{"id":"https://openalex.org/W4417508763","doi":"https://doi.org/10.1109/tc.2025.3645855","title":"LPPUBR: Lightweight Privacy-Preserving Unsupervised Medical Image Bitmap Retrieval in IoT","display_name":"LPPUBR: Lightweight Privacy-Preserving Unsupervised Medical Image Bitmap Retrieval in IoT","publication_year":2025,"publication_date":"2025-12-19","ids":{"openalex":"https://openalex.org/W4417508763","doi":"https://doi.org/10.1109/tc.2025.3645855"},"language":null,"primary_location":{"id":"doi:10.1109/tc.2025.3645855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3645855","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yifan Wang","orcid":"https://orcid.org/0009-0008-4455-8264"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yifan Wang","raw_affiliation_strings":["School of Cyber Security and Computer, Key Laboratory of High Trusted Information System, Hebei University, Baoding, China","School of Cyber Security and Computer, Hebei University, Key Laboratory of High Trusted Information System, Baoding, Hebei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Key Laboratory of High Trusted Information System, Hebei University, Baoding, China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University, Key Laboratory of High Trusted Information System, Baoding, Hebei, China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100742781","display_name":"Ruizhong Du","orcid":"https://orcid.org/0000-0002-3952-2370"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruizhong Du","raw_affiliation_strings":["School of Cyber Security and Computer, Key Laboratory of High Trusted Information System, Hebei University, Baoding, China","School of Cyber Security and Computer, Hebei University, Key Laboratory of High Trusted Information System, Baoding, Hebei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Key Laboratory of High Trusted Information System, Hebei University, Baoding, China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University, Key Laboratory of High Trusted Information System, Baoding, Hebei, China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100633738","display_name":"Mingyue Li","orcid":"https://orcid.org/0000-0001-5408-0569"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyue Li","raw_affiliation_strings":["School of Cyber Security and Computer, Key Laboratory of High Trusted Information System, Hebei University, Baoding, China","School of Cyber Security and Computer, Hebei University, Key Laboratory of High Trusted Information System, Baoding, Hebei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Computer, Key Laboratory of High Trusted Information System, Hebei University, Baoding, China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"School of Cyber Security and Computer, Hebei University, Key Laboratory of High Trusted Information System, Baoding, Hebei, China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dongliang Xu","orcid":"https://orcid.org/0000-0002-6908-253X"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210158823","display_name":"Weihai Science and Technology Bureau","ror":"https://ror.org/05mx4xx46","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210158823"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongliang Xu","raw_affiliation_strings":["School of Airspace Science and Engineering, Shandong University, Weihai, China","School of Airspace Science and Engineering, Shandong University Weihai, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Airspace Science and Engineering, Shandong University, Weihai, China","institution_ids":["https://openalex.org/I4210158823"]},{"raw_affiliation_string":"School of Airspace Science and Engineering, Shandong University Weihai, Shandong, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005646333","display_name":"Chunfu Jia","orcid":"https://orcid.org/0000-0002-5588-9690"},"institutions":[{"id":"https://openalex.org/I132369690","display_name":"Tianjin University of Science and Technology","ror":"https://ror.org/018rbtf37","country_code":"CN","type":"education","lineage":["https://openalex.org/I132369690"]},{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunfu Jia","raw_affiliation_strings":["College of Cyber Science, Tianjin Key Laboratory of Network and Data Security Technology, Nankai University, Tianjin, China","College of Cyber Science, Nankai University Tianjin Key Laboratory of Network and Data Security Technology, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science, Tianjin Key Laboratory of Network and Data Security Technology, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"College of Cyber Science, Nankai University Tianjin Key Laboratory of Network and Data Security Technology, Tianjin, China","institution_ids":["https://openalex.org/I205237279","https://openalex.org/I132369690"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111148958","display_name":"C. Mei","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158823","display_name":"Weihai Science and Technology Bureau","ror":"https://ror.org/05mx4xx46","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210158823"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Can Mei","raw_affiliation_strings":["Shandong Tongyu Network Security Technology Company Ltd, Weihai, China","Shandong Tongyu Network Security Technology Co., Ltd, Shandong, Weihai, China"],"affiliations":[{"raw_affiliation_string":"Shandong Tongyu Network Security Technology Company Ltd, Weihai, China","institution_ids":["https://openalex.org/I4210158823"]},{"raw_affiliation_string":"Shandong Tongyu Network Security Technology Co., Ltd, Shandong, Weihai, China","institution_ids":["https://openalex.org/I4210158823"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I43337087"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41832807,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"75","issue":"3","first_page":"1082","last_page":"1096"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.260699987411499,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.260699987411499,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.20499999821186066,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.07670000195503235,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bitmap","display_name":"Bitmap","score":0.7541000247001648},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.607200026512146},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5756000280380249},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.4749999940395355},{"id":"https://openalex.org/keywords/data-retrieval","display_name":"Data