first-page":"104","volume-title":"The 2nd Int. Conf. I-SMAC (IoT in Social, Mobile, Analytics and Cloud)","author":"Gurunath R.","year":"2018"},{"key":"S0218126620502527BIB005","first-page":"1","volume-title":"Int. Conf. Advanced Computing and Communication Systems","author":"Prusty A. K.","year":"2013"},{"key":"S0218126620502527BIB006","first-page":"164","volume-title":"Int. Conf. Recent Advances in Electronics and Communication Technology","author":"Radhika K. R.","year":"2017"},{"key":"S0218126620502527BIB007","first-page":"512","volume-title":"European Symp. Security and Privacy","author":"Juuti M.","year":"2019"},{"key":"S0218126620502527BIB009","first-page":"57","volume-title":"2nd Int. Conf. Signal Processing Systems","author":"Su Y.","year":"2010"},{"key":"S0218126620502527BIB010","first-page":"1","volume-title":"IEEE Int. Conf. Computational Intelligence and Computing Research","author":"Arumugam A. S.","year":"2010"},{"key":"S0218126620502527BIB011","first-page":"44","volume-title":"IEEE 3rd Int. Verification and Security Workshop","author":"Elhamshary A.","year":"2018"},{"key":"S0218126620502527BIB012","first-page":"204","volume-title":"2nd Int. Conf. I-SMAC (IoT in Social, Mobile, Analytics and Cloud)","author":"Anandkumar R.","year":"2018"},{"key":"S0218126620502527BIB013","first-page":"1930002:1","volume":"28","author":"Chai H.","year":"2019","journal-title":"J. Circuits Syst. Comput."},{"key":"S0218126620502527BIB014","author":"Zhou J.","year":"2019","journal-title":"IEEE Trans. Services Computing"},{"key":"S0218126620502527BIB015","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2020.101739","volume":"107","author":"Jiang W.","year":"2020","journal-title":"J. Syst. Architect."},{"key":"S0218126620502527BIB016","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1016\/j.micpro.2016.08.002","volume":"52","author":"Jiang W.","year":"2017","journal-title":"Microprocess. Microsyst."},{"key":"S0218126620502527BIB017","doi-asserted-by":"crossref","first-page":"4378","DOI":"10.1109\/TIE.2017.2762621","volume":"65","author":"Xie G.","year":"2018","journal-title":"IEEE Trans. Ind. Electron."},{"key":"S0218126620502527BIB018","author":"Xie G.","year":"2019","journal-title":"IEEE Trans. Ind. Electron."},{"key":"S0218126620502527BIB019","first-page":"1930007:1","volume":"28","author":"Chai H.","year":"2019","journal-title":"J. Circuits Syst. Comput."},{"key":"S0218126620502527BIB020","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/TCAD.2018.2846652","volume":"38","author":"Jiang W.","year":"2019","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"S0218126620502527BIB021","doi-asserted-by":"crossref","first-page":"1785","DOI":"10.1109\/TC.2019.2935042","volume":"68","author":"Zhou J.","year":"2019","journal-title":"IEEE Trans. Comput."},{"key":"S0218126620502527BIB022","doi-asserted-by":"crossref","first-page":"2215","DOI":"10.1109\/TCAD.2018.2883993","volume":"38","author":"Zhou J.","year":"2019","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"S0218126620502527BIB023","author":"Xie G.","year":"2019","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"S0218126620502527BIB024","first-page":"2921","volume-title":"IEEE Conf. Computer Vision and Pattern Recognition","author":"Zhou B.","year":"2016"},{"key":"S0218126620502527BIB026","first-page":"1","volume-title":"IEEE Conf. Computer Vision and Pattern Recognition","author":"Szegedy C.","year":"2015"},{"key":"S0218126620502527BIB027","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"Rumelhart D. E.","year":"1986","journal-title":"Nature"},{"key":"S0218126620502527BIB029","first-page":"3856","volume-title":"Proc. Neural Information Processing Systems","author":"Sabour S.","year":"2017"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126620502527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T08:28:44Z","timestamp":1609748924000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126620502527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,28]]},"references-count":26,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2020,12,30]]}},"alternative-id":["10.1142\/S0218126620502527"],"URL":"https:\/\/doi.org\/10.1142\/s0218126620502527","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"value":"0218-1266","type":"print"},{"value":"1793-6454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,28]]}}}