{"id":"https://openalex.org/W4309685840","doi":"https://doi.org/10.3233/jcs-220042","title":"StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception","display_name":"StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception","publication_year":2022,"publication_date":"2022-11-21","ids":{"openalex":"https://openalex.org/W4309685840","doi":"https://doi.org/10.3233/jcs-220042"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-220042","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-220042","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100374703","display_name":"Jianfeng Zhang","orcid":"https://orcid.org/0000-0001-8543-8084"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Zhang","raw_affiliation_strings":["College of Computer Science, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100414787","display_name":"Wensheng Zhang","orcid":"https://orcid.org/0000-0003-0752-941X"},"institutions":[{"id":"https://openalex.org/I4210094879","display_name":"Shandong Institute of Automation","ror":"https://ror.org/00qdtba35","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210094879","https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wensheng Zhang","raw_affiliation_strings":["Institute of Automation, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Automation, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210094879","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100513062","display_name":"Jingdong Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingdong Xu","raw_affiliation_strings":["College of Computer Science, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100513062"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":null,"apc_paid":null,"fwci":0.1327,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54031358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"31","issue":"4","first_page":"393","last_page":"417"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8411117792129517},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.7406854033470154},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5994635820388794},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5989203453063965},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5575013756752014},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4800730347633362},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47901076078414917},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45143160223960876},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.45010751485824585},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4387558400630951},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.43637901544570923},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.429067462682724},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.424851655960083},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.41787663102149963},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3546890914440155},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3386262357234955},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3220635652542114},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17801254987716675}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8411117792129517},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.7406854033470154},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5994635820388794},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5989203453063965},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5575013756752014},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4800730347633362},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47901076078414917},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45143160223960876},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.45010751485824585},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4387558400630951},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.43637901544570923},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.429067462682724},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.424851655960083},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.41787663102149963},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3546890914440155},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3386262357234955},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3220635652542114},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17801254987716675},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-220042","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-220042","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7200000286102295}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1834627138","https://openalex.org/W2108598243","https://openalex.org/W2187089797","https://openalex.org/W2331128040","https://openalex.org/W2620760558","https://openalex.org/W2683470288","https://openalex.org/W2796127036","https://openalex.org/W2889326414","https://openalex.org/W2900141423","https://openalex.org/W2920031528","https://openalex.org/W2950306824","https://openalex.org/W2950865323","https://openalex.org/W2971544482","https://openalex.org/W2981114133","https://openalex.org/W2982083293","https://openalex.org/W2982402336","https://openalex.org/W2997170888","https://openalex.org/W2997378229","https://openalex.org/W3003532255","https://openalex.org/W3005441623","https://openalex.org/W3034644181","https://openalex.org/W3040266635","https://openalex.org/W3048511172","https://openalex.org/W3048636285","https://openalex.org/W3080136191","https://openalex.org/W3084432478","https://openalex.org/W3087732768","https://openalex.org/W3093021001","https://openalex.org/W3093749026","https://openalex.org/W3097924569","https://openalex.org/W3104454153","https://openalex.org/W3105886168","https://openalex.org/W3107235539","https://openalex.org/W3109042658","https://openalex.org/W3118815406","https://openalex.org/W3121057473","https://openalex.org/W3123159599","https://openalex.org/W3135550350","https://openalex.org/W3136475158","https://openalex.org/W3164282918","https://openalex.org/W3164675724","https://openalex.org/W3178661111","https://openalex.org/W3182270175","https://openalex.org/W3193630419","https://openalex.org/W3203430276","https://openalex.org/W4313140285"],"related_works":["https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2083944649","https://openalex.org/W4309503015","https://openalex.org/W2596305496","https://openalex.org/W1548444773","https://openalex.org/W58529046","https://openalex.org/W2577220285","https://openalex.org/W2220417288"],"abstract_inverted_index":{"Due":[0],"to":[1,27,61,128,178,195,248,260],"the":[2,13,32,53,71,78,103,110,135,154,158,162,170,180,189,196,203,221,229,239,265],"limited":[3],"capabilities":[4],"of":[5,15,31,55,82,105,202,215,232,242],"user":[6,59,83,182,262],"devices,":[7],"such":[8,160],"as":[9,23,133],"smart":[10],"phones,":[11],"and":[12,44,100,115,138,156,223],"Internet":[14],"Things":[16],"(IoT),":[17],"edge":[18,62,171],"intelligence":[19,41],"is":[20,95,210],"being":[21],"recognized":[22],"a":[24,124,139,213],"promising":[25],"paradigm":[26],"enable":[28],"effective":[29],"analysis":[30],"data":[33,68,84,183,208,263],"generated":[34],"by":[35,109,169,246],"these":[36,106],"devices":[37,60],"with":[38,251],"complex":[39],"artificial":[40],"(AI)":[42],"models,":[43],"it":[45],"often":[46],"entails":[47],"either":[48],"fully":[49],"or":[50,184],"partially":[51],"offloading":[52],"computation":[54],"neural":[56],"networks":[57],"from":[58,153,188,193,264],"computing":[63,172],"servers.":[64],"To":[65],"protect":[66],"users\u2019":[67,207],"privacy":[69,149,209],"in":[70,87,97,112,118],"process,":[72],"most":[73],"existing":[74],"researches":[75],"assume":[76],"that":[77,144,161],"private":[79],"(sensitive)":[80],"attributes":[81,187,245],"are":[85],"known":[86],"advance":[88],"when":[89],"designing":[90],"privacy-protection":[91],"measures.":[92],"This":[93],"assumption":[94],"restrictive":[96],"real":[98],"life,":[99],"thus":[101],"limits":[102],"application":[104],"methods.":[107],"Inspired":[108],"research":[111],"image":[113,137,143],"steganography":[114],"cyber":[116],"deception,":[117],"this":[119,129],"paper,":[120],"we":[121],"propose":[122],"StegEdge,":[123],"conceptually":[125],"novel":[126],"approach":[127],"challenge.":[130],"StegEdge":[131,237],"takes":[132],"input":[134],"user-generated":[136],"randomly":[140],"selected":[141],"\u201ccover\u201d":[142],"does":[145],"not":[146],"pose":[147],"any":[148],"concern":[150],"(e.g.,":[151],"downloaded":[152],"Internet),":[155],"extracts":[157],"features":[159,191],"utility":[163,235],"tasks":[164],"can":[165],"still":[166],"be":[167],"conducted":[168,219],"servers,":[173],"while":[174,254],"potential":[175],"adversaries":[176,258],"seeking":[177,259],"reconstruct/recover":[179],"original":[181],"analyze":[185],"sensitive":[186,244],"extracted":[190,266],"sent":[192],"users":[194],"server,":[197],"will":[198],"largely":[199],"acquire":[200],"information":[201],"cover":[204],"image.":[205],"Thus,":[206],"protected":[211],"via":[212],"form":[214],"deception.":[216],"Empirical":[217],"results":[218],"on":[220],"CelebA":[222],"ImageNet":[224],"datasets":[225],"show":[226],"that,":[227],"at":[228],"same":[230],"level":[231],"accuracy":[233,241],"for":[234],"tasks,":[236],"reduces":[238],"adversaries\u2019":[240],"predicting":[243],"up":[247],"38%":[249],"compared":[250],"other":[252],"methods,":[253],"also":[255],"defending":[256],"against":[257],"reconstruct":[261],"features.":[267]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
