{"id":"https://openalex.org/W2164071428","doi":"https://doi.org/10.1109/eee.2004.1287336","title":"Robustness of entrusted data-analysis in e-science research collaboration","display_name":"Robustness of entrusted data-analysis in e-science research collaboration","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2164071428","doi":"https://doi.org/10.1109/eee.2004.1287336","mag":"2164071428"},"language":"en","primary_location":{"id":"doi:10.1109/eee.2004.1287336","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eee.2004.1287336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060665991","display_name":"K. Matsuura","orcid":"https://orcid.org/0009-0005-0348-026X"},"institutions":[{"id":"https://openalex.org/I161296585","display_name":"Tokyo University of Science","ror":"https://ror.org/05sj3n476","country_code":"JP","type":"education","lineage":["https://openalex.org/I161296585"]},{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"K. Matsuura","raw_affiliation_strings":["Institute of Industrial Science, University of Tokyo, Meguro, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Industrial Science, University of Tokyo, Meguro, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974","https://openalex.org/I161296585"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5060665991"],"corresponding_institution_ids":["https://openalex.org/I161296585","https://openalex.org/I74801974"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18694755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"373","last_page":"378"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.9230610132217407},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.694666862487793},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6616436243057251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4166812300682068},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36157718300819397},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.36046573519706726},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19192937016487122}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.9230610132217407},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.694666862487793},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6616436243057251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4166812300682068},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36157718300819397},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36046573519706726},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19192937016487122},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eee.2004.1287336","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eee.2004.1287336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1986020334","https://openalex.org/W2018264806","https://openalex.org/W2065105974","https://openalex.org/W2079658276","https://openalex.org/W2083122891","https://openalex.org/W2094707996","https://openalex.org/W2114070512","https://openalex.org/W2159376475","https://openalex.org/W2163256976","https://openalex.org/W6683846698"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2112962431","https://openalex.org/W2163290991","https://openalex.org/W2361184779","https://openalex.org/W2474386553","https://openalex.org/W2125329004","https://openalex.org/W3174961728","https://openalex.org/W2141752560","https://openalex.org/W2067130749","https://openalex.org/W4288057808"],"abstract_inverted_index":{"In":[0],"e-science,":[1],"a":[2,8,26,37],"participant":[3],"may":[4,13],"entrust":[5],"data-analysis":[6],"to":[7],"third":[9],"party.":[10],"This":[11],"analysis":[12],"necessitate":[14],"digital":[15],"watermarking":[16],"for":[17],"security/privacy":[18],"reasons.":[19],"When":[20],"we":[21],"use":[22],"watermarking,":[23],"there":[24],"is":[25],"robustness":[27,45],"requirement":[28],"that":[29,42],"the":[30,43,52],"data":[31],"be":[32],"kept":[33],"acceptable.":[34],"By":[35],"using":[36],"phantom":[38],"experiment,":[39],"We":[40],"demonstrate":[41],"traditional":[44],"evaluation":[46],"does":[47],"not":[48],"always":[49],"work":[50],"in":[51],"e-science":[53],"scenario.":[54]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
