{"id":"https://openalex.org/W3015738389","doi":"https://doi.org/10.1109/icassp40776.2020.9053463","title":"Privacy-Preserving Pattern Recognition Using Encrypted Sparse Representations in L0 Norm Minimization","display_name":"Privacy-Preserving Pattern Recognition Using Encrypted Sparse Representations in L0 Norm Minimization","publication_year":2020,"publication_date":"2020-04-09","ids":{"openalex":"https://openalex.org/W3015738389","doi":"https://doi.org/10.1109/icassp40776.2020.9053463","mag":"3015738389"},"language":"en","primary_location":{"id":"doi:10.1109/icassp40776.2020.9053463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075048116","display_name":"Takayuki Nakachi","orcid":"https://orcid.org/0000-0002-7970-454X"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Takayuki Nakachi","raw_affiliation_strings":["NTT Network Innovation Laboratory, Nippon Telegraph and Telephone Corporation, Yokosuka, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Network Innovation Laboratory, Nippon Telegraph and Telephone Corporation, Yokosuka, Kanagawa, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011262125","display_name":"Yitu Wang","orcid":"https://orcid.org/0000-0003-4453-5966"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yitu Wang","raw_affiliation_strings":["NTT Network Innovation Laboratory, Nippon Telegraph and Telephone Corporation, Yokosuka, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"NTT Network Innovation Laboratory, Nippon Telegraph and Telephone Corporation, Yokosuka, Kanagawa, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015250468","display_name":"Hitoshi Kiya","orcid":"https://orcid.org/0000-0001-8061-3090"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hitoshi Kiya","raw_affiliation_strings":["School of System Design, Tokyo Metropolitan University, Hino, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"School of System Design, Tokyo Metropolitan University, Hino, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075048116"],"corresponding_institution_ids":["https://openalex.org/I2251713219"],"apc_list":null,"apc_paid":null,"fwci":0.8803,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.68080559,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"25","issue":null,"first_page":"2697","last_page":"2701"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7352283596992493},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6632537245750427},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.6275518536567688},{"id":"https://openalex.org/keywords/minification","display_name":"Minification","score":0.5758724212646484},{"id":"https://openalex.org/keywords/sparse-approximation","display_name":"Sparse approximation","score":0.5671753883361816},{"id":"https://openalex.org/keywords/k-svd","display_name":"K-SVD","score":0.5549585223197937},{"id":"https://openalex.org/keywords/norm","display_name":"Norm (philosophy)","score":0.5515364408493042},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.5021357536315918},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.493684858083725},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4383341073989868},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4198472499847412},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3607861399650574},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3304711878299713},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17538559436798096},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08534005284309387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7352283596992493},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6632537245750427},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.6275518536567688},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.5758724212646484},{"id":"https://openalex.org/C124066611","wikidata":"https://www.wikidata.org/wiki/Q28684319","display_name":"Sparse approximation","level":2,"score":0.5671753883361816},{"id":"https://openalex.org/C154771677","wikidata":"https://www.wikidata.org/wiki/Q17098361","display_name":"K-SVD","level":3,"score":0.5549585223197937},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.5515364408493042},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.5021357536315918},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.493684858083725},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4383341073989868},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4198472499847412},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3607861399650574},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3304711878299713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17538559436798096},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08534005284309387},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp40776.2020.9053463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1963932623","https://openalex.org/W2050770647","https://openalex.org/W2085400724","https://openalex.org/W2085762799","https://openalex.org/W2123921160","https://openalex.org/W2128659236","https://openalex.org/W2129812935","https://openalex.org/W2160547390","https://openalex.org/W2481704219","https://openalex.org/W2704367133","https://openalex.org/W2886217700","https://openalex.org/W2911849049","https://openalex.org/W2914970656","https://openalex.org/W2985038610","https://openalex.org/W2998555882","https://openalex.org/W6753735747"],"related_works":["https://openalex.org/W1971373099","https://openalex.org/W2099321050","https://openalex.org/W2890952311","https://openalex.org/W2509955295","https://openalex.org/W2047275718","https://openalex.org/W2034957211","https://openalex.org/W2388952560","https://openalex.org/W110819671","https://openalex.org/W2149282631","https://openalex.org/W2532569109"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,60],"propose":[4],"a":[5],"privacy-preserving":[6],"pattern":[7],"recognition":[8,64,72],"method":[9],"that":[10,22],"uses":[11],"encrypted":[12],"sparse":[13,31],"representations":[14],"in":[15],"L0":[16],"norm":[17],"minimization.":[18],"We":[19],"prove,":[20],"theoretically,":[21],"the":[23,27,36,53,70,75],"proposal":[24],"has":[25],"exactly":[26],"same":[28],"dictionary":[29],"and":[30,66],"coefficient":[32],"estimation":[33],"performance":[34,65],"as":[35],"Label":[37],"Consistent":[38],"K-Singular":[39],"Value":[40],"Decomposition":[41],"(LC-KSVD)":[42],"algorithm":[43,55],"for":[44,69],"non-encrypted":[45],"signals.":[46],"It":[47],"can":[48],"be":[49],"directly":[50],"implemented":[51],"by":[52],"LC-KSVD":[54],"without":[56],"any":[57],"modification.":[58],"Finally,":[59],"demonstrate":[61],"its":[62],"excellent":[63],"security":[67],"strength":[68],"face":[71],"task":[73],"using":[74],"Extended":[76],"YaleB":[77],"database.":[78]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
