{"id":"https://openalex.org/W4413257179","doi":"https://doi.org/10.1109/tpami.2025.3599592","title":"Interpretable Rotation-Equivariant Multiary-Valued Network for Attribute Obfuscation","display_name":"Interpretable Rotation-Equivariant Multiary-Valued Network for Attribute Obfuscation","publication_year":2025,"publication_date":"2025-08-15","ids":{"openalex":"https://openalex.org/W4413257179","doi":"https://doi.org/10.1109/tpami.2025.3599592","pmid":"https://pubmed.ncbi.nlm.nih.gov/40815581"},"language":"en","primary_location":{"id":"doi:10.1109/tpami.2025.3599592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpami.2025.3599592","pdf_url":null,"source":{"id":"https://openalex.org/S199944782","display_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","issn_l":"0162-8828","issn":["0162-8828","1939-3539","2160-9292"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080312761","display_name":"Quanshi Zhang","orcid":"https://orcid.org/0000-0002-6108-2738"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Quanshi Zhang","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100396841","display_name":"Hao Zhang","orcid":"https://orcid.org/0000-0002-0206-9066"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Zhang","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100348258","display_name":"Yi-Ting Chen","orcid":"https://orcid.org/0000-0001-7837-7076"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiting Chen","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045917421","display_name":"Qihan Ren","orcid":"https://orcid.org/0009-0002-2151-4716"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qihan Ren","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jie Ren","orcid":"https://orcid.org/0000-0001-9918-3000"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Ren","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101570596","display_name":"Xu Cheng","orcid":"https://orcid.org/0000-0002-6065-6007"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Cheng","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018175815","display_name":"Liyao Xiang","orcid":"https://orcid.org/0000-0003-0165-4930"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liyao Xiang","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5080312761"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10597585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"47","issue":"12","first_page":"11051","last_page":"11064"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9343000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9211999773979187,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8621601462364197},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6706632375717163},{"id":"https://openalex.org/keywords/rotation","display_name":"Rotation (mathematics)","score":0.643537163734436},{"id":"https://openalex.org/keywords/equivariant-map","display_name":"Equivariant map","score":0.6330119967460632},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43106043338775635},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3461688756942749},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.33737772703170776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33243441581726074},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2936059832572937},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08721470832824707}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8621601462364197},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6706632375717163},{"id":"https://openalex.org/C74050887","wikidata":"https://www.wikidata.org/wiki/Q848368","display_name":"Rotation (mathematics)","level":2,"score":0.643537163734436},{"id":"https://openalex.org/C171036898","wikidata":"https://www.wikidata.org/wiki/Q256355","display_name":"Equivariant map","level":2,"score":0.6330119967460632},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43106043338775635},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3461688756942749},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.33737772703170776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33243441581726074},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2936059832572937},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08721470832824707},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tpami.2025.3599592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpami.2025.3599592","pdf_url":null,"source":{"id":"https://openalex.org/S199944782","display_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","issn_l":"0162-8828","issn":["0162-8828","1939-3539","2160-9292"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","raw_type":"journal-article"},{"id":"pmid:40815581","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/40815581","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on pattern analysis