{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T23:58:33Z","timestamp":1778111913588,"version":"3.51.4"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23B2022"],"award-info":[{"award-number":["U23B2022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2030"],"award-info":[{"award-number":["U22A2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Major Project of Basic and Applied Basic Research","award":["2023B0303000010"],"award-info":[{"award-number":["2023B0303000010"]}]},{"name":"Deanship of Scientific Research at King Khalid University for funding this work through a Small Group Research Project","award":["RGP1\/405\/44"],"award-info":[{"award-number":["RGP1\/405\/44"]}]},{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tce.2025.3534859","type":"journal-article","created":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T13:31:28Z","timestamp":1738330288000},"page":"4464-4474","source":"Crossref","is-referenced-by-count":24,"title":["DDCM: Cracking Anonymized Facial Images Using Denoising Diffusion Cryptanalytic Model"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-6409","authenticated-orcid":false,"given":"Donghua","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7520-9031","authenticated-orcid":false,"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2541-7876","authenticated-orcid":false,"given":"Nada","family":"Alasbali","sequence":"additional","affiliation":[{"name":"Department of Informatics and Computer Systems, College of Computer Science, King Khalid University, Abha, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5818-8777","authenticated-orcid":false,"given":"Ibtehal","family":"Nafea","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina, Saudi Arabia"}]},{"given":"Qingliang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Physics, Qingdao University of Science and Technology, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-8248","authenticated-orcid":false,"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Cybersecurity Center, Prince Mohammad Bin Fahd University, Al-Khobar, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0757","authenticated-orcid":false,"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[{"name":"Robotics and Internet-of-Things Laboratory, Prince Sultan University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0279-0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3146369"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/30.883383"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3282964"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3285626"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3616470"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2023.3315131"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23432"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.114"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3070348"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3163685"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.112"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00549"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.039"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.02.013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547757"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3274359"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3282384"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3344809"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00136"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110291"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3204461"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127271"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1364\/OE.445689"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.366"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.398"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97546-3_8"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref30","article-title":"Generative model-based attack on learnable image encryption for privacy-preserving deep learning","author":"MaungMaung","year":"2023","journal-title":"arXiv:2303.05036"},{"key":"ref31","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sohl\u2013Dickstein"},{"key":"ref32","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. 34th Conf. Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref33","first-page":"1","article-title":"Denoising diffusion implicit models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Song"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01268"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_42"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.01.029"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00259-023-06417-8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00966"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_19"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2024.3412100"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2017.014722"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00170"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25072-9_8"},{"key":"ref47","first-page":"1","article-title":"Large scale GAN training for high fidelity natural image synthesis","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Brock"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00559"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3366328"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548110"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3290836"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412193"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11128999\/10869379.pdf?arnumber=10869379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T17:36:49Z","timestamp":1760117809000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10869379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":56,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3534859","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}