{"id":"https://openalex.org/W3115011673","doi":"https://doi.org/10.1109/hpec43674.2020.9286175","title":"Homomorphic Encryption Based Secure Sensor Data Processing","display_name":"Homomorphic Encryption Based Secure Sensor Data Processing","publication_year":2020,"publication_date":"2020-09-22","ids":{"openalex":"https://openalex.org/W3115011673","doi":"https://doi.org/10.1109/hpec43674.2020.9286175","mag":"3115011673"},"language":"en","primary_location":{"id":"doi:10.1109/hpec43674.2020.9286175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpec43674.2020.9286175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043450560","display_name":"Vijay Gadepally","orcid":"https://orcid.org/0000-0002-4598-2808"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]},{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vijay Gadepally","raw_affiliation_strings":["Lincoln Laboratory Massachusetts Institute of Technology, Lexington, MA"],"affiliations":[{"raw_affiliation_string":"Lincoln Laboratory Massachusetts Institute of Technology, Lexington, MA","institution_ids":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088525918","display_name":"Mihailo Isakov","orcid":null},"institutions":[{"id":"https://openalex.org/I173268674","display_name":"Texas A&M University System","ror":"https://ror.org/0034eay46","country_code":"US","type":"education","lineage":["https://openalex.org/I173268674"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mihailo Isakov","raw_affiliation_strings":["Adaptive and Secure Computing Systems (ASCS) Laboratory, Texas A&M University, College Station, TX"],"affiliations":[{"raw_affiliation_string":"Adaptive and Secure Computing Systems (ASCS) Laboratory, Texas A&M University, College Station, TX","institution_ids":["https://openalex.org/I173268674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102887756","display_name":"Rashmi Agrawal","orcid":"https://orcid.org/0000-0002-9461-0170"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rashmi Agrawal","raw_affiliation_strings":["Boston University, Boston, MA"],"affiliations":[{"raw_affiliation_string":"Boston University, Boston, MA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072108599","display_name":"Jeremy Kepner","orcid":"https://orcid.org/0000-0001-9668-2613"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]},{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeremy Kepner","raw_affiliation_strings":["Lincoln Laboratory Massachusetts Institute of Technology, Lexington, MA"],"affiliations":[{"raw_affiliation_string":"Lincoln Laboratory Massachusetts Institute of Technology, Lexington, MA","institution_ids":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023809975","display_name":"Karen Gettings","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]},{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karen Gettings","raw_affiliation_strings":["Lincoln Laboratory Massachusetts Institute of Technology, Lexington, MA"],"affiliations":[{"raw_affiliation_string":"Lincoln Laboratory Massachusetts Institute of Technology, Lexington, MA","institution_ids":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069200437","display_name":"Michel A. Kinsy","orcid":"https://orcid.org/0000-0002-1432-6939"},"institutions":[{"id":"https://openalex.org/I173268674","display_name":"Texas A&M University System","ror":"https://ror.org/0034eay46","country_code":"US","type":"education","lineage":["https://openalex.org/I173268674"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michel A. Kinsy","raw_affiliation_strings":["Adaptive and Secure Computing Systems (ASCS) Laboratory, Texas A&M University, College Station, TX"],"affiliations":[{"raw_affiliation_string":"Adaptive and Secure Computing Systems (ASCS) Laboratory, Texas A&M University, College Station, TX","institution_ids":["https://openalex.org/I173268674"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5043450560"],"corresponding_institution_ids":["https://openalex.org/I4210122954","https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57149021,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7847591638565063},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7392801642417908},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.632928729057312},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6252298355102539},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.576677680015564},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5473844408988953},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5034090876579285},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4957617223262787},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.49127382040023804},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.47426021099090576},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4595443606376648},{"id":"https://openalex.org/keywords/signal-processing","display_name":"Signal