{"id":"https://openalex.org/W2778864915","doi":"https://doi.org/10.1109/cns.2017.8228627","title":"CAPIA: Cloud assisted privacy-preserving image annotation","display_name":"CAPIA: Cloud assisted privacy-preserving image annotation","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2778864915","doi":"https://doi.org/10.1109/cns.2017.8228627","mag":"2778864915"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2017.8228627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2017.8228627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029688325","display_name":"Yifan Tian","orcid":"https://orcid.org/0009-0002-1262-0971"},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yifan Tian","raw_affiliation_strings":["Department of ECSSE, Embry-Riddle Aeronautical University, FL"],"affiliations":[{"raw_affiliation_string":"Department of ECSSE, Embry-Riddle Aeronautical University, FL","institution_ids":["https://openalex.org/I84475105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101807622","display_name":"Yantian Hou","orcid":"https://orcid.org/0000-0001-8295-6871"},"institutions":[{"id":"https://openalex.org/I120156002","display_name":"Boise State University","ror":"https://ror.org/02e3zdp86","country_code":"US","type":"education","lineage":["https://openalex.org/I120156002"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yantian Hou","raw_affiliation_strings":["Department of CS, Boise State University, Boise, ID"],"affiliations":[{"raw_affiliation_string":"Department of CS, Boise State University, Boise, ID","institution_ids":["https://openalex.org/I120156002"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033545201","display_name":"Jiawei Yuan","orcid":"https://orcid.org/0000-0003-3447-0740"},"institutions":[{"id":"https://openalex.org/I84475105","display_name":"Embry\u2013Riddle Aeronautical University","ror":"https://ror.org/010jskt71","country_code":"US","type":"education","lineage":["https://openalex.org/I84475105"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiawei Yuan","raw_affiliation_strings":["Department of ECSSE, Embry-Riddle Aeronautical University, FL"],"affiliations":[{"raw_affiliation_string":"Department of ECSSE, Embry-Riddle Aeronautical University, FL","institution_ids":["https://openalex.org/I84475105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029688325"],"corresponding_institution_ids":["https://openalex.org/I84475105"],"apc_list":null,"apc_paid":null,"fwci":0.4149,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.73810024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.8644164204597473},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8641273975372314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8629844784736633},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.6586906909942627},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6248094439506531},{"id":"https://openalex.org/keywords/semantic-gap","display_name":"Semantic gap","score":0.4533095955848694},{"id":"https://openalex.org/keywords/annotation","display_name":"Annotation","score":0.4515397846698761},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4025799632072449},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.3682275414466858},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3671586215496063},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3328612446784973},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.32026776671409607},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.246160626411438},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20539674162864685},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12161427736282349}],"concepts":[{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.8644164204597473},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8641273975372314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8629844784736633},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.6586906909942627},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6248094439506531},{"id":"https://openalex.org/C86034646","wikidata":"https://www.wikidata.org/wiki/Q474311","display_name":"Semantic gap","level":4,"score":0.4533095955848694},{"id":"https://openalex.org/C2776321320","wikidata":"https://www.wikidata.org/wiki/Q857525","display_name":"Annotation","level":2,"score":0.4515397846698761},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4025799632072449},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.3682275414466858},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3671586215496063},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3328612446784973},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.32026776671409607},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.246160626411438},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20539674162864685},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12161427736282349}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cns.2017.8228627","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2017.8228627","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarworks.boisestate.edu:cs_facpubs-1129","is_oa":false,"landing_page_url":"https://scholarworks.boisestate.edu/cs_facpubs/126","pdf_url":null,"source":{"id":"https://openalex.org/S4377196366","display_name":"Scholar