{"id":"https://openalex.org/W4211205922","doi":"https://doi.org/10.1109/cis54983.2021.00106","title":"An Improved LRP-Based Differential Privacy Preserving Deep Learning Framework","display_name":"An Improved LRP-Based Differential Privacy Preserving Deep Learning Framework","publication_year":2021,"publication_date":"2021-11-01","ids":{"openalex":"https://openalex.org/W4211205922","doi":"https://doi.org/10.1109/cis54983.2021.00106"},"language":"en","primary_location":{"id":"doi:10.1109/cis54983.2021.00106","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cis54983.2021.00106","pdf_url":null,"source":{"id":"https://openalex.org/S4363608286","display_name":"2021 17th International Conference on Computational Intelligence and Security (CIS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 17th International Conference on Computational Intelligence and Security (CIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038791055","display_name":"Yaling Zhang","orcid":"https://orcid.org/0000-0002-1759-6678"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yaling Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, Xi&#x0027;an University of Technology,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi&#x0027;an University of Technology,Xi&#x0027;an,China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049446098","display_name":"Shibo Bai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shibo Bai","raw_affiliation_strings":["School of Computer Science and Engineering, Xi&#x0027;an University of Technology,Xi&#x0027;an,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi&#x0027;an University of Technology,Xi&#x0027;an,China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038791055"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2513,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54234436,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"15","issue":null,"first_page":"484","last_page":"488"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9391999840736389,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.9262999892234802,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8898866176605225},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.8193333148956299},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8000303506851196},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5300276875495911},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5191951990127563},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.49493855237960815},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.47013550996780396},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.41770634055137634},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32463714480400085},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3075273633003235},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2964344024658203}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8898866176605225},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.8193333148956299},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8000303506851196},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5300276875495911},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5191951990127563},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.49493855237960815},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.47013550996780396},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.41770634055137634},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32463714480400085},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3075273633003235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2964344024658203},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cis54983.2021.00106","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cis54983.2021.00106","pdf_url":null,"source":{"id":"https://openalex.org/S4363608286","display_name":"2021 17th International Conference on Computational Intelligence and Security (CIS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 17th International Conference on Computational Intelligence and Security (CIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2646379906","display_name":null,"funder_award_id":"2019GY-028","funder_id":"https://openalex.org/F4320336035","funder_display_name":"Shanxi Provincial Key Research and Development Project"}],"funders":[{"id":"https://openalex.org/F4320336035","display_name":"Shanxi Provincial Key Research and Development Project","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1787224781","https://openalex.org/W2027595342","https://openalex.org/W2100495367","https://openalex.org/W2473418344","https://openalex.org/W2729742878","https://openalex.org/W2911978475","https://openalex.org/W2993032149","https://openalex.org/W3006463092","https://openalex.org/W3136021864"],"related_works":["https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2734500670","https://openalex.org/W2558166297","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W4296973715","https://openalex.org/W3093310219","https://openalex.org/W4387193529","https://openalex.org/W3101646702"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"the":[2,7,19,52,55,62,67,74,85,101],"privacy":[3,10,27,37,46,68,94],"leakage":[4],"risk":[5],"of":[6,21,35,54,100],"existing":[8],"differential":[9,45],"preserving":[11,47],"deep":[12,48],"learning":[13,49],"framework":[14,86],"when":[15],"calculating":[16],"relevance,":[17],"and":[18,66,80],"problem":[20],"model":[22,75],"training":[23,76],"consuming":[24],"too":[25],"much":[26],"budget,":[28],"this":[29,89],"paper":[30,90],"proposes":[31],"an":[32],"adaptively":[33],"allocation":[34],"dynamic":[36],"budget":[38,69],"based":[39],"on":[40],"LRP":[41],"(Layer-wise":[42],"Relevance":[43],"Propagation)":[44],"framework.":[50],"In":[51],"process":[53],"relevance":[56,63],"calculation,":[57],"noise":[58],"is":[59,70],"added":[60],"to":[61],"decomposition":[64],"information,":[65],"dynamically":[71],"changed":[72],"during":[73],"process.":[77],"Theoretical":[78],"analysis":[79],"experimental":[81],"results":[82],"show":[83],"that":[84],"proposed":[87],"in":[88],"can":[91],"protect":[92],"data":[93],"while":[95],"maintaining":[96],"a":[97],"high":[98],"accuracy":[99],"model.":[102]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
