{"id":"https://openalex.org/W3015896431","doi":"https://doi.org/10.1109/jiot.2020.3012452","title":"DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things","display_name":"DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things","publication_year":2020,"publication_date":"2020-07-28","ids":{"openalex":"https://openalex.org/W3015896431","doi":"https://doi.org/10.1109/jiot.2020.3012452","mag":"3015896431"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.3012452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3012452","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2004.05523","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yi Ding","orcid":"https://orcid.org/0000-0003-3406-9770"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Ding","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Guozheng Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I102398690","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94","country_code":"CN","type":"government","lineage":["https://openalex.org/I102398690"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozheng Wu","raw_affiliation_strings":["Department of Information Science, National Natural Science Foundation of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Science, National Natural Science Foundation of China, Beijing, China","institution_ids":["https://openalex.org/I102398690"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dajiang Chen","orcid":"https://orcid.org/0000-0003-0745-5836"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dajiang Chen","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ning Zhang","orcid":"https://orcid.org/0000-0002-8781-4925"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ning Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Windsor, Windsor, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Linpeng Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linpeng Gong","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mingsheng Cao","orcid":"https://orcid.org/0000-0003-0691-2724"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingsheng Cao","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":10.7135,"has_fulltext":false,"cited_by_count":239,"citation_normalized_percentile":{"value":0.98774115,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"8","issue":"3","first_page":"1504","last_page":"1518"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.5415999889373779,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.5415999889373779,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.03880000114440918,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11775","display_name":"COVID-19 diagnosis using AI","score":0.029100000858306885,"subfield":{"id":"https://openalex.org/subfields/2741","display_name":"Radiology, Nuclear Medicine and Imaging"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8341000080108643},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5012000203132629},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.49900001287460327},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4726000130176544},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4618000090122223},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.45239999890327454},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.4059000015258789},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.35839998722076416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8540999889373779},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8341000080108643},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5012000203132629},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.49900001287460327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49410000443458557},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4726000130176544},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4618000090122223},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.45239999890327454},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.4059000015258789},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3910999894142151},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.35839998722076416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3416000008583069},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.3400000035762787},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3019999861717224},{"id":"https://openalex.org/C31601959","wikidata":"https://www.wikidata.org/wiki/Q931309","display_name":"Medical imaging","level":2,"score":0.29269999265670776},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.27730000019073486},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2581999897956848},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2515999972820282}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2020.3012452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.3012452","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2004.05523","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2004.05523","pdf_url":"https://arxiv.org/pdf/2004.05523","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2004.05523","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2004.05523","pdf_url":"https://arxiv.org/pdf/2004.05523","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1641498739","https://openalex.org/W1885185971","https://openalex.org/W1976474044","https://openalex.org/W1978564717","https://openalex.org/W1990178832","https://openalex.org/W2000269560","https://openalex.org/W2018789078","https://openalex.org/W2052785775","https://openalex.org/W2056105196","https://openalex.org/W2062086221","https://openalex.org/W2110727892","https://openalex.org/W2147800946","https://openalex.org/W2152483955","https://openalex.org/W2154743800","https://openalex.org/W2160668065","https://openalex.org/W2194775991","https://openalex.org/W2207621483","https://openalex.org/W2337771599","https://openalex.org/W2494404707","https://openalex.org/W2532423614","https://openalex.org/W2574952845","https://openalex.org/W2576179182","https://openalex.org/W2626578807","https://openalex.org/W2764207251","https://openalex.org/W2766007816","https://openalex.org/W2777967210","https://openalex.org/W2783190965","https://openalex.org/W2789441909","https://openalex.org/W2790225553","https://openalex.org/W2793938489","https://openalex.org/W2796759045","https://openalex.org/W2805010728","https://openalex.org/W2809674292","https://openalex.org/W2890144132","https://openalex.org/W2899320377","https://openalex.org/W2919839278","https://openalex.org/W2941862422","https://openalex.org/W2945706002","https://openalex.org/W2960381823","https://openalex.org/W2962793481","https://openalex.org/W2963073614","https://openalex.org/W2963426391","https://openalex.org/W2963444790","https://openalex.org/W2963649420","https://openalex.org/W2963752169","https://openalex.org/W2981577173","https://openalex.org/W2997702264","https://openalex.org/W6639867372","https://openalex.org/W6752497347"],"related_works":[],"abstract_inverted_index":{"Internet":[0],"of":[1,20,33,44,64,148,190],"Medical":[2],"Things":[3],"(IoMT)":[4],"can":[5,185],"connect":[6],"many":[7],"medical":[8,13,26,69,89],"imaging":[9],"equipment":[10],"to":[11,16,38,60,86,107,121,130,136,154],"the":[12,18,40,45,62,68,74,82,88,96,109,114,122,138,143,156,160,169,182],"information":[14],"network":[15,56,77,85,129,151],"facilitate":[17,137],"process":[19,63],"diagnosing":[21],"and":[22,54,66,177],"treating":[23],"doctors.":[24],"As":[25],"image":[27,52,90,118,125,132],"contains":[28],"sensitive":[29],"information,":[30],"it":[31],"is":[32,58,79,102,119,152,166],"importance":[34],"yet":[35],"very":[36],"challenging":[37],"safeguard":[39],"privacy":[41],"or":[42],"security":[43,178,191],"patient.":[46],"In":[47,134],"this":[48],"work,":[49],"a":[50,127,146,187,193],"deep-learning-based":[51],"encryption":[53],"decryption":[55],"(DeepEDN)":[57],"proposed":[59,153,164,183],"fulfill":[61],"encrypting":[65],"decrypting":[67],"image.":[70,162],"Specifically,":[71],"in":[72,196],"DeepEDN,":[73],"cycle-generative":[75],"adversarial":[76],"(Cycle-GAN)":[78],"employed":[80],"as":[81,104],"main":[83],"learning":[84,110],"transfer":[87],"from":[91,142,159],"its":[92],"original":[93,123],"domain":[94,101],"into":[95],"target":[97,100],"domain.":[98],"The":[99,116,163],"regarded":[103],"\u201chidden":[105],"factors\u201d":[106],"guide":[108],"model":[111],"for":[112],"realizing":[113],"encryption.":[115],"encrypted":[117,161],"restored":[120],"(plaintext)":[124],"through":[126],"reconstruction":[128],"achieve":[131,186],"decryption.":[133],"order":[135],"data":[139,172],"mining":[140],"directly":[141],"privacy-protected":[144],"environment,":[145],"region":[147],"interest":[149],"(ROI)-mining":[150],"extract":[155],"interesting":[157],"object":[158],"DeepEDN":[165],"evaluated":[167],"on":[168],"chest":[170],"X-ray":[171],"set.":[173],"Extensive":[174],"experimental":[175],"results":[176],"analysis":[179],"show":[180],"that":[181],"method":[184],"high":[188],"level":[189],"with":[192],"good":[194],"performance":[195],"efficiency.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":13},{"year":2025,"cited_by_count":44},{"year":2024,"cited_by_count":73},{"year":2023,"cited_by_count":49},{"year":2022,"cited_by_count":38},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2020-04-17T00:00:00"}