and machine intelligence","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1597648770","display_name":null,"funder_award_id":"24ZR1491700","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G1625387157","display_name":null,"funder_award_id":"92370115","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2569638170","display_name":null,"funder_award_id":"2021ZD0111602","funder_id":"https://openalex.org/F4320329860","funder_display_name":"National Science and Technology Major Project"},{"id":"https://openalex.org/G6863694992","display_name":null,"funder_award_id":"62276165","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322183","display_name":"Huawei Technologies","ror":"https://ror.org/00cmhce21"},{"id":"https://openalex.org/F4320329860","display_name":"National Science and Technology Major Project","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W39301296","https://openalex.org/W1834627138","https://openalex.org/W1849277567","https://openalex.org/W1901129140","https://openalex.org/W1915485278","https://openalex.org/W1920022804","https://openalex.org/W2097543505","https://openalex.org/W2112796928","https://openalex.org/W2112828793","https://openalex.org/W2194775991","https://openalex.org/W2200124539","https://openalex.org/W2317339301","https://openalex.org/W2403682575","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2596378825","https://openalex.org/W2701059868","https://openalex.org/W2809414288","https://openalex.org/W2894977338","https://openalex.org/W2897830718","https://openalex.org/W2919337578","https://openalex.org/W2963303354","https://openalex.org/W2963456518","https://openalex.org/W2963989815","https://openalex.org/W3035616549","https://openalex.org/W3167780554","https://openalex.org/W3173128495","https://openalex.org/W4213278605","https://openalex.org/W4226117300"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W25973253","https://openalex.org/W3102737270","https://openalex.org/W3029194710","https://openalex.org/W4301374518","https://openalex.org/W1584401868"],"abstract_inverted_index":{"This":[0],"paper":[1],"focuses":[2],"on":[3],"the":[4,33,68,77,86,94,99,106,118,142,147,153,160,171,184,190,208,213,221,228,238,242,262,269],"problem":[5],"of":[6,21,93,201,244,253],"preventing":[7,26,59,245],"information":[8,60,88,139,246],"leakage":[9],"in":[10,67,76,105,170,207],"neural":[11,23,49,55,172,209,259],"networks,":[12],"i.e.,":[13],"assuming":[14],"that":[15,159,220],"attackers":[16,27,126],"have":[17,127],"obtained":[18,128],"intermediate-layer":[19,132],"features":[20,31,66,162],"a":[22,40,52,81,90,199],"network,":[24],"and":[25,73,97,112,131,182],"from":[28],"inverting":[29],"these":[30],"to":[32,43,178,188,203,211,257],"input":[34,87,138],"with":[35,227,249],"private":[36,119],"information.":[37,144],"We":[38,84],"propose":[39,198],"generic":[41],"method":[42],"slightly":[44],"revise":[45,204],"each":[46,74],"arbitrary":[47],"traditional":[48,258],"network":[50,56,69,129,173,210],"into":[51,70,89],"multiary-valued":[53],"rotation-equivariant":[54],"(RENN)":[57],"for":[58,102],"leakage.":[61],"Specifically,":[62],"we":[63,197,218],"convert":[64],"real-valued":[65],"multi-ary":[71,82,95,100],"features,":[72,133,157],"element":[75],"feature":[78,101],"vector":[79],"is":[80,186,224,265],"number.":[83],"hide":[85],"certain":[91],"phase":[92],"feature,":[96],"rotate":[98],"attribute":[103],"obfuscation":[104],"encryption":[107,148,181],"process.":[108],"The":[109],"rotation":[110,143,191,214],"axis":[111],"angle":[113],"can":[114,163],"be":[115,164],"considered":[116],"as":[117],"key.":[120],"In":[121,176,236],"this":[122,195],"way,":[123],"even":[124],"when":[125,232],"parameters":[130],"they":[134],"still":[135],"cannot":[136],"extract":[137],"without":[140,174],"knowing":[141],"More":[145],"crucially,":[146],"operation":[149],"does":[150],"not":[151],"damage":[152],"spatial":[154],"correlations":[155],"between":[156],"so":[158],"encrypted":[161],"easily":[165],"processed":[166],"by":[167],"convolution":[168],"operations":[169,206],"difficulties.":[175],"order":[177],"implement":[179],"successful":[180],"decryption,":[183],"RENN":[185,223,231,239],"designed":[187],"satisfy":[189],"equivariance":[192,215],"property.":[193,216],"To":[194],"end,":[196],"set":[200],"rules":[202],"classic":[205],"ensure":[212],"Besides,":[217,261],"prove":[219],"$d$d-ary":[222],"downward":[225],"compatible":[226],"$d^{\\prime":[229,233],"}$d'-ary":[230],"}<":[234],"d$d'<d.":[235],"experiments,":[237],"significantly":[240],"boosts":[241],"capacity":[243],"leakage,":[247],"yet":[248],"only":[250],"mild":[251],"degradation":[252],"classification":[254],"accuracy,":[255],"compared":[256],"networks.":[260],"computational":[263],"cost":[264],"much":[266],"less":[267],"than":[268],"homomorphic":[270],"encryption.":[271]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
