{"id":"https://openalex.org/W3173768166","doi":"https://doi.org/10.1109/jiot.2021.3092185","title":"Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT","display_name":"Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3173768166","doi":"https://doi.org/10.1109/jiot.2021.3092185","mag":"3173768166"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3092185","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3092185","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116748791","display_name":"Zhiying Zhang","orcid":"https://orcid.org/0000-0003-2939-7497"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiying Zhang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060659901","display_name":"Jinbo Xiong","orcid":"https://orcid.org/0000-0001-9985-1953"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinbo Xiong","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","[Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyberspace Security, Fujian Normal University, Fuzhou 350117, China. (e-mail: jbxiong@fjnu.edu.cn)]"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"[Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyberspace Security, Fujian Normal University, Fuzhou 350117, China. (e-mail: jbxiong@fjnu.edu.cn)]","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333466","display_name":"Lei Chen","orcid":"https://orcid.org/0000-0002-3919-8056"},"institutions":[{"id":"https://openalex.org/I39815113","display_name":"Georgia Southern University","ror":"https://ror.org/04agmb972","country_code":"US","type":"education","lineage":["https://openalex.org/I39815113"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lei Chen","raw_affiliation_strings":["College of Engineering and Computing, Georgia Southern University, Statesboro, GA, USA","College of Engineering and Computing, Georgia Southern University, GA 30458, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Computing, Georgia Southern University, Statesboro, GA, USA","institution_ids":["https://openalex.org/I39815113"]},{"raw_affiliation_string":"College of Engineering and Computing, Georgia Southern University, GA 30458, USA","institution_ids":["https://openalex.org/I39815113"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China","State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049380192","display_name":"Changgen Peng","orcid":"https://orcid.org/0000-0001-8733-4596"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changgen Peng","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China","institution_ids":["https://openalex.org/I178232147"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5052363813"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":null,"apc_paid":null,"fwci":3.9198,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.94530953,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"4","first_page":"2761","last_page":"2777"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7227219343185425},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6769678592681885},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6607393026351929},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5723586678504944},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5425617694854736},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5368415117263794},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5344336032867432},{"id":"https://openalex.org/keywords/clustering-coefficient","display_name":"Clustering coefficient","score":0.47718918323516846},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.45412957668304443},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29550901055336},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18387165665626526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10103580355644226}],"concepts":[{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7227219343185425},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6769678592681885},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6607393026351929},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5723586678504944},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5425617694854736},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5368415117263794},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5344336032867432},{"id":"https://openalex.org/C22047676","wikidata":"https://www.wikidata.org/wiki/Q898680","display_name":"Clustering coefficient","level":3,"score":0.47718918323516846},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.45412957668304443},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29550901055336},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18387165665626526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10103580355644226},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3092185","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3092185","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1929902864","display_name":null,"funder_award_id":"61662009, 61772008, 61872088, U1836205, U1905211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W343200749","https://openalex.org/W1995875735","https://openalex.org/W2033390315","https://openalex.org/W2043294026","https://openalex.org/W2049086013","https://openalex.org/W2060108852","https://openalex.org/W2104927807","https://openalex.org/W2105393591","https://openalex.org/W2152926062","https://openalex.org/W2183425689","https://openalex.org/W2189496535","https://openalex.org/W2338678442","https://openalex.org/W2403599181","https://openalex.org/W2405059231","https://openalex.org/W2555185438","https://openalex.org/W2592084954","https://openalex.org/W2758119192","https://openalex.org/W2769387542","https://openalex.org/W2780498616","https://openalex.org/W2782150645","https://openalex.org/W2782835010","https://openalex.org/W2791465584","https://openalex.org/W2806161436","https://openalex.org/W2810131106","https://openalex.org/W2885386724","https://openalex.org/W2886038574","https://openalex.org/W2904277101","https://openalex.org/W2921277688","https://openalex.org/W2945326446","https://openalex.org/W2960616428","https://openalex.org/W2982674075","https://openalex.org/W2989102622","https://openalex.org/W2992059036","https://openalex.org/W2998340298","https://openalex.org/W2998977406","https://openalex.org/W3005345245","https://openalex.org/W3011254809","https://openalex.org/W3011417748","https://openalex.org/W3042568053","https://openalex.org/W3043744241","https://openalex.org/W3083829175","https://openalex.org/W3093114702","https://openalex.org/W3111635317","https://openalex.org/W3114968134","https://openalex.org/W6767159907"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W1667647204"],"abstract_inverted_index":{"Decoding":[0],"the":[1,5,28,60,82,85,113,130,134,150,171,174,180,193],"real":[2],"structure":[3,14,53,80,88],"from":[4,25],"Social":[6],"Internet-of-Things":[7],"(SIoT)":[8],"network":[9,142],"with":[10,59],"a":[11,16,37,46,78,97,104],"large-scale":[12],"noise":[13],"plays":[15],"fundamental":[17],"role":[18],"in":[19,27,68,81,185],"data":[20,57],"mining.":[21],"Protecting":[22],"private":[23,66,183],"information":[24,62,67,100,122,140,184],"leakage":[26],"mining":[29,34,58],"process":[30],"and":[31,103,112,141,152,161,189,202],"obtaining":[32],"accurate":[33],"results":[35,176,195],"is":[36,70,89,125],"significant":[38],"challenge.":[39],"To":[40],"tackle":[41],"this":[42,166,197],"issue,":[43],"we":[44],"present":[45],"graph":[47,79,87],"clustering":[48,156,175,194],"privacy-preserving":[49],"method":[50],"based":[51],"on":[52],"entropy,":[54],"which":[55],"combines":[56],"structural":[61,99,121,139],"theory.":[63],"Specially,":[64],"user":[65],"SIoT":[69],"encrypted":[71],"by":[72,95],"Brakerski\u2013Gentry\u2013Vaikuntanathan":[73],"(BGV)":[74],"homomorphism":[75],"to":[76,127,148],"generate":[77],"ciphertext":[83,86],"state,":[84],"then":[90],"divided":[91],"into":[92],"different":[93],"modules":[94],"applying":[96],"2-D":[98],"solution":[101,123],"algorithm":[102,124],"entropy":[105],"reduction":[106],"principle":[107],"node":[108,143],"module":[109],"partition":[110,135,144],"algorithm,":[111],"<inline-formula":[114],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[116],"<tex-math":[117],"notation=\"LaTeX\">$K$":[118],"</tex-math></inline-formula>":[119],"-dimensional":[120],"utilized":[126],"further":[128],"cluster":[129],"internal":[131],"nodes":[132],"of":[133,155,173,182,196],"module.":[136],"Moreover,":[137],"normalized":[138],"similarity":[145,153],"are":[146],"introduced":[147],"analyze":[149],"correctness":[151,172],"degree":[154],"results.":[157],"Finally,":[158],"security":[159,181],"analysis":[160,163,190],"theoretical":[162],"indicate":[164],"that":[165,192],"scheme":[167,198],"not":[168],"only":[169],"guarantees":[170],"but":[177],"also":[178],"improves":[179],"SIoT.":[186],"Experimental":[187],"evaluation":[188],"shows":[191],"have":[199],"higher":[200],"efficiency":[201],"reliability.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
