{"id":"https://openalex.org/W4411055207","doi":"https://doi.org/10.1109/jiot.2025.3576770","title":"Enabling Privacy-Preserving and Verifiable AGI in Low-Altitude Economy Networks","display_name":"Enabling Privacy-Preserving and Verifiable AGI in Low-Altitude Economy Networks","publication_year":2025,"publication_date":"2025-06-05","ids":{"openalex":"https://openalex.org/W4411055207","doi":"https://doi.org/10.1109/jiot.2025.3576770"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3576770","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3576770","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068918837","display_name":"Min Jiang","orcid":"https://orcid.org/0000-0001-7703-9753"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingtao Jiang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060574788","display_name":"Chenfei Hu","orcid":"https://orcid.org/0000-0002-8285-9374"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenfei Hu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114198861","display_name":"Xuhao Ren","orcid":"https://orcid.org/0009-0001-7253-0276"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuhao Ren","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100380072","display_name":"Chuan Zhang","orcid":"https://orcid.org/0000-0001-7684-8540"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739675","display_name":"Hongchen Guo","orcid":"https://orcid.org/0000-0001-8843-6199"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongchen Guo","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5068918837"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1757775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"5719","last_page":"5732"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8082000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8082000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7462999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.7152000069618225,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7933582663536072},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7364696264266968},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4695865511894226},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3300383687019348},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.1198209822177887}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7933582663536072},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7364696264266968},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4695865511894226},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3300383687019348},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.1198209822177887},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3576770","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3576770","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2824501727","display_name":null,"funder_award_id":"62472032","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3114819178","display_name":null,"funder_award_id":"2023QNRC001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W199266244","https://openalex.org/W1021092761","https://openalex.org/W2141420453","https://openalex.org/W2146689848","https://openalex.org/W2489890856","https://openalex.org/W2765200655","https://openalex.org/W2794159901","https://openalex.org/W2886845474","https://openalex.org/W2985527074","https://openalex.org/W3003532255","https://openalex.org/W3023242777","https://openalex.org/W3033311948","https://openalex.org/W3096076085","https://openalex.org/W3097272009","https://openalex.org/W3131045898","https://openalex.org/W3135955057","https://openalex.org/W3210485385","https://openalex.org/W3213013974","https://openalex.org/W4288057805","https://openalex.org/W4296913776","https://openalex.org/W4312897482","https://openalex.org/W4313485531","https://openalex.org/W4317795032","https://openalex.org/W4385287226","https://openalex.org/W4387831792","https://openalex.org/W4388407457","https://openalex.org/W4390659130","https://openalex.org/W4390775273","https://openalex.org/W4393252682","https://openalex.org/W4398151147","https://openalex.org/W4398186364","https://openalex.org/W4402473949","https://openalex.org/W4402775306","https://openalex.org/W4410358938"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928"],"abstract_inverted_index":{"In":[0],"low-altitude":[1],"economy":[2],"(LAE)":[3],"networks,":[4],"Artificial":[5],"General":[6],"Intelligence":[7],"(AGI)":[8],"models":[9,29,63],"play":[10],"a":[11,92],"critical":[12],"role":[13],"in":[14,34,42,52,67,122,134],"tasks":[15],"such":[16],"as":[17,31],"path":[18],"planning,":[19],"object":[20],"recognition,":[21],"and":[22,44,58,69,81,94,111,130,147,173,178,184],"task":[23],"allocation.":[24],"Support":[25],"Vector":[26],"Machine":[27],"(SVM)":[28],"serve":[30],"fundamental":[32],"components":[33],"AGI":[35],"frameworks":[36],"due":[37],"to":[38,78,127,144,151,170],"their":[39],"robust":[40],"capabilities":[41],"classification":[43],"regression":[45],"tasks,":[46],"which":[47],"are":[48],"essential":[49],"for":[50],"decision-making":[51],"LAE":[53],"networks.":[54],"However,":[55],"distributed":[56],"deployment":[57],"real-time":[59],"inference":[60],"of":[61,74,83,106,155,162,186],"SVM":[62,96],"face":[64],"significant":[65],"challenges":[66],"security":[68,183],"privacy":[70],"protection,":[71],"including":[72],"leakage":[73],"model":[75,107,132],"parameters,":[76],"exposure":[77],"data":[79,109],"privacy,":[80,108,110],"reliability":[82],"prediction":[84,97,113,133],"results.":[85],"To":[86,115,157],"address":[87],"these":[88],"issues,":[89],"we":[90,118,138],"propose":[91],"privacy-preserving":[93,131],"verifiable":[95],"scheme":[98,166],"(pvSVM)":[99],"that":[100],"can":[101],"achieve":[102],"the":[103,135,153,160,182],"desirable":[104],"properties":[105],"private/public":[112],"verifiability.":[114],"be":[116],"specific,":[117],"employ":[119],"homomorphic":[120],"encryption":[121],"conjunction":[123],"with":[124],"secret":[125],"sharing":[126],"realize":[128],"efficient":[129],"edge.":[136],"Then,":[137],"design":[139],"two":[140],"secure":[141],"verification":[142,161,169],"strategies":[143],"allow":[145],"UAVs":[146],"any":[148],"third":[149],"party":[150],"check":[152],"correctness":[154],"predictions.":[156],"further":[158],"support":[159],"large-scale":[163],"predictions,":[164],"our":[165,187],"uses":[167],"batch":[168],"reduce":[171],"computational":[172],"communication":[174],"overheads.":[175],"Detailed":[176],"analysis":[177],"extensive":[179],"experiments":[180],"prove":[181],"efficiency":[185],"scheme.":[188]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
