{"id":"https://openalex.org/W4226353803","doi":"https://doi.org/10.1109/access.2022.3166523","title":"Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit","display_name":"Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4226353803","doi":"https://doi.org/10.1109/access.2022.3166523"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3166523","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3166523","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09755158.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09755158.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100329075","display_name":"Jialin Li","orcid":"https://orcid.org/0000-0001-5648-0742"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jialin Li","raw_affiliation_strings":["School of Software Engineering, East China Normal University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-5648-0742","affiliations":[{"raw_affiliation_string":"School of Software Engineering, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054647117","display_name":"Penghao Lu","orcid":"https://orcid.org/0000-0002-8209-6311"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Penghao Lu","raw_affiliation_strings":["School of Software Engineering, East China Normal University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-8209-6311","affiliations":[{"raw_affiliation_string":"School of Software Engineering, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079659938","display_name":"Xuemin Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuemin Lin","raw_affiliation_strings":["School of Software Engineering, East China Normal University, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Software Engineering, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100329075"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.4166,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67142421,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"10","issue":null,"first_page":"39407","last_page":"39423"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8936175107955933},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8504490852355957},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6700350046157837},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5409364104270935},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.505012571811676},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4532015919685364},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4235556125640869},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42243996262550354},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39964964985847473},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3827439546585083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25697600841522217},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.093709796667099}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8936175107955933},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8504490852355957},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6700350046157837},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5409364104270935},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.505012571811676},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4532015919685364},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4235556125640869},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42243996262550354},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39964964985847473},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3827439546585083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25697600841522217},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.093709796667099},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3166523","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3166523","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09755158.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fa65a7f3eef9428daa8b56ecac4a1909","is_oa":true,"landing_page_url":"https://doaj.org/article/fa65a7f3eef9428daa8b56ecac4a1909","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 39407-39423 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3166523","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3166523","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9668973/09755158.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4699999988079071}],"awards":[{"id":"https://openalex.org/G5042221404","display_name":null,"funder_award_id":"62132005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6882619641","display_name":null,"funder_award_id":"20ZR1418400","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G7959687564","display_name":null,"funder_award_id":"62172162","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8080694497","display_name":null,"funder_award_id":"62172161","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4226353803.pdf","grobid_xml":"https://content.openalex.org/works/W4226353803.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W66018615","https://openalex.org/W1987971958","https://openalex.org/W2014841127","https://openalex.org/W2031533839","https://openalex.org/W2073849744","https://openalex.org/W2108834246","https://openalex.org/W2132172731","https://openalex.org/W2177209050","https://openalex.org/W2281202115","https://openalex.org/W2326245332","https://openalex.org/W2461759357","https://openalex.org/W2740840499","https://openalex.org/W2768000551","https://openalex.org/W2768174108","https://openalex.org/W2791459719","https://openalex.org/W2887040599","https://openalex.org/W2944346404","https://openalex.org/W2980804824","https://openalex.org/W2982505181","https://openalex.org/W2985668806","https://openalex.org/W2996129147","https://openalex.org/W3009532126","https://openalex.org/W3014099641","https://openalex.org/W3014777329","https://openalex.org/W3028867652","https://openalex.org/W3042006926","https://openalex.org/W3043609867","https://openalex.org/W3081982417","https://openalex.org/W3101421850","https://openalex.org/W3127290142","https://openalex.org/W6778434676"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W2947510282","https://openalex.org/W2363701519","https://openalex.org/W2601739120","https://openalex.org/W2292786713","https://openalex.org/W3212491810","https://openalex.org/W2887779253"],"abstract_inverted_index":{"Although":[0],"tremendous":[1],"revolution":[2],"has":[3,26],"been":[4,27],"made":[5],"in":[6,21,86,195],"the":[7,31,111,124,129,161,166,184,192,207,222],"emerging":[8],"cloud":[9],"computing":[10,57,65,93],"technologies":[11],"over":[12],"digital":[13],"devices,":[14],"privacy":[15,35,213],"gradually":[16],"becomes":[17],"a":[18,76,148],"big":[19],"concern":[20],"outsourcing":[22,81],"computation.":[23],"Homomorphic":[24],"encryption":[25],"proposed":[28,85,155,188],"to":[29,122,190,205,215],"facilitate":[30],"preservation":[32],"of":[33,70,101,186,197,209,226],"data":[34],"while":[36],"computational":[37,139,198],"tasks":[38,58],"being":[39],"executed":[40],"on":[41,99,133,143,153],"ciphertext.":[42],"However,":[43],"many":[44],"existing":[45],"studies":[46],"only":[47],"support":[48],"limited":[49,179],"homomorphic":[50,92,112,149,162],"calculation":[51],"functions":[52],"which":[53,89],"barely":[54],"satisfy":[55],"complex":[56],"such":[59],"as":[60,165],"machine":[61],"learning":[62],"with":[63,178],"massive":[64],"resources":[66],"and":[67,79,97,103,118,126,159,224],"rich":[68],"types":[69],"function.":[71],"To":[72],"address":[73],"this":[74,87],"problem,":[75],"novel":[77],"multifunctional":[78],"privacy-preserving":[80],"computation":[82],"toolkit":[83,156,189,211],"is":[84],"paper,":[88],"supports":[90],"several":[91],"protocols":[94,185],"including":[95],"division":[96],"power":[98],"ciphertext":[100,121,131],"integers":[102],"floating":[104,119,134],"point":[105,120,135],"numbers.":[106],"Specifically,":[107],"we":[108,146,182,201],"first":[109],"implement":[110,147],"mutual":[113],"conversion":[114],"protocol":[115],"between":[116],"integer":[117],"balance":[123],"efficiency":[125,223],"feasibility,":[127],"considering":[128],"high-precision":[130],"operation":[132],"numbers":[136],"costs":[137],"100x":[138],"overhead":[140],"than":[141],"that":[142],"integers.":[144],"Second,":[145],"K-means":[150],"algorithm":[151],"based":[152],"our":[154,187,210,227],"for":[157,175],"clustering":[158],"design":[160],"silhouette":[163],"coefficient":[164],"evaluation":[167],"index,":[168],"thereby":[169],"providing":[170],"an":[171],"informative":[172],"cluster":[173],"assessment":[174],"local":[176],"users":[177],"resources.":[180],"Then,":[181],"simulate":[183],"explore":[191],"parameter":[193],"sensitivity":[194],"terms":[196],"efficiency.":[199],"Last,":[200],"report":[202],"security":[203,208],"analysis":[204],"prove":[206],"without":[212],"leakage":[214],"unauthorized":[216],"parties.":[217],"Comprehensive":[218],"experiments":[219],"further":[220],"demonstrate":[221],"utility":[225],"toolkit.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2022-05-05T00:00:00"}
