{"id":"https://openalex.org/W4416707403","doi":"https://doi.org/10.1109/jiot.2025.3637759","title":"Enhancing Internet Privacy in Multiagent Systems: A Novel Randomized Mask Algorithm on Prescribed-Time Fault-Tolerant Consensus Control","display_name":"Enhancing Internet Privacy in Multiagent Systems: A Novel Randomized Mask Algorithm on Prescribed-Time Fault-Tolerant Consensus Control","publication_year":2025,"publication_date":"2025-11-26","ids":{"openalex":"https://openalex.org/W4416707403","doi":"https://doi.org/10.1109/jiot.2025.3637759"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3637759","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3637759","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042169363","display_name":"Junhao Yuan","orcid":"https://orcid.org/0009-0000-3930-8190"},"institutions":[{"id":"https://openalex.org/I196934937","display_name":"Liaocheng University","ror":"https://ror.org/03yh0n709","country_code":"CN","type":"education","lineage":["https://openalex.org/I196934937"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junhao Yuan","raw_affiliation_strings":["School of Mathematics Science, Liaocheng University, Liaocheng, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics Science, Liaocheng University, Liaocheng, China","institution_ids":["https://openalex.org/I196934937"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003568409","display_name":"Wei Sun","orcid":"https://orcid.org/0000-0002-6873-3302"},"institutions":[{"id":"https://openalex.org/I196934937","display_name":"Liaocheng University","ror":"https://ror.org/03yh0n709","country_code":"CN","type":"education","lineage":["https://openalex.org/I196934937"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Sun","raw_affiliation_strings":["School of Mathematics Science, Liaocheng University, Liaocheng, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics Science, Liaocheng University, Liaocheng, China","institution_ids":["https://openalex.org/I196934937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035915560","display_name":"Shun\u2010Feng Su","orcid":"https://orcid.org/0000-0001-9777-128X"},"institutions":[{"id":"https://openalex.org/I154864474","display_name":"National Taiwan University of Science and Technology","ror":"https://ror.org/00q09pe49","country_code":"TW","type":"education","lineage":["https://openalex.org/I154864474"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shun-Feng Su","raw_affiliation_strings":["Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","Department of Electical Engineering, National Taiwan University of Science and Technology, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan","institution_ids":["https://openalex.org/I154864474"]},{"raw_affiliation_string":"Department of Electical Engineering, National Taiwan University of Science and Technology, Taiwan","institution_ids":["https://openalex.org/I154864474"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042169363"],"corresponding_institution_ids":["https://openalex.org/I196934937"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44352796,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"6745","last_page":"6754"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.4207000136375427,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.4207000136375427,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.22050000727176666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.1363999992609024,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6245999932289124},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47110000252723694},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4498000144958496},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.44279998540878296},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.43140000104904175},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4090000092983246},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.38929998874664307},{"id":"https://openalex.org/keywords/piecewise","display_name":"Piecewise","score":0.36239999532699585},{"id":"https://openalex.org/keywords/algorithm-design","display_name":"Algorithm design","score":0.36010000109672546}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.859499990940094},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6245999932289124},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47110000252723694},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4498000144958496},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.44279998540878296},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.43140000104904175},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4090000092983246},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40529999136924744},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4009000062942505},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.38929998874664307},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.384799987077713},{"id":"https://openalex.org/C164660894","wikidata":"https://www.wikidata.org/wiki/Q2037833","display_name":"Piecewise","level":2,"score":0.36239999532699585},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.36010000109672546},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.36000001430511475},{"id":"https://openalex.org/C128669082","wikidata":"https://www.wikidata.org/wiki/Q583461","display_name":"Randomized