{"id":"https://openalex.org/W7092220669","doi":"https://doi.org/10.1109/lsp.2025.3622533","title":"Face Protection Based on Optimizing Latent Code Space With Multiple Loss Function Constraints","display_name":"Face Protection Based on Optimizing Latent Code Space With Multiple Loss Function Constraints","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7092220669","doi":"https://doi.org/10.1109/lsp.2025.3622533"},"language":null,"primary_location":{"id":"doi:10.1109/lsp.2025.3622533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2025.3622533","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jianfeng Zhang","orcid":"https://orcid.org/0009-0009-0483-8277"},"institutions":[{"id":"https://openalex.org/I184843921","display_name":"Hebei University of Technology","ror":"https://ror.org/018hded08","country_code":"CN","type":"education","lineage":["https://openalex.org/I184843921"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianfeng Zhang","raw_affiliation_strings":["School of Artificial Intelligence, Hebei University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Hebei University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I184843921"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dedong Yang","orcid":"https://orcid.org/0000-0001-7950-6810"},"institutions":[{"id":"https://openalex.org/I184843921","display_name":"Hebei University of Technology","ror":"https://ror.org/018hded08","country_code":"CN","type":"education","lineage":["https://openalex.org/I184843921"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dedong Yang","raw_affiliation_strings":["School of Artificial Intelligence, Hebei University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Hebei University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I184843921"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rongtao Li","orcid":null},"institutions":[{"id":"https://openalex.org/I184843921","display_name":"Hebei University of Technology","ror":"https://ror.org/018hded08","country_code":"CN","type":"education","lineage":["https://openalex.org/I184843921"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongtao Li","raw_affiliation_strings":["School of Artificial Intelligence, Hebei University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Hebei University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I184843921"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ziyang Li","orcid":"https://orcid.org/0009-0007-0131-4764"},"institutions":[{"id":"https://openalex.org/I184843921","display_name":"Hebei University of Technology","ror":"https://ror.org/018hded08","country_code":"CN","type":"education","lineage":["https://openalex.org/I184843921"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyang Li","raw_affiliation_strings":["School of Artificial Intelligence, Hebei University of Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Hebei University of Technology, Tianjin, China","institution_ids":["https://openalex.org/I184843921"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I184843921"],"apc_list":null,"apc_paid":null,"fwci":1.33,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87133669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"32","issue":null,"first_page":"4114","last_page":"4118"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.7871000170707703,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.7871000170707703,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.06080000102519989,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.027400000020861626,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6592000126838684},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5450999736785889},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.5418000221252441},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5388000011444092},{"id":"https://openalex.org/keywords/premise","display_name":"Premise","score":0.4706999957561493},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.4449999928474426},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43689998984336853},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4352000057697296},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4334999918937683},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.43299999833106995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8299999833106995},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6592000126838684},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5450999736785889},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.5418000221252441},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5388000011444092},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4912000000476837},{"id":"https://openalex.org/C2778023277","wikidata":"https://www.wikidata.org/wiki/Q321703","display_name":"Premise","level":2,"score":0.4706999957561493},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.4449999928474426},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43689998984336853},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4352000057697296},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4334999918937683},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.43299999833106995},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4092000126838684},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.37790000438690186},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3774999976158142},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.36910000443458557},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3562999963760376},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.3431999981403351},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33970001339912415},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3345000147819519},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3319000005722046},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.31690001487731934},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C101814296","wikidata":"https://www.wikidata.org/wiki/Q5439685","display_name":"Feature model","level":3,"score":0.27959999442100525},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.2653000056743622},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2515000104904175},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2025.3622533","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2025.3622533","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1834627138","https://openalex.org/W1901129140","https://openalex.org/W2341528187","https://openalex.org/W2946666127","https://openalex.org/W2963566548","https://openalex.org/W2982340830","https://openalex.org/W3027552584","https://openalex.org/W3035574324","https://openalex.org/W3119942808","https://openalex.org/W3178406257","https://openalex.org/W3201409833","https://openalex.org/W4313130906","https://openalex.org/W4316925022","https://openalex.org/W4316925037","https://openalex.org/W4321021852","https://openalex.org/W4360584284","https://openalex.org/W4384030688","https://openalex.org/W4386075688","https://openalex.org/W4386076118","https://openalex.org/W4388452001","https://openalex.org/W4389060502","https://openalex.org/W4390871843","https://openalex.org/W4391621073","https://openalex.org/W4391953385","https://openalex.org/W4392405740","https://openalex.org/W4392411900","https://openalex.org/W4392411992","https://openalex.org/W4394564692","https://openalex.org/W4394841777","https://openalex.org/W4394981859","https://openalex.org/W4400615001","https://openalex.org/W4401878786","https://openalex.org/W4402387383","https://openalex.org/W4402623739","https://openalex.org/W4405272467","https://openalex.org/W4405633082","https://openalex.org/W4408688738"],"related_works":[],"abstract_inverted_index":{"The":[0,58],"privacy":[1,44,54,99,111],"preservation":[2],"problem":[3],"of":[4,126],"face":[5],"data":[6,62,95],"is":[7],"becoming":[8],"more":[9,11],"and":[10,13,53,75,85,98,114,131,135],"prominent,":[12],"how":[14],"to":[15,22,47,92],"retain":[16],"key":[17,77],"features":[18],"while":[19],"blurring":[20],"faces":[21],"support":[23],"subsequent":[24],"tasks":[25],"has":[26],"become":[27],"a":[28,36,82,94],"research":[29],"difficulty.":[30],"In":[31,80],"this":[32,106],"paper,":[33],"we":[34],"propose":[35],"latent":[37,64],"code":[38,65],"space":[39,66],"optimization":[40],"method":[41,59,107],"for":[42],"facial":[43,61],"protection,":[45],"aiming":[46],"synergistically":[48],"optimize":[49],"identity":[50],"feature":[51,78,115],"retention":[52,116],"security":[55],"during":[56],"fuzzification.":[57],"edits":[60],"via":[63],"inversion,":[67],"generates":[68],"blurred":[69],"images":[70],"under":[71,123],"multi-loss":[72],"function":[73],"constraints,":[74],"preserves":[76],"points.":[79],"addition,":[81],"hash":[83],"value":[84],"zero-knowledge":[86],"proof":[87],"(ZKP)":[88],"mechanism":[89],"are":[90],"introduced":[91],"construct":[93],"integrity":[96],"verification":[97],"compliance":[100],"authentication":[101],"system.":[102],"Experiments":[103],"show":[104],"that":[105],"significantly":[108],"improves":[109],"the":[110,120,124,137],"protection":[112],"strength":[113],"accuracy":[117],"compared":[118],"with":[119],"traditional":[121],"scheme":[122],"premise":[125],"low":[127,129],"latency,":[128],"bandwidth":[130],"efficient":[132],"resource":[133],"utilization,":[134],"realizes":[136],"identification":[138],"capability":[139],"without":[140],"sensitive":[141],"information":[142],"leakage.":[143]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-17T00:00:00"}