Works  (Boise State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I120156002","host_organization_name":"Boise State University","host_organization_lineage":["https://openalex.org/I120156002"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Faculty Publications and Presentations","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1506806321","https://openalex.org/W1519321993","https://openalex.org/W1874619058","https://openalex.org/W1973393984","https://openalex.org/W1982306593","https://openalex.org/W1983988843","https://openalex.org/W2006147162","https://openalex.org/W2010126199","https://openalex.org/W2054701320","https://openalex.org/W2063695313","https://openalex.org/W2080955644","https://openalex.org/W2087173276","https://openalex.org/W2093175219","https://openalex.org/W2100975556","https://openalex.org/W2101234009","https://openalex.org/W2108590723","https://openalex.org/W2110764733","https://openalex.org/W2146024151","https://openalex.org/W2147929033","https://openalex.org/W2157465536","https://openalex.org/W2161214567","https://openalex.org/W2295797066","https://openalex.org/W2979473749","https://openalex.org/W3097609957","https://openalex.org/W3210232381","https://openalex.org/W4300349690","https://openalex.org/W6675354045","https://openalex.org/W6683799570","https://openalex.org/W6803376173"],"related_works":["https://openalex.org/W2376984068","https://openalex.org/W1996899447","https://openalex.org/W2172231696","https://openalex.org/W2506386910","https://openalex.org/W2089969684","https://openalex.org/W2002918846","https://openalex.org/W2503910294","https://openalex.org/W3202072339","https://openalex.org/W2117928543","https://openalex.org/W2621974100"],"abstract_inverted_index":{"Using":[0],"public":[1],"cloud":[2,33,57,65,138,172,183,198,204],"for":[3,98,110,125],"image":[4,143,176],"storage":[5,34,66,139,184],"has":[6],"become":[7],"a":[8,75,93,171],"prevalent":[9],"trend":[10],"with":[11,32],"the":[12,87,134,160,195,203,207,221,229,236],"rapidly":[13],"increasing":[14],"number":[15],"of":[16,77,101,197,209,223,240],"pictures":[17],"generated":[18],"by":[19,193],"various":[20],"devices.":[21],"For":[22],"example,":[23],"today's":[24],"most":[25],"smartphones":[26],"and":[27,47,72,158,211,238],"tablets":[28],"synchronize":[29],"photo":[30],"albums":[31],"platforms.":[35],"However,":[36],"as":[37,44],"many":[38],"images":[39,55,111,192,210],"contain":[40],"sensitive":[41],"information,":[42],"such":[43,61],"personal":[45],"identities":[46],"financial":[48],"data,":[49],"it":[50,121],"is":[51,92,122,216],"concerning":[52],"to":[53,56,107,116,128,150,166,186,190,219],"upload":[54],"storage.":[58],"To":[59,154],"eliminate":[60],"privacy":[62],"concerns":[63],"in":[64,86],"while":[67],"keeping":[68],"decent":[69],"data":[70],"management":[71],"search":[73],"features,":[74],"spectrum":[76],"keywords-based":[78],"searchable":[79],"encryption":[80],"(SE)":[81],"schemes":[82,115,165],"have":[83],"been":[84],"proposed":[85],"past":[88],"decade.":[89],"Unfortunately,":[90],"there":[91],"fundamental":[94],"gap":[95,157],"remains":[96],"open":[97,159],"their":[99,131,191,212],"support":[100],"images,":[102,167],"i.e.,":[103],"appropriate":[104],"keywords":[105,189],"need":[106],"be":[108],"extracted":[109],"before":[112],"applying":[113],"SE":[114,164],"them.":[117],"On":[118,133],"one":[119],"hand,":[120,136],"obviously":[123],"impractical":[124],"smartphone":[126],"users":[127,185],"manually":[129],"annotate":[130],"images.":[132,153],"other":[135],"although":[137],"services":[140],"now":[141],"offer":[142],"annotation":[144,177],"services,":[145],"they":[146],"rely":[147],"on":[148],"access":[149],"users'":[151],"unencrypted":[152],"fulfill":[155],"this":[156,168],"first":[161],"path":[162],"from":[163,205],"paper":[169],"proposes":[170],"assisted":[173],"privacy-preserving":[174],"automatic":[175],"scheme,":[178],"namely":[179],"CAPIA.":[180,224,241],"CAPIA":[181,201],"enables":[182],"automatically":[187],"assign":[188],"leveraging":[194],"power":[196],"computing.":[199],"Meanwhile,":[200],"prevents":[202],"learning":[206],"content":[208],"keywords.":[213],"Thorough":[214],"analysis":[215],"carried":[217],"out":[218],"demonstrate":[220],"security":[222],"A":[225],"prototype":[226],"implementation":[227],"over":[228],"well-known":[230],"IAPR":[231],"TC-12":[232],"dataset":[233],"further":[234],"validates":[235],"efficiency":[237],"accuracy":[239]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