retrieval","score":0.47130000591278076},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4442000091075897},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.4357999861240387},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3970000147819519},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3785000145435333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8772000074386597},{"id":"https://openalex.org/C3115412","wikidata":"https://www.wikidata.org/wiki/Q1194708","display_name":"Bitmap","level":2,"score":0.7541000247001648},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.607200026512146},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5756000280380249},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5131000280380249},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.4749999940395355},{"id":"https://openalex.org/C551230270","wikidata":"https://www.wikidata.org/wiki/Q4368942","display_name":"Data retrieval","level":2,"score":0.47130000591278076},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4442000091075897},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.4357999861240387},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3970000147819519},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3849000036716461},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3785000145435333},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3765000104904175},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3630000054836273},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.3125},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3068000078201294},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3012000024318695},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.29789999127388},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.29739999771118164},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.28769999742507935},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.27730000019073486},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2639000117778778},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2603999972343445},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2531000077724457},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.25110000371932983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2025.3645855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3645855","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4235289711","display_name":null,"funder_award_id":"62172238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1485800369","https://openalex.org/W1499934958","https://openalex.org/W1524288918","https://openalex.org/W1973393984","https://openalex.org/W2003668524","https://openalex.org/W2089468229","https://openalex.org/W2124509324","https://openalex.org/W2141420453","https://openalex.org/W2155803963","https://openalex.org/W2461086877","https://openalex.org/W2765200655","https://openalex.org/W2786671750","https://openalex.org/W2793784311","https://openalex.org/W2801491268","https://openalex.org/W2808282156","https://openalex.org/W2911667635","https://openalex.org/W2940691483","https://openalex.org/W2963090248","https://openalex.org/W2963163009","https://openalex.org/W2964158883","https://openalex.org/W2966988368","https://openalex.org/W2970518483","https://openalex.org/W2980189697","https://openalex.org/W3009806461","https://openalex.org/W3034205626","https://openalex.org/W3088634412","https://openalex.org/W3135057764","https://openalex.org/W3156546827","https://openalex.org/W3171515703","https://openalex.org/W3185939411","https://openalex.org/W3198680251","https://openalex.org/W3207216021","https://openalex.org/W4205109197","https://openalex.org/W4213419327","https://openalex.org/W4225269826","https://openalex.org/W4229026509","https://openalex.org/W4280623770","https://openalex.org/W4283022464","https://openalex.org/W4291536654","https://openalex.org/W4312397855","https://openalex.org/W4398160604","https://openalex.org/W4399423334","https://openalex.org/W4401212443"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,11,46,134,158,165,192],"widespread":[2],"application":[3],"of":[4,6,18,48,207],"Internet":[5],"Things":[7],"(IoT)":[8],"technology":[9],"in":[10,40,168,205],"medical":[12,19],"field,":[13],"real-time":[14],"collection":[15],"and":[16,34,54,91,103,120,138,149,163,181,212],"transmission":[17],"images":[20,102],"become":[21],"feasible.":[22],"However,":[23],"existing":[24,203],"privacy-preserving":[25],"image":[26],"retrieval":[27,57,78,115,188,213],"schemes":[28,204],"often":[29],"suffer":[30],"from":[31,101],"low":[32],"efficiency":[33,116,148],"high":[35],"communication":[36,151,175,210],"overhead":[37],"when":[38],"operated":[39],"resource-constrained":[41],"IoT":[42,82],"environments":[43,83],"due":[44],"to":[45,96,108,131,145,191],"lack":[47],"efficient":[49,53],"models.":[50],"Thus,":[51],"achieving":[52],"secure":[55,90],"medicalimage":[56],"on":[58],"limited-resource":[59],"devices":[60],"has":[61],"emerged":[62],"as":[63],"a":[64,73,89,124,173],"critical":[65],"challenge.":[66],"To":[67],"address":[68],"this,":[69],"we":[70,156],"propose":[71],"LPPUBR,":[72],"lightweight,":[74],"privacy-preserving,":[75],"unsupervised":[76,142,194],"bitmap":[77],"scheme":[79],"designed":[80],"for":[81,141],"with":[84],"constrained":[85],"resources.":[86],"LPPUBR":[87,186,201],"utilizes":[88],"lightweight":[92],"deep":[93,98],"learning":[94,127],"model":[95,137,195],"extract":[97],"feature":[99],"descriptors":[100],"employs":[104],"product":[105],"quantization":[106],"(PQ)":[107],"encode":[109],"them":[110],"into":[111],"binary":[112],"bitmaps,":[113],"enhancing":[114],"while":[117,196],"reducing":[118],"computational":[119,208],"storage":[121],"costs.":[122],"Particularly,":[123],"cross-quantization":[125],"contrastive":[126],"strategy":[128],"is":[129],"applied":[130],"jointly":[132],"train":[133],"neural":[135],"network":[136],"PQ":[139],"codewords":[140],"learning.":[143],"Furthermore,":[144],"improve":[146],"interaction":[147],"reduce":[150],"costs":[152],"among":[153],"multiple":[154],"servers,":[155],"optimize":[157],"intermediate":[159],"value":[160],"recovery":[161],"operation":[162],"redesign":[164],"related":[166],"protocols":[167],"n-party":[169],"secret":[170],"sharing":[171],"using":[172],"group":[174],"strategy.":[176],"A":[177],"comprehensive":[178],"theoretical":[179],"analysis":[180],"experimental":[182],"evaluation":[183],"demonstrate":[184],"that":[185],"maintains":[187],"accuracy":[189],"comparable":[190],"original":[193],"ensuring":[197],"data":[198],"security.":[199],"Moreover,":[200],"surpasses":[202],"terms":[206],"cost,":[209],"overhead,":[211],"efficiency.":[214]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-19T00:00:00"}
