{"id":"https://openalex.org/W4389459116","doi":"https://doi.org/10.1109/tmc.2023.3340338","title":"Learning to Prevent Input Leakages in the Mobile Cloud Inference","display_name":"Learning to Prevent Input Leakages in the Mobile Cloud Inference","publication_year":2023,"publication_date":"2023-12-07","ids":{"openalex":"https://openalex.org/W4389459116","doi":"https://doi.org/10.1109/tmc.2023.3340338"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2023.3340338","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tmc.2023.3340338","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018175815","display_name":"Liyao Xiang","orcid":"https://orcid.org/0000-0003-0165-4930"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liyao Xiang","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101612636","display_name":"Shuang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Zhang","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080312761","display_name":"Quanshi Zhang","orcid":"https://orcid.org/0000-0002-6108-2738"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quanshi Zhang","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018175815"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16435277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"7","first_page":"7650","last_page":"7663"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.879554033279419},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7545493841171265},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.7161617875099182},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.6428168416023254},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5791624188423157},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5777785181999207},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5639394521713257},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.515642523765564},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.49720481038093567},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.46491461992263794},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4049614667892456},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3466784358024597},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1663905680179596}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.879554033279419},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7545493841171265},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.7161617875099182},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6428168416023254},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5791624188423157},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5777785181999207},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5639394521713257},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.515642523765564},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.49720481038093567},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46491461992263794},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4049614667892456},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3466784358024597},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1663905680179596},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2023.3340338","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tmc.2023.3340338","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W1849277567","https://openalex.org/W1915485278","https://openalex.org/W2119717200","https://openalex.org/W2133665775","https://openalex.org/W2145339207","https://openalex.org/W2279098554","https://openalex.org/W2317339301","https://openalex.org/W2468875367","https://openalex.org/W2535690855","https://openalex.org/W2546536770","https://openalex.org/W2701059868","https://openalex.org/W2809414288","https://openalex.org/W2860338957","https://openalex.org/W2895865029","https://openalex.org/W2897268228","https://openalex.org/W2897830718","https://openalex.org/W2920031528","https://openalex.org/W2946547492","https://openalex.org/W2962883027","https://openalex.org/W2962965870","https://openalex.org/W2963163009","https://openalex.org/W2963456518","https://openalex.org/W2963821229","https://openalex.org/W2963989815","https://openalex.org/W2964081807","https://openalex.org/W2970408908","https://openalex.org/W2973229164","https://openalex.org/W2981114133","https://openalex.org/W2997378229","https://openalex.org/W3000479830","https://openalex.org/W3016632787","https://openalex.org/W3037261120","https://openalex.org/W3049640275","https://openalex.org/W3080136191","https://openalex.org/W3094542121","https://openalex.org/W3102767875","https://openalex.org/W3123159599","https://openalex.org/W3128515475","https://openalex.org/W3133149219","https://openalex.org/W3163767593","https://openalex.org/W3167780554","https://openalex.org/W3173069197","https://openalex.org/W3177170788","https://openalex.org/W4200071390","https://openalex.org/W4236853429","https://openalex.org/W4281390966","https://openalex.org/W4287822453","https://openalex.org/W4288075846","https://openalex.org/W4297775537","https://openalex.org/W6677580257","https://openalex.org/W6695314431","https://openalex.org/W6726275242","https://openalex.org/W6729956949","https://openalex.org/W6737664043","https://openalex.org/W6744495609","https://openalex.org/W6773039429","https://openalex.org/W6775563089","https://openalex.org/W6779786081","https://openalex.org/W6795487366"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W4294565801","https://openalex.org/W2170801710","https://openalex.org/W189451467","https://openalex.org/W2801655275"],"abstract_inverted_index":{"Powered":[0],"by":[1,69],"machine":[2],"learning":[3,20],"services":[4],"in":[5,15],"the":[6,16,38,45,48,65,78,89,94,108],"cloud,":[7,46],"numerous":[8],"learning-driven":[9],"mobile":[10,90],"applications":[11],"are":[12,22,50],"gaining":[13],"popularity":[14],"market.":[17],"As":[18],"deep":[19,39],"tasks":[21],"mostly":[23],"computation-intensive,":[24],"it":[25],"has":[26],"become":[27],"a":[28,83,104,140],"trend":[29],"to":[30,44,53,102,106,111,127,133,154],"process":[31],"raw":[32],"data":[33],"on":[34,77,86,139],"devices":[35],"and":[36,130],"send":[37],"neural":[40],"network":[41],"(DNN)":[42],"features":[43,49],"where":[47],"further":[51],"processed":[52],"return":[54],"final":[55],"results.":[56],"However,":[57],"there":[58],"is":[59],"always":[60],"an":[61,71],"unexpected":[62],"leakage":[63,114],"with":[64],"release":[66],"of":[67,88,96,142],"features,":[68],"which":[70],"adversary":[72],"could":[73],"infer":[74],"much":[75],"information":[76,113],"original":[79],"data.":[80],"We":[81],"propose":[82],"privacy-preserving":[84,151],"framework":[85,100,148],"top":[87],"cloud":[91],"infrastructure":[92],"from":[93],"perspective":[95],"DNN":[97,152],"structures.":[98],"Our":[99],"aims":[101],"learn":[103],"policy":[105,121],"modify":[107],"base":[109],"DNNs":[110,129,143],"prevent":[112],"while":[115],"maintaining":[116],"high":[117],"inference":[118],"accuracy.":[119],"The":[120],"can":[122],"also":[123],"be":[124],"readily":[125],"transferred":[126],"large-size":[128],"large-scale":[131],"datasets":[132],"speed":[134],"up":[135],"learning.":[136],"Extensive":[137],"evaluations":[138],"variety":[141],"have":[144],"shown":[145],"that":[146],"our":[147],"successfully":[149],"finds":[150],"structures":[153],"defend":[155],"privacy":[156],"attacks.":[157]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
