{"id":"https://openalex.org/W3009474153","doi":"https://doi.org/10.1109/icassp40776.2020.9053348","title":"Convex Optimisation-Based Privacy-Preserving Distributed Average Consensus in Wireless Sensor Networks","display_name":"Convex Optimisation-Based Privacy-Preserving Distributed Average Consensus in Wireless Sensor Networks","publication_year":2020,"publication_date":"2020-04-09","ids":{"openalex":"https://openalex.org/W3009474153","doi":"https://doi.org/10.1109/icassp40776.2020.9053348","mag":"3009474153"},"language":"en","primary_location":{"id":"doi:10.1109/icassp40776.2020.9053348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://vbn.aau.dk/ws/files/328844964/li.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062097625","display_name":"Qiongxiu Li","orcid":"https://orcid.org/0000-0002-2487-5149"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Qiongxiu Li","raw_affiliation_strings":["Audio Analysis Lab, CREATE, Aalborg University, Denmark"],"affiliations":[{"raw_affiliation_string":"Audio Analysis Lab, CREATE, Aalborg University, Denmark","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089150994","display_name":"Richard Heusdens","orcid":"https://orcid.org/0000-0001-5998-1550"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Richard Heusdens","raw_affiliation_strings":["Circuits and Systems group, Delft University of Technology, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Circuits and Systems group, Delft University of Technology, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026658144","display_name":"Mads Gr\u00e6sb\u00f8ll Christensen","orcid":"https://orcid.org/0000-0003-3586-7969"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Mads Grasboll Christensen","raw_affiliation_strings":["Audio Analysis Lab, CREATE, Aalborg University, Denmark"],"affiliations":[{"raw_affiliation_string":"Audio Analysis Lab, CREATE, Aalborg University, Denmark","institution_ids":["https://openalex.org/I891191580"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062097625"],"corresponding_institution_ids":["https://openalex.org/I891191580"],"apc_list":null,"apc_paid":null,"fwci":2.4275,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.89350691,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"5895","last_page":"5899"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8432695865631104},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7140901684761047},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.625251054763794},{"id":"https://openalex.org/keywords/orthogonal-complement","display_name":"Orthogonal complement","score":0.5989972949028015},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.5909532308578491},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5369773507118225},{"id":"https://openalex.org/keywords/complement","display_name":"Complement (music)","score":0.511669397354126},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.44184163212776184},{"id":"https://openalex.org/keywords/distributed-algorithm","display_name":"Distributed algorithm","score":0.4399207532405853},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.43661877512931824},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.4260811507701874},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.42393332719802856},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4193362891674042},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4108324646949768},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3671548366546631},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.357330322265625},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3421691656112671},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3236650228500366},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23190155625343323},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1640838086605072},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1069730818271637}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8432695865631104},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7140901684761047},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.625251054763794},{"id":"https://openalex.org/C154399039","wikidata":"https://www.wikidata.org/wiki/Q1780921","display_name":"Orthogonal complement","level":3,"score":0.5989972949028015},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.5909532308578491},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5369773507118225},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.511669397354126},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.44184163212776184},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.4399207532405853},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.43661877512931824},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.4260811507701874},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.42393332719802856},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4193362891674042},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4108324646949768},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3671548366546631},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.357330322265625},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3421691656112671},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3236650228500366},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23190155625343323},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1640838086605072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1069730818271637},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C127716648","wikidata":"https://www.wikidata.org/wiki/Q104053","display_name":"Phenotype","level":3,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C188082640","wikidata":"https://www.wikidata.org/wiki/Q1780899","display_name":"Complementation","level":4,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icassp40776.2020.9053348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire/13eb295f-dd7d-4601-b3cd-7e17193198d7","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/13eb295f-dd7d-4601-b3cd-7e17193198d7","pdf_url":"https://vbn.aau.dk/ws/files/328844964/li.