{"id":"https://openalex.org/W7117141991","doi":"https://doi.org/10.1109/jiot.2025.3648058","title":"MPPL: Mean-Based Privacy-Preserving Localization With Linear Complexity for High-Precision Crowdsourcing Systems","display_name":"MPPL: Mean-Based Privacy-Preserving Localization With Linear Complexity for High-Precision Crowdsourcing Systems","publication_year":2025,"publication_date":"2025-12-24","ids":{"openalex":"https://openalex.org/W7117141991","doi":"https://doi.org/10.1109/jiot.2025.3648058"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3648058","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3648058","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053629992","display_name":"Shengming Chang","orcid":"https://orcid.org/0000-0001-5446-5426"},"institutions":[{"id":"https://openalex.org/I159389169","display_name":"Ningbo University of Technology","ror":"https://ror.org/037dym702","country_code":"CN","type":"education","lineage":["https://openalex.org/I159389169"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shengming Chang","raw_affiliation_strings":["School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China"],"raw_orcid":"https://orcid.org/0000-0001-5446-5426","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China","institution_ids":["https://openalex.org/I159389169"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009391044","display_name":"L. LI","orcid":null},"institutions":[{"id":"https://openalex.org/I159389169","display_name":"Ningbo University of Technology","ror":"https://ror.org/037dym702","country_code":"CN","type":"education","lineage":["https://openalex.org/I159389169"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lincan Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China"],"raw_orcid":"https://orcid.org/0000-0002-3774-8878","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China","institution_ids":["https://openalex.org/I159389169"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121124642","display_name":"Dongdong Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I159389169","display_name":"Ningbo University of Technology","ror":"https://ror.org/037dym702","country_code":"CN","type":"education","lineage":["https://openalex.org/I159389169"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdong Lv","raw_affiliation_strings":["School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China"],"raw_orcid":"https://orcid.org/0000-0002-2737-7356","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China","institution_ids":["https://openalex.org/I159389169"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028230869","display_name":"He Xu","orcid":"https://orcid.org/0000-0001-5819-1899"},"institutions":[{"id":"https://openalex.org/I159389169","display_name":"Ningbo University of Technology","ror":"https://ror.org/037dym702","country_code":"CN","type":"education","lineage":["https://openalex.org/I159389169"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"He Xu","raw_affiliation_strings":["School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China"],"raw_orcid":"https://orcid.org/0000-0001-5819-1899","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Ningbo University of Technology, Ningbo, China","institution_ids":["https://openalex.org/I159389169"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053629992"],"corresponding_institution_ids":["https://openalex.org/I159389169"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79932159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"6","first_page":"11412","last_page":"11424"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.414000004529953,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.414000004529953,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.15399999916553497,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.1467999964952469,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7986999750137329},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6473000049591064},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5473999977111816},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5152999758720398},{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.507099986076355},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44999998807907104},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.43970000743865967},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41990000009536743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.832099974155426},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7986999750137329},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6473000049591064},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5473999977111816},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5152999758720398},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.507099986076355},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4636000096797943},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44999998807907104},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.43970000743865967},