processing","score":0.4115734100341797},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3956631124019623},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3540569543838501},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.26107311248779297},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24063798785209656},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.15911811590194702},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.08893027901649475}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7847591638565063},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7392801642417908},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.632928729057312},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6252298355102539},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.576677680015564},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5473844408988953},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5034090876579285},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4957617223262787},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.49127382040023804},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.47426021099090576},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4595443606376648},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.4115734100341797},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3956631124019623},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3540569543838501},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26107311248779297},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24063798785209656},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.15911811590194702},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.08893027901649475},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpec43674.2020.9286175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpec43674.2020.9286175","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W75175474","https://openalex.org/W236632755","https://openalex.org/W1480491915","https://openalex.org/W1541145573","https://openalex.org/W1561160321","https://openalex.org/W1576053930","https://openalex.org/W1598868193","https://openalex.org/W1599703818","https://openalex.org/W1945892390","https://openalex.org/W1997723092","https://openalex.org/W2002257715","https://openalex.org/W2007747739","https://openalex.org/W2049238156","https://openalex.org/W2104441528","https://openalex.org/W2134633067","https://openalex.org/W2159915142","https://openalex.org/W2161549313","https://openalex.org/W2292233307","https://openalex.org/W2295355651","https://openalex.org/W2397857137","https://openalex.org/W2398715209","https://openalex.org/W2417915283","https://openalex.org/W2469275430","https://openalex.org/W2578517905","https://openalex.org/W2591909022","https://openalex.org/W2592789682","https://openalex.org/W2606882085","https://openalex.org/W2768174108","https://openalex.org/W2889158727","https://openalex.org/W2970420884","https://openalex.org/W2990887689","https://openalex.org/W3028867652","https://openalex.org/W3035046450","https://openalex.org/W3036957684","https://openalex.org/W3095317724","https://openalex.org/W3102705931","https://openalex.org/W3105467701","https://openalex.org/W3143088208","https://openalex.org/W3203186974","https://openalex.org/W4239813889","https://openalex.org/W6603071331","https://openalex.org/W6712714140","https://openalex.org/W6745940941","https://openalex.org/W6753647347"],"related_works":["https://openalex.org/W3034924094","https://openalex.org/W3094954546","https://openalex.org/W1488708774","https://openalex.org/W1982811510","https://openalex.org/W4391100477","https://openalex.org/W2402189625","https://openalex.org/W4327779705","https://openalex.org/W4310560702","https://openalex.org/W1513698804","https://openalex.org/W2029712093"],"abstract_inverted_index":{"Novel":[0],"sensor":[1,38,143],"processing":[2,11,39,73,144],"algorithms":[3,40,91],"face":[4],"many":[5],"hurdles":[6],"to":[7,45,80,107,113,116,133],"their":[8],"adoption.":[9],"Sensor":[10],"environments":[12],"have":[13],"become":[14],"increasingly":[15],"difficult":[16],"with":[17,52,110],"an":[18],"ever":[19],"increasing":[20],"array":[21],"of":[22,71,86,90,96,137,140],"threats.":[23],"These":[24],"threats":[25],"have,":[26],"in":[27,74],"turn,":[28],"raised":[29],"the":[30,75,100,135],"bar":[31],"on":[32],"deploying":[33],"new":[34,88,94,119],"capabilities.":[35],"Many":[36],"novel":[37],"exploit":[41],"or":[42],"induce":[43],"randomness":[44,51],"boost":[46],"algorithm":[47,63],"performance.":[48],"Co-designing":[49],"this":[50,87,118],"cryptographic":[53,111],"features":[54],"could":[55],"be":[56,108],"a":[57,124,138,141],"powerful":[58],"combination":[59],"providing":[60],"both":[61],"improved":[62],"performance":[64],"and":[65],"increased":[66],"resiliency.":[67],"The":[68,84],"emerging":[69],"field":[70],"signal":[72],"encrypted":[76],"domain":[77],"has":[78],"begun":[79],"explore":[81,117],"such":[82],"approaches.":[83],"development":[85],"class":[89],"will":[92,105],"require":[93],"classes":[95],"tools.":[97],"In":[98],"particular,":[99],"foundational":[101],"linear":[102],"algebraic":[103],"mathematics":[104],"need":[106],"enhanced":[109],"concepts":[112],"allow":[114],"researchers":[115],"domain.":[120],"This":[121],"work":[122],"highlights":[123],"relatively":[125],"low":[126],"overhead":[127],"method":[128],"that":[129],"uses":[130],"homomorphic":[131],"encryption":[132],"enhance":[134],"resiliency":[136],"part":[139],"larger":[142],"pipeline.":[145]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
