{"id":"https://openalex.org/W4389625312","doi":"https://doi.org/10.1186/s13677-023-00537-0","title":"Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network","display_name":"Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network","publication_year":2023,"publication_date":"2023-12-12","ids":{"openalex":"https://openalex.org/W4389625312","doi":"https://doi.org/10.1186/s13677-023-00537-0"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-023-00537-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00537-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00537-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00537-0","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104164642","display_name":"Huixue Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huixue Jia","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001954846","display_name":"Daomeng Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I4210113342","display_name":"Systems Engineering Society of China","ror":"https://ror.org/024pse488","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210113342"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daomeng Cai","raw_affiliation_strings":["CSSC System Engineering Research Institute, Beijing, China","School of Mechanical Engineering and Automation Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"CSSC System Engineering Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210113342"]},{"raw_affiliation_string":"School of Mechanical Engineering and Automation Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100681896","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0002-3706-2462"},"institutions":[{"id":"https://openalex.org/I4210113342","display_name":"Systems Engineering Society of China","ror":"https://ror.org/024pse488","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210113342"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["CSSC System Engineering Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"CSSC System Engineering Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210113342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081562867","display_name":"Weidong Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I4210129465","display_name":"Wuhan Ship Development & Design Institute","ror":"https://ror.org/02mcdae06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210129465"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weidong Qian","raw_affiliation_strings":["China Ship Scientific Research Center, Wuxi, China"],"affiliations":[{"raw_affiliation_string":"China Ship Scientific Research Center, Wuxi, China","institution_ids":["https://openalex.org/I4210129465"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390514","display_name":"Cong Wang","orcid":"https://orcid.org/0000-0003-0547-315X"},"institutions":[{"id":"https://openalex.org/I4210147983","display_name":"Guangdong Police College","ror":"https://ror.org/05krxyw16","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147983"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cong Wang","raw_affiliation_strings":["The Intelligent Policing Key Laboratory of Sichuan Province, Sichuan Police College, Luzhou, China"],"affiliations":[{"raw_affiliation_string":"The Intelligent Policing Key Laboratory of Sichuan Province, Sichuan Police College, Luzhou, China","institution_ids":["https://openalex.org/I4210147983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100449142","display_name":"Xiaoyu Li","orcid":"https://orcid.org/0000-0002-0561-2028"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Li","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024093770","display_name":"Shan Yang","orcid":"https://orcid.org/0000-0002-3705-3726"},"institutions":[{"id":"https://openalex.org/I61937129","display_name":"Jackson State University","ror":"https://ror.org/01ecnnp60","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I61937129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shan Yang","raw_affiliation_strings":["Department of Chemistry, Physics, and Atmospheric Sciences, Jackson State University, Jackson, Mississippi, USA"],"affiliations":[{"raw_affiliation_string":"Department of Chemistry, Physics, and Atmospheric Sciences, Jackson State University, Jackson, Mississippi, USA","institution_ids":["https://openalex.org/I61937129"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100390514"],"corresponding_institution_ids":["https://openalex.org/I4210147983"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":2.9927,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.93078126,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"12","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8805080652236938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8366923332214355},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7352581024169922},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.587336003780365},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5079720616340637},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4899727404117584},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.46618717908859253},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4636097848415375},{"id":"https://openalex.org/keywords/homomorphic-filtering","display_name":"Homomorphic filtering","score":0.44487234950065613},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4299830198287964},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37847480177879333},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3769747316837311},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3419603109359741},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21487462520599365},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19483163952827454}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8805080652236938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8366923332214355},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7352581024169922},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.587336003780365},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5079720616340637},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4899727404117584},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.46618717908859253},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4636097848415375},{"id":"https://openalex.org/C56683213","wikidata":"https://www.wikidata.org/wiki/Q4143008","display_name":"Homomorphic