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41990000009536743},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4092000126838684},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37439998984336853},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3594000041484833},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.31690001487731934},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.30550000071525574},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.29750001430511475},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.28119999170303345},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2741999924182892},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2703999876976013},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2563000023365021}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3648058","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3648058","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.40877294540405273,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5424817310","display_name":null,"funder_award_id":"Y202454865","funder_id":"https://openalex.org/F4320335467","funder_display_name":"Natural Science Foundation of Shaanxi Provincial Department of Education"},{"id":"https://openalex.org/G7987086839","display_name":null,"funder_award_id":"2024J131","funder_id":"https://openalex.org/F4320317779","funder_display_name":"Zhejiang\u00a0Provincial\u00a0Postdoctoral\u00a0Science\u00a0Foundation"}],"funders":[{"id":"https://openalex.org/F4320317779","display_name":"Zhejiang\u00a0Provincial\u00a0Postdoctoral\u00a0Science\u00a0Foundation","ror":null},{"id":"https://openalex.org/F4320335467","display_name":"Natural Science Foundation of Shaanxi Provincial Department of Education","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1524288918","https://openalex.org/W1909655815","https://openalex.org/W1989651117","https://openalex.org/W2075551143","https://openalex.org/W2768073288","https://openalex.org/W2895804062","https://openalex.org/W2900934586","https://openalex.org/W3015850885","https://openalex.org/W3046167303","https://openalex.org/W3201016170","https://openalex.org/W4226090341","https://openalex.org/W4226278484","https://openalex.org/W4318774803","https://openalex.org/W4383102254","https://openalex.org/W4385154257","https://openalex.org/W4387247656","https://openalex.org/W4389890871","https://openalex.org/W4391235415","https://openalex.org/W4391406978","https://openalex.org/W4399425993","https://openalex.org/W4400771594","https://openalex.org/W4401691625","https://openalex.org/W4404370895","https://openalex.org/W4405056251","https://openalex.org/W4407212553","https://openalex.org/W4408861047","https://openalex.org/W4409095726","https://openalex.org/W4411090675"],"related_works":[],"abstract_inverted_index":{"Accurate":[0],"localization":[1,55,83,125,128],"is":[2],"fundamental":[3],"for":[4,90,149],"internet":[5],"of":[6,139],"things":[7],"(IoT)":[8],"applications":[9],"but":[10],"introduces":[11],"significant":[12],"privacy":[13,92],"risks":[14],"in":[15],"crowdsourcing-based":[16],"systems.":[17],"Conventional":[18],"privacy-preserving":[19,82,123,127],"techniques":[20],"suffer":[21],"from":[22],"critical":[23],"limitations:":[24],"subtraction-based":[25],"models":[26],"sacrifice":[27],"positioning":[28],"accuracy":[29,121],"by":[30,136],"discarding":[31],"measurement":[32,61],"equations;":[33],"cryptographic":[34],"solutions":[35],"incur":[36],"prohibitive":[37],"computation":[38,134],"overhead;":[39],"while":[40,69,132],"secret-sharing":[41],"approaches":[42],"expose":[43],"target":[44],"locations.":[45],"To":[46],"address":[47],"these":[48],"challenges,":[49],"we":[50,78],"propose":[51],"the":[52,80],"mean-based":[53,81],"subtraction":[54],"(MSL)":[56],"model":[57],"that":[58],"preserves":[59],"all":[60],"equations":[62],"through":[63],"global":[64],"averaging,":[65],"eliminating":[66],"information":[67],"loss":[68],"establishing":[70,145],"a":[71,137,146],"privacy-conducive":[72],"mathematical":[73],"framework.":[74],"Building":[75],"on":[76],"MSL,":[77],"develop":[79],"(MPPL)":[84],"algorithm":[85],"featuring:":[86],"1)":[87],"matrix":[88],"decomposition":[89],"bidirectional":[91],"isolation,":[93],"2)":[94],"lightweight":[95],"secure":[96],"summation/multiplication":[97],"primitives,":[98],"and":[99,112],"3)":[100],"linear-complexity":[101],"operations.":[102],"Rigorous":[103],"theoretical":[104],"verification":[105],"confirms":[106],"MPPL\u2019s":[107],"feasibility,":[108],"correctness,":[109],"information-theoretic":[110],"privacy,":[111],"efficiency.":[113],"Experimental":[114],"results":[115],"demonstrate":[116],"10%":[117],"\u2013":[118],"14%":[119],"higher":[120],"than":[122],"multi-lateral":[124],"(PPPL)/efficient":[126],"(EPPL)":[129],"under":[130],"noise":[131],"reducing":[133],"time":[135],"factor":[138],"2.8":[140],"versus":[141],"homomorphic":[142],"encryption":[143],"schemes,":[144],"new":[147],"paradigm":[148],"high-precision":[150],"privacy-aware":[151],"localization.":[152]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-12-24T00:00:00"}
