{"id":"https://openalex.org/W2333429140","doi":"https://doi.org/10.1109/tmm.2016.2535729","title":"DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud","display_name":"DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud","publication_year":2016,"publication_date":"2016-02-29","ids":{"openalex":"https://openalex.org/W2333429140","doi":"https://doi.org/10.1109/tmm.2016.2535729","mag":"2333429140"},"language":"en","primary_location":{"id":"doi:10.1109/tmm.2016.2535729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2016.2535729","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043524348","display_name":"Zhan Qin","orcid":"https://orcid.org/0000-0001-7872-6969"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhan Qin","raw_affiliation_strings":["Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA","Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA ("],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA (","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000596496","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0003-3441-6277"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA","Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA ("],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY, USA (","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080357184","display_name":"Ting Yu","orcid":"https://orcid.org/0000-0001-6386-1906"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ting Yu","raw_affiliation_strings":["Cyber Security Group, Qatar Computing Research Institute, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Cyber Security Group, Qatar Computing Research Institute, Doha, Qatar","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["School of Information Technology, Jinan University, Guangzhou, China","[School of Information Technology, Jinan University, Guangzhou, China]"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"[School of Information Technology, Jinan University, Guangzhou, China]","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043524348"],"corresponding_institution_ids":["https://openalex.org/I63190737"],"apc_list":null,"apc_paid":null,"fwci":0.3386,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.64642183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"18","issue":"5","first_page":"929","last_page":"939"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8904868364334106},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.674791157245636},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5908112525939941},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.507487952709198},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4799487888813019},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4632604718208313},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.4537593722343445},{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.4376864433288574},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4193843603134155},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.41902029514312744},{"id":"https://openalex.org/keywords/data-publishing","display_name":"Data publishing","score":0.4166962802410126},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.41325998306274414},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30756354331970215},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.29839032888412476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.240433931350708},{"id":"https://openalex.org/keywords/publishing","display_name":"Publishing","score":0.2025582194328308}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8904868364334106},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.674791157245636},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5908112525939941},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.507487952709198},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4799487888813019},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4632604718208313},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.4537593722343445},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.4376864433288574},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4193843603134155},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.41902029514312744},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.4166962802410126},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.41325998306274414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30756354331970215},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.29839032888412476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.240433931350708},{"id":"https://openalex.org/C151719136","wikidata":"https://www.wikidata.org/wiki/Q3972943","display_name":"Publishing","level":2,"score":0.2025582194328308},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmm.2016.2535729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2016.2535729","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G2069513032","display_name":null,"funder_award_id":"CNS-1262277","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W177004468","https://openalex.org/W568726942","https://openalex.org/W1522477135","https://openalex.org/W1570748171","https://openalex.org/W1625255723","https://openalex.org/W1873763122","https://openalex.org/W1973056687","https://openalex.org/W1985310469","https://openalex.org/W2019384076","https://openalex.org/W2024798729","https://openalex.org/W2052271957","https://openalex.org/W2064853889","https://openalex.org/W2074418712","https://openalex.org/W2082894754","https://openalex.org/W2091644709","https://openalex.org/W2093678760","https://openalex.org/W2106996050","https://openalex.org/W2109698606","https://openalex.org/W2110893883","https://openalex.org/W2112380340","https://openalex.org/W2126579184","https://openalex.org/W2128017662","https://openalex.org/W2130426318","https://openalex.org/W2134044542","https://openalex.org/W2143450308","https://openalex.org/W2145072179","https://openalex.org/W2152131375","https://openalex.org/W2153128019","https://openalex.org/W2159024459","https://openalex.org/W2164778205","https://openalex.org/W2166049352","https://openalex.org/W2166559705","https://openalex.org/W2167372639","https://openalex.org/W2171195640","https://openalex.org/W2911978475","https://openalex.org/W2997936244","https://openalex.org/W4252403066","https://openalex.org/W6607184829","https://openalex.org/W6636494156","https://openalex.org/W6676639149","https://openalex.org/W6681554747"],"related_works":["https://openalex.org/W2786280608","https://openalex.org/W2910132870","https://openalex.org/W58529046","https://openalex.org/W4323859699","https://openalex.org/W2076716307","https://openalex.org/W2902336997","https://openalex.org/W2034667130","https://openalex.org/W3183881510","https://openalex.org/W2118636728","https://openalex.org/W2338038751"],"abstract_inverted_index":{"Nowadays,":[0],"cloud":[1,28],"has":[2],"become":[3],"a":[4,141,212],"promising":[5],"multimedia":[6],"data":[7,47,119,186],"processing":[8],"and":[9,14,19,24,32,51,85,182],"sharing":[10],"platform.":[11],"Many":[12],"institutes":[13],"companies":[15],"plan":[16],"to":[17,88],"outsource":[18],"share":[20],"their":[21],"large-scale":[22],"video":[23,37],"image":[25],"datasets":[26,194],"on":[27,121,193],"for":[29,134],"scientific":[30],"research":[31],"public":[33],"interest.":[34],"Among":[35],"various":[36],"applications,":[38],"the":[39,55,59,66,69,73,92,104,112,125,146,152,157,162,171,184],"discovery":[40],"of":[41,61,114,117,161],"frequent":[42,74,129],"visual":[43,75,130,148,198],"patterns":[44,76,131],"over":[45,58,82,180],"graphical":[46,118,135],"is":[48],"an":[49],"exploratory":[50],"important":[52],"technique.":[53,165],"However,":[54],"privacy":[56,90,172,214],"concerns":[57],"leakage":[60],"sensitive":[62],"information":[63,94],"contained":[64,95],"in":[65,96,177,197],"videos/images":[67],"impedes":[68],"further":[70],"implementation.":[71],"Although":[72],"mining":[77,132,199],"(FVPM)":[78],"algorithm":[79,133,179],"aggregates":[80],"summary":[81],"individual":[83,97],"frames":[84,98],"seems":[86],"not":[87],"pose":[89],"threat,":[91],"private":[93,128,154],"still":[99],"may":[100],"be":[101],"leaked":[102],"from":[103],"statistical":[105],"result.":[106],"In":[107],"this":[108],"paper,":[109],"we":[110],"study":[111],"problem":[113],"privacy-preserving":[115,147],"publishing":[116],"FVPM":[120],"cloud.":[122],"We":[123,139],"propose":[124,140],"first":[126],"differentially":[127,153],"data,":[136],"named":[137],"DPcode.":[138],"novel":[142],"mechanism":[143,155],"that":[144,204],"integrates":[145],"word":[149],"conversion":[150],"with":[151],"under":[156],"noise":[158],"allocation":[159],"strategy":[160],"sparse":[163],"vector":[164],"The":[166,201],"optimized":[167],"algorithms":[168],"properly":[169],"allocate":[170],"budgets":[173],"among":[174],"different":[175],"phases":[176],"FPM":[178],"images":[181],"reduce":[183],"corresponding":[185],"distortion.":[187],"Extensive":[188],"experiments":[189],"are":[190],"conducted":[191],"based":[192],"commonly":[195],"used":[196],"algorithms.":[200],"results":[202],"show":[203],"our":[205],"approach":[206],"achieves":[207],"high":[208],"utility":[209],"while":[210],"satisfying":[211],"practical":[213],"requirement.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
