{"id":"https://openalex.org/W4401809204","doi":"https://doi.org/10.1109/atsip62566.2024.10638939","title":"Decentralized distribution for secure GAN using IPFS with the Hyperledger blockchain","display_name":"Decentralized distribution for secure GAN using IPFS with the Hyperledger blockchain","publication_year":2024,"publication_date":"2024-07-11","ids":{"openalex":"https://openalex.org/W4401809204","doi":"https://doi.org/10.1109/atsip62566.2024.10638939"},"language":"en","primary_location":{"id":"doi:10.1109/atsip62566.2024.10638939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atsip62566.2024.10638939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093430826","display_name":"Arkan M. Al-Sarray","orcid":null},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Arkan M. Al-Sarray","raw_affiliation_strings":["University of Sfax,REGIM-Lab: REsearch Groups in Intelligent Machines, National Engineering School of Sfax (ENIS),Sfax,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Sfax,REGIM-Lab: REsearch Groups in Intelligent Machines, National Engineering School of Sfax (ENIS),Sfax,Tunisia","institution_ids":["https://openalex.org/I142899784"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027895815","display_name":"Tarek M. Hamdani","orcid":"https://orcid.org/0000-0002-8243-6056"},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Tarek M. Hamdani","raw_affiliation_strings":["University of Sfax,REGIM-Lab: REsearch Groups in Intelligent Machines, National Engineering School of Sfax (ENIS),Sfax,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Sfax,REGIM-Lab: REsearch Groups in Intelligent Machines, National Engineering School of Sfax (ENIS),Sfax,Tunisia","institution_ids":["https://openalex.org/I142899784"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053613060","display_name":"Adel M. Alimi","orcid":"https://orcid.org/0000-0002-0642-3384"},"institutions":[{"id":"https://openalex.org/I142899784","display_name":"University of Sfax","ror":"https://ror.org/04d4sd432","country_code":"TN","type":"education","lineage":["https://openalex.org/I142899784"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Adel M. Alimi","raw_affiliation_strings":["University of Sfax,REGIM-Lab: REsearch Groups in Intelligent Machines, National Engineering School of Sfax (ENIS),Sfax,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Sfax,REGIM-Lab: REsearch Groups in Intelligent Machines, National Engineering School of Sfax (ENIS),Sfax,Tunisia","institution_ids":["https://openalex.org/I142899784"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093430826"],"corresponding_institution_ids":["https://openalex.org/I142899784"],"apc_list":null,"apc_paid":null,"fwci":1.7184,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87661605,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"110","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9428598880767822},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5876244306564331},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3226143419742584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2620812654495239}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9428598880767822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5876244306564331},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3226143419742584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2620812654495239}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/atsip62566.2024.10638939","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atsip62566.2024.10638939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2792850657","https://openalex.org/W3010086541","https://openalex.org/W3015896431","https://openalex.org/W3030641659","https://openalex.org/W3046108963","https://openalex.org/W3109863731","https://openalex.org/W3118030655","https://openalex.org/W3118676487","https://openalex.org/W3165605428","https://openalex.org/W3172704433","https://openalex.org/W3175691375","https://openalex.org/W3217338151","https://openalex.org/W4229013449","https://openalex.org/W4282923875","https://openalex.org/W4290993470","https://openalex.org/W4313558946","https://openalex.org/W4389385772","https://openalex.org/W4390357467","https://openalex.org/W4391093974","https://openalex.org/W4391608763","https://openalex.org/W4391615775"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894"],"abstract_inverted_index":{"Centralized":[0],"storage":[1,50],"and":[2,7,14,23,36,55,76,86,100,117,137,148],"security":[3,160],"problems":[4],"make":[5],"training":[6],"machine":[8],"learning":[9],"models":[10,22],"vulnerable":[11],"to":[12,69,144],"manipulation":[13],"stealing.":[15],"To":[16,150],"provide":[17],"safe":[18],"transfer":[19],"of":[20,93],"GAN":[21],"data,":[24],"our":[25],"proposed":[26,40],"method,":[27],"IH-EAGAN,":[28],"offers":[29],"the":[30,91,105,108],"design":[31],"a":[32,78,84,123,152],"highly":[33],"effective,":[34],"efficient,":[35],"security-level":[37],"solution.":[38],"The":[39,80],"solution":[41],"is":[42,83,98,120,128],"based":[43],"on":[44],"IPFS":[45],"(InterPlanetary":[46],"File":[47],"System)":[48],"decentralization":[49],"for":[51,115,140,146],"GAN\u2019s":[52],"encoder":[53],"model":[54,57],"decoder":[56],"being":[58],"utilized":[59],"in":[60],"conjunction":[61],"with":[62,104],"hyperledger":[63,119],"blockchain":[64,88],"technologies,":[65],"which":[66,127],"allows":[67],"participants":[68],"manage":[70],"their":[71],"transactions,":[72],"utilizes":[73],"smart":[74],"contracts":[75],"has":[77],"ledger.":[79],"Hyperledger":[81],"Fabric":[82],"private":[85],"permissioned":[87],"system.":[89],"For":[90],"purpose":[92],"ensuring":[94],"that":[95,101,156],"this":[96],"data":[97],"unchangeable":[99],"any":[102],"interaction":[103],"ledger":[106],"through":[107],"Chaincode":[109],"will":[110],"be":[111],"logged":[112],"by":[113,122,131],"fabric":[114],"accountability":[116],"transparency,":[118],"supported":[121],"secret":[124],"chaos":[125],"key,":[126],"known":[129],"only":[130],"two":[132],"legitimate":[133],"parties":[134],"(sender":[135],"side":[136],"receiver":[138],"side)":[139],"execution":[141],"encryption":[142],"peer":[143,145],"verification":[147],"authentication.":[149],"construct":[151],"robust,":[153],"integrated":[154],"system":[155],"protects":[157],"privacy":[158],"against":[159],"breaches.":[161]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
