{"id":"https://openalex.org/W4402473520","doi":"https://doi.org/10.1109/tcc.2024.3459789","title":"Generative Adversarial Privacy for Multimedia Analytics Across the IoT-Edge Continuum","display_name":"Generative Adversarial Privacy for Multimedia Analytics Across the IoT-Edge Continuum","publication_year":2024,"publication_date":"2024-09-12","ids":{"openalex":"https://openalex.org/W4402473520","doi":"https://doi.org/10.1109/tcc.2024.3459789"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2024.3459789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3459789","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100765872","display_name":"Xin Wei Wang","orcid":"https://orcid.org/0000-0001-9735-606X"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xin Wang","raw_affiliation_strings":["Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089781142","display_name":"Jianhui Lv","orcid":"https://orcid.org/0000-0003-0884-6601"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhui Lv","raw_affiliation_strings":["Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033726593","display_name":"Byung\u2010Gyu Kim","orcid":"https://orcid.org/0000-0001-6555-3464"},"institutions":[{"id":"https://openalex.org/I31766871","display_name":"Sookmyung Women's University","ror":"https://ror.org/00vvvt117","country_code":"KR","type":"education","lineage":["https://openalex.org/I31766871"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byung-Gyu Kim","raw_affiliation_strings":["Sookmyung Women&#x0027;s University, Seoul, Republic of Korea","Sookmyung Women&#x0027;s University, SeoulKorea"],"affiliations":[{"raw_affiliation_string":"Sookmyung Women&#x0027;s University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I31766871"]},{"raw_affiliation_string":"Sookmyung Women&#x0027;s University, SeoulKorea","institution_ids":["https://openalex.org/I31766871"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080175512","display_name":"Carsten Maple","orcid":"https://orcid.org/0000-0002-4715-212X"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Carsten Maple","raw_affiliation_strings":["Secure Cyber Systems Research Group (SCSRG), WMG, University of Warwick, Coventry, U.K","Secure Cyber Systems Research Group (SCSRG), WMG, University of Warwick, Coventry, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Secure Cyber Systems Research Group (SCSRG), WMG, University of Warwick, Coventry, U.K","institution_ids":["https://openalex.org/I39555362"]},{"raw_affiliation_string":"Secure Cyber Systems Research Group (SCSRG), WMG, University of Warwick, Coventry, United Kingdom","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033495329","display_name":"B. D. Parameshachari","orcid":null},"institutions":[{"id":"https://openalex.org/I1333540553","display_name":"Nitte University","ror":"https://ror.org/029nydt37","country_code":"IN","type":"education","lineage":["https://openalex.org/I1333540553"]},{"id":"https://openalex.org/I290407205","display_name":"Meenakshi Academy of Higher Education and Research","ror":"https://ror.org/04jdy5g59","country_code":"IN","type":"education","lineage":["https://openalex.org/I290407205"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. D. Parameshachari","raw_affiliation_strings":["Meenakshi Institute of Technology, Bengaluru, India","Nitte Meenakshi Institute of Technology, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Meenakshi Institute of Technology, Bengaluru, India","institution_ids":["https://openalex.org/I290407205"]},{"raw_affiliation_string":"Nitte Meenakshi Institute of Technology, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I1333540553"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024909557","display_name":"Adam S\u0142owik","orcid":"https://orcid.org/0000-0003-2542-9842"},"institutions":[{"id":"https://openalex.org/I269685040","display_name":"Koszalin University of Technology","ror":"https://ror.org/00x6dk626","country_code":"PL","type":"education","lineage":["https://openalex.org/I269685040"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Adam Slowik","raw_affiliation_strings":["Koszalin University of Technology, Koszalin, Poland"],"affiliations":[{"raw_affiliation_string":"Koszalin University of Technology, Koszalin, Poland","institution_ids":["https://openalex.org/I269685040"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087894632","display_name":"Keqin Li","orcid":"https://orcid.org/0000-0001-5224-4048"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keqin Li","raw_affiliation_strings":["State University of New York, Buffalo, NY, USA","The State University of New York, Buffalo, NY, USA"],"affiliations":[{"raw_affiliation_string":"State University of New York, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]},{"raw_affiliation_string":"The State University of New York, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":6,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100765872"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":2.049,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88769209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"12","issue":"4","first_page":"1260","last_page":"1272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7796214818954468},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7139053344726562},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.6967790126800537},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.6021918058395386},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5566443800926208},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5287536978721619},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5098158717155457},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.48847925662994385},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