{"id":"https://openalex.org/W4310902914","doi":"https://doi.org/10.1109/itw54588.2022.9965903","title":"Functional Privacy for Distributed Function Computation","display_name":"Functional Privacy for Distributed Function Computation","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4310902914","doi":"https://doi.org/10.1109/itw54588.2022.9965903"},"language":"en","primary_location":{"id":"doi:10.1109/itw54588.2022.9965903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965903","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100648619","display_name":"Jian Lu","orcid":"https://orcid.org/0000-0003-3176-5607"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Lu","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China,210096"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China,210096","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014227402","display_name":"Yinfei Xu","orcid":"https://orcid.org/0000-0003-3191-6903"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinfei Xu","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China,210096"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China,210096","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025609529","display_name":"Shuo Shao","orcid":"https://orcid.org/0000-0003-2872-795X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuo Shao","raw_affiliation_strings":["Shanghai Jiao Tong Univeristy,School of Cyber Security,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong Univeristy,School of Cyber Security,Shanghai,China,200240","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100648619"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.3222,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44460455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fusion-center","display_name":"Fusion center","score":0.8273340463638306},{"id":"https://openalex.org/keywords/distributed-source-coding","display_name":"Distributed source coding","score":0.6931768655776978},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6689552068710327},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5977239012718201},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5740629434585571},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5546786785125732},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5470219850540161},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5276578664779663},{"id":"https://openalex.org/keywords/rate-distortion","display_name":"Rate distortion","score":0.49753811955451965},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.48374176025390625},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.44864919781684875},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44503557682037354},{"id":"https://openalex.org/keywords/source-model","display_name":"Source model","score":0.41971346735954285},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.417390912771225},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3437327444553375},{"id":"https://openalex.org/keywords/channel-code","display_name":"Channel code","score":0.2977293133735657},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.284002423286438},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.24197641015052795},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18723192811012268},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16674506664276123},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.11035728454589844}],"concepts":[{"id":"https://openalex.org/C2781234732","wikidata":"https://www.wikidata.org/wiki/Q943505","display_name":"Fusion center","level":4,"score":0.8273340463638306},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.6931768655776978},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6689552068710327},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5977239012718201},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5740629434585571},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5546786785125732},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5470219850540161},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5276578664779663},{"id":"https://openalex.org/C2982755384","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate distortion","level":3,"score":0.49753811955451965},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.48374176025390625},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.44864919781684875},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44503557682037354},{"id":"https://openalex.org/C2985998994","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Source model","level":2,"score":0.41971346735954285},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.417390912771225},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3437327444553375},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.2977293133735657},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.284002423286438},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.24197641015052795},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18723192811012268},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16674506664276123},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.11035728454589844},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw54588.2022.9965903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965903","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6100000143051147}],"awards":[],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W364494856","https://openalex.org/W1995189342","https://openalex.org/W2005007104","https://openalex.org/W2021380203","https://openalex.org/W2027340571","https://openalex.org/W2030835833","https://openalex.org/W2057124070","https://openalex.org/W2077145963","https://openalex.org/W2119046642","https://openalex.org/W2119985618","https://openalex.org/W2128879636","https://openalex.org/W2129119419","https://openalex.org/W2152625085","https://openalex.org/W2160957142","https://openalex.org/W2164651000","https://openalex.org/W2166106997","https://openalex.org/W2167097111","https://openalex.org/W2168452204","https://openalex.org/W2199707703","https://openalex.org/W2309021504","https://openalex.org/W2791184774","https://openalex.org/W2953001817","https://openalex.org/W2962789451","https://openalex.org/W2963457301","https://openalex.org/W2963671072","https://openalex.org/W3080533967","https://openalex.org/W3102586542","https://openalex.org/W3104710021","https://openalex.org/W3198431872","https://openalex.org/W4300840296"],"related_works":["https://openalex.org/W4310902914","https://openalex.org/W4289655339","https://openalex.org/W2950710421","https://openalex.org/W2561356615","https://openalex.org/W4221149586","https://openalex.org/W1498708488","https://openalex.org/W4380635184","https://openalex.org/W2153621579","https://openalex.org/W4294204955","https://openalex.org/W2061052796"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,47,58,65,70,96,108,120,124,131,138,143,151,155],"secure":[4],"source":[5,152,162],"coding":[6],"for":[7,86,137],"distributed":[8,19],"function":[9,45,94,144],"computation":[10],"with":[11,55],"a":[12,37,44,82,92],"functional":[13,83],"privacy":[14,74,84],"constraint.":[15],"In":[16],"particular,":[17],"two":[18,26,48,97],"encoders,":[20],"named":[21,53],"Alice":[22,68],"and":[23,29,32,69,154],"Bob,":[24],"observe":[25],"correlated":[27],"sources":[28,98],"independently":[30],"compress":[31],"transmit":[33],"their":[34],"observations":[35],"to":[36,42,57,63,114,150,160],"fusion":[38,71,109,156],"center":[39,110,157],"who":[40,88],"wants":[41],"compute":[43],"of":[46,95,145],"sources.":[49,102,122],"A":[50],"passive":[51],"eavesdropper":[52],"Eve,":[54,87],"access":[56,159],"side":[59],"information,":[60],"is":[61,81,89,106,111,135,168],"able":[62],"listen":[64],"link":[66],"between":[67],"center.":[72],"Two":[73],"constraints":[75],"are":[76],"considered.":[77],"The":[78,103],"first":[79],"one":[80],"constraint":[85],"interested":[90],"in":[91],"given":[93],"rather":[99],"than":[100],"original":[101,121],"second":[104],"requirement":[105],"that":[107],"not":[112],"allowed":[113],"learn":[115],"too":[116],"much":[117],"information":[118],"about":[119],"For":[123],"proposed":[125],"problem,":[126],"an":[127],"inner":[128,166],"bound":[129,167],"on":[130],"achievable":[132],"rate-distortion-leakage":[133],"region":[134],"characterized":[136],"discrete":[139],"memoryless":[140],"setting.":[141],"When":[142],"interest":[146],"at":[147],"Eve":[148],"degenerates":[149],"X":[153],"has":[158],"uncoded":[161],"Y":[163],",":[164],"our":[165],"tight.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