algorithm","level":2,"score":0.33809998631477356},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33719998598098755},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3361000120639801},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.33070001006126404},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3050999939441681},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.29760000109672546},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.27790001034736633},{"id":"https://openalex.org/C2776441110","wikidata":"https://www.wikidata.org/wiki/Q1436628","display_name":"Randomized response","level":3,"score":0.272599995136261},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C37404715","wikidata":"https://www.wikidata.org/wiki/Q380679","display_name":"Dynamic programming","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3637759","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3637759","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2664960209","display_name":null,"funder_award_id":"No. tsqn202507211","funder_id":"https://openalex.org/F4320326185","funder_display_name":"Taishan Scholar Foundation of Shandong Province"},{"id":"https://openalex.org/G3731280552","display_name":null,"funder_award_id":"62473185","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5096672637","display_name":null,"funder_award_id":"tsqn202507211","funder_id":"https://openalex.org/F4320326185","funder_display_name":"Taishan Scholar Foundation of Shandong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326185","display_name":"Taishan Scholar Foundation of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2142430251","https://openalex.org/W2766364555","https://openalex.org/W2911978475","https://openalex.org/W2942154814","https://openalex.org/W3005206852","https://openalex.org/W3092133968","https://openalex.org/W3156502157","https://openalex.org/W3196091484","https://openalex.org/W4200341220","https://openalex.org/W4205468087","https://openalex.org/W4205647158","https://openalex.org/W4226136925","https://openalex.org/W4383899701","https://openalex.org/W4385284905","https://openalex.org/W4385299206","https://openalex.org/W4385731837","https://openalex.org/W4386824832","https://openalex.org/W4389170019","https://openalex.org/W4392904724","https://openalex.org/W4393032066","https://openalex.org/W4394698944","https://openalex.org/W4396680630","https://openalex.org/W4396878010","https://openalex.org/W4397030467","https://openalex.org/W4399039179","https://openalex.org/W4399146420","https://openalex.org/W4399257839","https://openalex.org/W4399989878","https://openalex.org/W4400726519","https://openalex.org/W4400914164","https://openalex.org/W4401476732","https://openalex.org/W4402816742","https://openalex.org/W4402916199","https://openalex.org/W4409057791","https://openalex.org/W4409154346"],"related_works":[],"abstract_inverted_index":{"Real-time":[0],"multi-agent":[1,28],"internet":[2],"data":[3,76],"transmission":[4],"enhances":[5,70],"the":[6,47,71,82,91,114,121,129,135,139,144,147,154],"service":[7],"capabilities":[8],"of":[9,17,49,73,85,102,131,146],"diverse":[10],"applications,":[11],"however,":[12],"it":[13,152],"poses":[14],"a":[15,26,31,36,50],"risk":[16],"sensitive":[18,65],"location":[19],"information":[20],"being":[21],"compromised.":[22],"This":[23,68],"study":[24],"proposes":[25],"privacy-enhanced":[27],"framework":[29],"integrating":[30],"randomized":[32],"masking":[33,54],"algorithm":[34,140],"with":[35,153],"prescribed-time":[37],"fault-tolerant":[38],"(PTFT)":[39],"consensus":[40,119],"control":[41,109],"strategy.":[42],"The":[43,94],"core":[44],"contribution":[45],"is":[46],"design":[48,98],"jointly":[51],"generated":[52],"dynamic":[53],"mechanism,":[55],"which":[56],"uses":[57],"random":[58],"numbers":[59],"from":[60],"both":[61],"parties":[62],"to":[63],"obfuscate":[64],"state":[66],"data.":[67],"approach":[69],"security":[72],"transmitted":[74],"network":[75],"through":[77],"increased":[78],"randomness":[79],"while":[80],"eliminating":[81],"non-zero":[83],"constraint":[84],"traditional":[86,155],"privacy":[87,111,156],"protection":[88,157],"methods":[89],"at":[90],"initial":[92],"time.":[93],"piecewise":[95],"mask":[96],"function":[97],"ensures":[99,128],"immediate":[100],"recovery":[101],"genuine":[103],"states":[104],"post-initial":[105],"masking,":[106],"achieving":[107],"precision":[108],"without":[110],"compromise.":[112],"Additionally,":[113],"PTFT":[115],"controller":[116],"enables":[117],"semi-global":[118],"within":[120],"prescribed":[122],"time":[123],"despite":[124],"actuator":[125],"faults,":[126],"and":[127,150],"boundedness":[130],"all":[132],"signals":[133],"in":[134],"closed-loop":[136],"systems.":[137],"Finally,":[138],"simulation":[141],"experiment":[142],"verifies":[143],"effectiveness":[145],"proposed":[148],"scheme":[149],"compares":[151],"method.":[158]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-27T00:00:00"}