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Li, Q, Heusdens, R & Christensen, M G 2020, Convex optimisation-based privacy-preserving distributed average consensus in wireless sensor networks. in 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings., 9053348, IEEE (Institute of Electrical and Electronics Engineers), I E E E International Conference on Acoustics, Speech and Signal Processing. Proceedings, pp. 5895-5899, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 04/05/2020. https://doi.org/10.1109/ICASSP40776.2020.9053348","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tud:oai:tudelft.nl:uuid:4c2757e0-f73e-49ff-93c0-b4d955f6eafc","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:4c2757e0-f73e-49ff-93c0-b4d955f6eafc","pdf_url":"http://resolver.tudelft.nl/uuid:4c2757e0-f73e-49ff-93c0-b4d955f6eafc","source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP): Proceedings","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/13eb295f-dd7d-4601-b3cd-7e17193198d7","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/13eb295f-dd7d-4601-b3cd-7e17193198d7","pdf_url":"https://vbn.aau.dk/ws/files/328844964/li.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Li, Q, Heusdens, R & Christensen, M G 2020, Convex optimisation-based privacy-preserving distributed average consensus in wireless sensor networks. in 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2020 - Proceedings., 9053348, IEEE (Institute of Electrical and Electronics Engineers), I E E E International Conference on Acoustics, Speech and Signal Processing. Proceedings, pp. 5895-5899, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 04/05/2020. https://doi.org/10.1109/ICASSP40776.2020.9053348","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3009474153.pdf","grobid_xml":"https://content.openalex.org/works/W3009474153.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1533710990","https://openalex.org/W1538118056","https://openalex.org/W1556911442","https://openalex.org/W1559266478","https://openalex.org/W1873763122","https://openalex.org/W1968343105","https://openalex.org/W1979170109","https://openalex.org/W1998345701","https://openalex.org/W2021812446","https://openalex.org/W2033679620","https://openalex.org/W2060036647","https://openalex.org/W2074796812","https://openalex.org/W2088492763","https://openalex.org/W2092148937","https://openalex.org/W2092422002","https://openalex.org/W2096241946","https://openalex.org/W2115861062","https://openalex.org/W2117905067","https://openalex.org/W2120286056","https://openalex.org/W2129056129","https://openalex.org/W2132172731","https://openalex.org/W2156094048","https://openalex.org/W2160643434","https://openalex.org/W2164278908","https://openalex.org/W2397857137","https://openalex.org/W2402235285","https://openalex.org/W2475179139","https://openalex.org/W2590701476","https://openalex.org/W2605226589","https://openalex.org/W2616297073","https://openalex.org/W2648446509","https://openalex.org/W2810524107","https://openalex.org/W2911978475","https://openalex.org/W2962703255","https://openalex.org/W2963112534","https://openalex.org/W2963395927","https://openalex.org/W2964208174","https://openalex.org/W2985556605","https://openalex.org/W3104550706","https://openalex.org/W3141585064","https://openalex.org/W4212863985","https://openalex.org/W4292363360","https://openalex.org/W6631914257","https://openalex.org/W6677349239","https://openalex.org/W6683068184","https://openalex.org/W6712776926","https://openalex.org/W6739072481","https://openalex.org/W6739865746"],"related_works":["https://openalex.org/W2368710903","https://openalex.org/W4386360526","https://openalex.org/W2772112465","https://openalex.org/W4387918499","https://openalex.org/W2158905603","https://openalex.org/W2766105476","https://openalex.org/W112420819","https://openalex.org/W2918039754","https://openalex.org/W2889153935","https://openalex.org/W2982666975"],"abstract_inverted_index":{"In":[0,30],"many":[1],"applications":[2],"of":[3,13,16,43,57,68,128],"wireless":[4],"sensor":[5],"networks,":[6],"it":[7],"is":[8,51,110,141],"important":[9],"that":[10,63,138],"the":[11,14,17,41,54,64,69,80,88,97,107,123,129,139,144],"privacy":[12],"nodes":[15],"network":[18],"be":[19,113],"protected.":[20],"Therefore,":[21],"privacy-preserving":[22,44],"algorithms":[23],"have":[24],"received":[25],"quite":[26],"some":[27],"attention":[28],"recently.":[29],"this":[31],"paper,":[32],"we":[33,61],"propose":[34],"a":[35,75],"novel":[36],"convex":[37],"optimization-based":[38],"solution":[39],"to":[40,95,103,112,143],"problem":[42],"distributed":[45],"average":[46],"consensus.":[47],"The":[48],"proposed":[49,108,130],"method":[50,56,140],"based":[52],"on":[53],"primal-dual":[55],"multipliers":[58],"(PDMM),":[59],"and":[60,83,118,126],"show":[62,137],"introduced":[65],"dual":[66],"variables":[67],"PDMM":[70],"will":[71,84],"only":[72],"converge":[73,86],"in":[74,87],"certain":[76],"subspace":[77],"determined":[78],"by":[79,134],"graph":[81],"topology":[82],"not":[85],"orthogonal":[89],"complement.":[90],"These":[91],"properties":[92,125],"are":[93,132],"exploited":[94],"protect":[96],"private":[98],"data":[99],"from":[100],"being":[101],"revealed":[102],"others.":[104],"More":[105],"specifically,":[106],"algorithm":[109],"proven":[111],"secure":[114],"for":[115],"both":[116],"passive":[117],"eavesdropping":[119],"adversary":[120],"models.":[121],"Finally,":[122],"convergence":[124],"accuracy":[127],"approach":[131],"demonstrated":[133],"simulations":[135],"which":[136],"superior":[142],"state-of-the-art.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