filtering","level":4,"score":0.44487234950065613},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4299830198287964},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37847480177879333},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3769747316837311},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3419603109359741},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21487462520599365},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19483163952827454},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C3017601658","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image enhancement","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-023-00537-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00537-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00537-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5ef07f48e9264b63b9ffa8a640de6e51","is_oa":true,"landing_page_url":"https://doaj.org/article/5ef07f48e9264b63b9ffa8a640de6e51","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-15 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-023-00537-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00537-0","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00537-0","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8844933060","display_name":null,"funder_award_id":"J2019-V-0001-0092","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320326699","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389625312.pdf"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W2959950439","https://openalex.org/W3033681523","https://openalex.org/W3038500142","https://openalex.org/W3044214866","https://openalex.org/W3115419735","https://openalex.org/W3153037112","https://openalex.org/W3156556650","https://openalex.org/W3167700846","https://openalex.org/W3169347516","https://openalex.org/W3173128495","https://openalex.org/W3192790930","https://openalex.org/W3197875103","https://openalex.org/W3200832329","https://openalex.org/W3202986187","https://openalex.org/W3213684602","https://openalex.org/W4200463697","https://openalex.org/W4221111998","https://openalex.org/W4223529204","https://openalex.org/W4225586447","https://openalex.org/W4226248369","https://openalex.org/W4229440075","https://openalex.org/W4248164615","https://openalex.org/W4281703232","https://openalex.org/W4285272834","https://openalex.org/W4288042031","https://openalex.org/W4292188619","https://openalex.org/W4292262852","https://openalex.org/W4292868472","https://openalex.org/W4297094717","https://openalex.org/W4303946458","https://openalex.org/W4306639562","https://openalex.org/W4312230329","https://openalex.org/W4312903728","https://openalex.org/W4313579021","https://openalex.org/W4313825612","https://openalex.org/W4313894101","https://openalex.org/W4323836352","https://openalex.org/W4360603039","https://openalex.org/W4360979150","https://openalex.org/W4360980637","https://openalex.org/W4362644924","https://openalex.org/W4362709188","https://openalex.org/W4365146594","https://openalex.org/W4366280654","https://openalex.org/W4367312001","https://openalex.org/W4384029320","https://openalex.org/W6606597565"],"related_works":["https://openalex.org/W2352447358","https://openalex.org/W4256445865","https://openalex.org/W4390622964","https://openalex.org/W3214383934","https://openalex.org/W3162771074","https://openalex.org/W4401886308","https://openalex.org/W2259754626","https://openalex.org/W2625655658","https://openalex.org/W4388855261","https://openalex.org/W2378709520"],"abstract_inverted_index":{"Abstract":[0],"Image":[1],"feature":[2,187],"categorization":[3],"has":[4],"emerged":[5],"as":[6],"a":[7,53,75,102,121,176],"crucial":[8],"component":[9],"in":[10,20,69,153,172],"many":[11],"domains,":[12],"including":[13],"computer":[14],"vision,":[15],"machine":[16],"learning,":[17],"and":[18,27,40,47,65,87,98,140,157,161,164,178,196],"biometrics,":[19],"the":[21,92,114,127,168,182,190],"dynamic":[22],"environment":[23],"of":[24,117,130,185,193],"big":[25,197],"data":[26,37,67,96],"cloud":[28,194],"computing.":[29],"It":[30],"is":[31],"extremely":[32],"difficult":[33],"to":[34,79,109,137,145,181],"guarantee":[35],"image":[36,58,66,186],"security,":[38],"privacy,":[39,99],"computing":[41,195],"efficiency":[42],"while":[43],"also":[44],"lowering":[45],"storage":[46,141,156],"transmission":[48,158],"costs.":[49],"This":[50],"paper":[51,174],"introduces":[52],"novel":[54,76],"method":[55],"for":[56,94],"classifying":[57],"features":[59],"that":[60,125],"combines":[61],"multilevel":[62],"homomorphic":[63,105,131],"encryption":[64,106,123],"partitioning":[68,77],"an":[70,134],"integrated":[71],"manner.":[72],"We":[73],"employ":[74],"strategy":[78,124],"reduce":[80],"computational":[81,85,139,154],"complexity,":[82],"significantly":[83],"reducing":[84],"load":[86],"improving":[88],"classification":[89,188],"accuracy.":[90],"In":[91],"quest":[93],"increased":[95],"security":[97,163],"we":[100,119],"introduce":[101],"novel,":[103],"fully":[104],"approach":[107],"specialized":[108],"partitioned":[110],"images.":[111],"To":[112],"counter":[113],"inherent":[115],"complexity":[116],"encryption,":[118],"devise":[120],"compound":[122],"exploits":[126],"full":[128],"potential":[129],"computation,":[132],"with":[133],"explicit":[135],"objective":[136],"curtail":[138],"overheads.":[142],"Evidently":[143],"superior":[144],"conventional":[146],"methods,":[147],"our":[148],"methodology":[149,169],"showcases":[150],"pronounced":[151],"benefits":[152],"efficiency,":[155],"cost":[159],"reduction,":[160],"robust":[162],"privacy":[165],"preservation.":[166],"Hence,":[167],"put":[170],"forth":[171],"this":[173],"presents":[175],"pioneering":[177],"efficacious":[179],"resolution":[180],"multifaceted":[183],"challenges":[184],"within":[189],"intricate":[191],"milieu":[192],"data.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":6}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