.46567508578300476},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.45517802238464355},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.38977786898612976},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3638307452201843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3297358453273773},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26465466618537903},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.13167548179626465}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7796214818954468},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7139053344726562},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.6967790126800537},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.6021918058395386},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5566443800926208},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5287536978721619},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5098158717155457},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.48847925662994385},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.46567508578300476},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45517802238464355},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.38977786898612976},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3638307452201843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3297358453273773},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26465466618537903},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.13167548179626465},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2024.3459789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3459789","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5552074707","display_name":null,"funder_award_id":"EP/Y028813/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6402621496","display_name":null,"funder_award_id":"62202247","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7282611729","display_name":null,"funder_award_id":"EP/R007195/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W2566050141","https://openalex.org/W2612942113","https://openalex.org/W2615131380","https://openalex.org/W2908109788","https://openalex.org/W2911915417","https://openalex.org/W2914331134","https://openalex.org/W2927692314","https://openalex.org/W2987120271","https://openalex.org/W3004749007","https://openalex.org/W3044230111","https://openalex.org/W3047327820","https://openalex.org/W3093630031","https://openalex.org/W3094057990","https://openalex.org/W3118555031","https://openalex.org/W3124522136","https://openalex.org/W3129470670","https://openalex.org/W3132069591","https://openalex.org/W3135347465","https://openalex.org/W3153523320","https://openalex.org/W3156502157","https://openalex.org/W3158675315","https://openalex.org/W3161810785","https://openalex.org/W3162497294","https://openalex.org/W3164675724","https://openalex.org/W3176340419","https://openalex.org/W3184589462","https://openalex.org/W3185592819","https://openalex.org/W3190306355","https://openalex.org/W3192267379","https://openalex.org/W3200246030","https://openalex.org/W3204342778","https://openalex.org/W3207590255","https://openalex.org/W3215672417","https://openalex.org/W4205206005","https://openalex.org/W4206425634","https://openalex.org/W4224228685","https://openalex.org/W4225642165","https://openalex.org/W4283322122","https://openalex.org/W4285196410","https://openalex.org/W4297985061","https://openalex.org/W4301603699","https://openalex.org/W4311080956","https://openalex.org/W4312561626","https://openalex.org/W4312588618","https://openalex.org/W4317356885","https://openalex.org/W4321766506","https://openalex.org/W4378379046","https://openalex.org/W6677580257","https://openalex.org/W6733877748"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W3038283795","https://openalex.org/W1561927205","https://openalex.org/W2604501336","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W2893963003"],"abstract_inverted_index":{"The":[0],"proliferation":[1],"of":[2,13,21],"multimedia-enabled":[3],"IoT":[4],"devices":[5],"and":[6,85,91],"edge":[7],"computing":[8],"enables":[9],"a":[10,30,95],"new":[11],"class":[12],"data-intensive":[14],"applications.":[15,135],"However,":[16],"analyzing":[17],"the":[18,53,59],"massive":[19],"volumes":[20],"multimedia":[22,50,116,130],"data":[23,48,92,127],"presents":[24],"significant":[25],"privacy":[26,36,67,79,97,106],"challenges.":[27],"We":[28],"propose":[29],"novel":[31],"framework":[32],"called":[33],"generative":[34,40],"adversarial":[35,41],"(GAP)":[37],"that":[38,102,119],"leverages":[39],"networks":[42],"(GANs)":[43],"to":[44,63,88],"synthesize":[45],"privacy-preserving":[46,129],"surrogate":[47],"for":[49,128],"analytics":[51],"across":[52],"IoT-Edge":[54,134],"continuum.":[55],"GAP":[56,103,120],"carefully":[57],"perturbs":[58],"GAN's":[60],"training":[61],"process":[62],"provide":[64],"rigorous":[65,105],"differential":[66],"guarantees":[68],"without":[69],"compromising":[70],"utility.":[71],"Moreover,":[72],"we":[73],"present":[74],"optimization":[75],"strategies,":[76],"including":[77],"dynamic":[78],"budget":[80],"allocation,":[81],"adaptive":[82],"gradient":[83],"clipping,":[84],"weight":[86],"clustering":[87],"improve":[89],"convergence":[90],"quality":[93],"under":[94],"constrained":[96],"budget.":[98],"Theoretical":[99],"analysis":[100],"proves":[101],"provides":[104],"protections":[107],"while":[108],"enabling":[109],"high-fidelity":[110],"analytics.":[111],"Extensive":[112],"experiments":[113],"on":[114],"real-world":[115],"datasets":[117],"demonstrate":[118],"outperforms":[121],"existing":[122],"methods,":[123],"producing":[124],"high-quality":[125],"synthetic":[126],"processing":[131],"in":[132],"diverse":[133]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
