{"id":"https://openalex.org/W2112884802","doi":"https://doi.org/10.1109/infcom.2011.5935177","title":"Reconciling privacy preservation and intrusion detection in sensory data aggregation","display_name":"Reconciling privacy preservation and intrusion detection in sensory data aggregation","publication_year":2011,"publication_date":"2011-04-01","ids":{"openalex":"https://openalex.org/W2112884802","doi":"https://doi.org/10.1109/infcom.2011.5935177","mag":"2112884802"},"language":"en","primary_location":{"id":"doi:10.1109/infcom.2011.5935177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2011.5935177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100434704","display_name":"Chuang Wang","orcid":"https://orcid.org/0000-0003-3372-2053"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chuang Wang","raw_affiliation_strings":["Department of Computer Science, Iowa State University, USA","Department of Computer Science, Iowa State University, USA;"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Iowa State University, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Department of Computer Science, Iowa State University, USA;","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100744283","display_name":"Guiling Wang","orcid":"https://orcid.org/0000-0003-1880-4763"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guiling Wang","raw_affiliation_strings":["Department of Computer Science, New Jersey Institute of Technology, USA","[Department of Computer Science, New Jersey Institute of Technology, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, New Jersey Institute of Technology, USA","institution_ids":["https://openalex.org/I118118575"]},{"raw_affiliation_string":"[Department of Computer Science, New Jersey Institute of Technology, USA]","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100414787","display_name":"Wensheng Zhang","orcid":"https://orcid.org/0000-0003-0752-941X"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wensheng Zhang","raw_affiliation_strings":["Department of Computer Science, Iowa State University, USA","Department of Computer Science, Iowa State University, USA;"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Iowa State University, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Department of Computer Science, Iowa State University, USA;","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049232116","display_name":"Taiming Feng","orcid":"https://orcid.org/0000-0002-5087-9565"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Taiming Feng","raw_affiliation_strings":["Department of Computer Science, Iowa State University, USA","Department of Computer Science, Iowa State University, USA;"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Iowa State University, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Department of Computer Science, Iowa State University, USA;","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100434704"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":2.4505,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.89631025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"336","last_page":"340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7823792695999146},{"id":"https://openalex.org/keywords/sensory-system","display_name":"Sensory system","score":0.7348144054412842},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6380022764205933},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.635890007019043},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.6332319974899292},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6248908042907715},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.6198610067367554},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6115462183952332},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5129455924034119},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4501282870769501},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4325326681137085},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4237644672393799},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3547818660736084},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2684534788131714},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09865826368331909},{"id":"https://openalex.org/keywords/neuroscience","display_name":"Neuroscience","score":0.09115332365036011}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7823792695999146},{"id":"https://openalex.org/C94487597","wikidata":"https://www.wikidata.org/wiki/Q11101","display_name":"Sensory system","level":2,"score":0.7348144054412842},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6380022764205933},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.635890007019043},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.6332319974899292},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6248908042907715},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.6198610067367554},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6115462183952332},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5129455924034119},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4501282870769501},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4325326681137085},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4237644672393799},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3547818660736084},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2684534788131714},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09865826368331909},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.09115332365036011},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infcom.2011.5935177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2011.5935177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.4000000059604645}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1969009281","https://openalex.org/W2102832611","https://openalex.org/W2104208424","https://openalex.org/W2110889959","https://openalex.org/W2136886475","https://openalex.org/W2143514931","https://openalex.org/W2150149458","https://openalex.org/W2153723497","https://openalex.org/W2154625773","https://openalex.org/W2167396179","https://openalex.org/W6680211020"],"related_works":["https://openalex.org/W2793666424","https://openalex.org/W1521063997","https://openalex.org/W2906422846","https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2558765606","https://openalex.org/W2390009783","https://openalex.org/W2133389611","https://openalex.org/W2347185124"],"abstract_inverted_index":{"When":[0],"wireless":[1],"sensors":[2,21,50],"are":[3],"deployed":[4],"to":[5,36,51,117],"monitor":[6],"the":[7,14,38,41,80,106,125,146,160],"working":[8],"or":[9,53],"life":[10],"conditions":[11],"of":[12,25,30,82,92,109,128,140],"people,":[13],"data":[15,32,42,55,84,116,133],"collected":[16],"and":[17,63,112,130],"processed":[18],"by":[19,48],"these":[20],"may":[22,45],"reveal":[23],"privacy":[24,61],"people.":[26],"The":[27,121],"actual":[28,107,126],"content":[29,108,127],"sensory":[31,83,110,115,132],"should":[33],"be":[34,46,118,135,144],"concealed":[35],"preserve":[37],"privacy,":[39],"but":[40],"concealment":[43],"feature":[44],"abused":[47],"compromised":[49],"modify":[52],"ill-process":[54],"without":[56,104],"being":[57,153],"caught.":[58],"Hence,":[59],"reconciling":[60],"preservation":[62],"intrusion":[64],"detection,":[65],"which":[66],"apparently":[67],"conflict":[68],"with":[69],"each":[70],"other,":[71],"is":[72,97],"important.":[73],"This":[74],"paper":[75],"studies":[76],"this":[77],"problem":[78],"in":[79],"context":[81],"aggregation,":[85],"a":[86],"fundamental":[87],"primitive":[88],"for":[89],"efficient":[90],"operation":[91],"sensor":[93],"networks.":[94],"A":[95],"scheme":[96],"proposed":[98],"that":[99,149],"can":[100,134,143,150],"detect":[101],"ill-performed":[102,141,147],"aggregation":[103,162],"knowing":[105],"data,":[111],"therefore":[113],"allow":[114],"kept":[119],"concealed.":[120,137],"results":[122],"show":[123],"that,":[124],"raw":[129],"aggregated":[131],"well":[136],"Meanwhile,":[138],"most":[139],"aggregations":[142,148],"detected;":[145],"escape":[151],"from":[152],"detected":[154],"have":[155],"only":[156],"negligible":[157],"impact":[158],"on":[159],"final":[161],"results.":[163]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
