{"id":"https://openalex.org/W2901267625","doi":"https://doi.org/10.1145/3243734.3278511","title":"Image Disguising for Privacy-preserving Deep Learning","display_name":"Image Disguising for Privacy-preserving Deep Learning","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2901267625","doi":"https://doi.org/10.1145/3243734.3278511","mag":"2901267625"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3278511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3278511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://corescholar.libraries.wright.edu/knoesis/1157","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052897959","display_name":"Sagar Sharma","orcid":"https://orcid.org/0000-0002-6667-4724"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sagar Sharma","raw_affiliation_strings":["Wright State University, Dayton, OH, USA"],"affiliations":[{"raw_affiliation_string":"Wright State University, Dayton, OH, USA","institution_ids":["https://openalex.org/I19648265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002572745","display_name":"Keke Chen","orcid":"https://orcid.org/0000-0002-9996-156X"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keke Chen","raw_affiliation_strings":["Wright State University, Dayton, OH, USA"],"affiliations":[{"raw_affiliation_string":"Wright State University, Dayton, OH, USA","institution_ids":["https://openalex.org/I19648265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052897959"],"corresponding_institution_ids":["https://openalex.org/I19648265"],"apc_list":null,"apc_paid":null,"fwci":1.3539,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.86245223,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2291","last_page":"2293"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8541271686553955},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7158272862434387},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5819711685180664},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.532031238079071},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5299490690231323},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5262020230293274},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.523896336555481},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5173720717430115},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.47725507616996765},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4772217869758606},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4690065085887909},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45333677530288696},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4480423033237457},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.43454962968826294},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4309000074863434},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.41856321692466736},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3766867220401764},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.23830392956733704},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15716397762298584},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11349520087242126}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8541271686553955},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7158272862434387},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5819711685180664},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.532031238079071},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5299490690231323},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5262020230293274},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.523896336555481},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5173720717430115},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.47725507616996765},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4772217869758606},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4690065085887909},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45333677530288696},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4480423033237457},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.43454962968826294},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4309000074863434},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.41856321692466736},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3766867220401764},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.23830392956733704},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15716397762298584},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11349520087242126},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3243734.3278511","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3278511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:corescholar.libraries.wright.edu:knoesis-2537","is_oa":true,"landing_page_url":"https://corescholar.libraries.wright.edu/knoesis/1157","pdf_url":null,"source":{"id":"https://openalex.org/S2737205702","display_name":"Journal of Bioresource Management","issn_l":"2309-3854","issn":["2309-3854"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310316536","host_organization_name":"Bioresource Research Center (BRC), Islamabad","host_organization_lineage":["https://openalex.org/P4310316536"],"host_organization_lineage_names":["Bioresource Research Center (BRC), Islamabad"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kno.e.sis Publications","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:corescholar.libraries.wright.edu:knoesis-2537","is_oa":true,"landing_page_url":"https://corescholar.libraries.wright.edu/knoesis/1157","pdf_url":null,"source":{"id":"https://openalex.org/S2737205702","display_name":"Journal of Bioresource Management","issn_l":"2309-3854","issn":["2309-3854"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310316536","host_organization_name":"Bioresource Research Center (BRC), Islamabad","host_organization_lineage":["https://openalex.org/P4310316536"],"host_organization_lineage_names":["Bioresource Research Center (BRC), Islamabad"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Kno.e.sis Publications","raw_type":"text"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/10"},{"display_name":"Peace, Justice and strong institutions","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W133884053","https://openalex.org/W1577871831","https://openalex.org/W1971991172","https://openalex.org/W2051267297","https://openalex.org/W2053637704","https://openalex.org/W2473418344","https://openalex.org/W2591882872","https://openalex.org/W2701059868","https://openalex.org/W2754620673","https://openalex.org/W2949650786","https://openalex.org/W6687483927"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3203790781","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480","https://openalex.org/W2997056298","https://openalex.org/W4298079292"],"abstract_inverted_index":{"Due":[0],"to":[1,16,67,83,97,114,149],"the":[2,39,43,48,84,108,150],"high":[3],"training":[4,40,71,86],"costs":[5],"of":[6,70,110,161],"deep":[7,139],"learning,":[8],"model":[9,58,104,119],"developers":[10],"often":[11],"rent":[12],"cloud":[13],"GPU":[14],"servers":[15],"achieve":[17],"better":[18],"efficiency.":[19],"However,":[20],"this":[21],"practice":[22],"raises":[23],"privacy":[24,102],"concerns.":[25],"An":[26],"adversarial":[27,63],"party":[28],"may":[29],"be":[30],"interested":[31],"in":[32,38],"1)":[33],"personal":[34],"identifiable":[35],"information":[36],"encoded":[37],"data":[41,72,79,87,117],"and":[42,61,88,103,118,129,156,165],"learned":[44],"models,":[45],"2)":[46],"misusing":[47],"sensitive":[49,74],"models":[50],"for":[51],"its":[52],"own":[53],"benefits,":[54],"or":[55],"3)":[56],"launching":[57],"inversion":[59],"(MIA)":[60],"generative":[62],"network":[64],"(GAN)":[65],"attacks":[66],"reconstruct":[68],"replicas":[69],"(e.g.,":[73],"images).":[75],"Learning":[76],"from":[77,163],"encrypted":[78],"seems":[80],"impractical":[81],"due":[82],"large":[85],"expensive":[89],"learning":[90],"algorithms,":[91],"while":[92],"differential-privacy":[93],"based":[94],"approaches":[95],"have":[96],"make":[98],"significant":[99],"trade-offs":[100],"between":[101],"quality.":[105],"We":[106],"investigate":[107],"use":[109],"image":[111],"disguising":[112],"techniques":[113],"protect":[115],"both":[116],"privacy.":[120],"Our":[121],"preliminary":[122],"results":[123],"show":[124],"that":[125],"with":[126],"block-wise":[127],"permutation":[128],"transformations,":[130],"surprisingly,":[131],"disguised":[132,144],"images":[133,145],"still":[134],"give":[135],"reasonably":[136],"well":[137],"performing":[138],"neural":[140],"networks":[141],"(DNN).":[142],"The":[143],"are":[146],"also":[147],"resilient":[148],"deep-learning":[151],"enhanced":[152],"visual":[153],"discrimination":[154],"attack":[155],"provide":[157],"an":[158],"extra":[159],"layer":[160],"protection":[162],"MIA":[164],"GAN":[166],"attacks.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2018-11-29T00:00:00"}
