{"id":"https://openalex.org/W7152745278","doi":"https://doi.org/10.1109/mci.2026.3655683","title":"Privacy-Preserving Evolutionary Multitasking Optimization: Models and Attacks [Research Frontier]","display_name":"Privacy-Preserving Evolutionary Multitasking Optimization: Models and Attacks [Research Frontier]","publication_year":2026,"publication_date":"2026-04-09","ids":{"openalex":"https://openalex.org/W7152745278","doi":"https://doi.org/10.1109/mci.2026.3655683"},"language":null,"primary_location":{"id":"doi:10.1109/mci.2026.3655683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mci.2026.3655683","pdf_url":null,"source":{"id":"https://openalex.org/S104797584","display_name":"IEEE Computational Intelligence Magazine","issn_l":"1556-603X","issn":["1556-603X","1556-6048"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computational Intelligence Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hao Li","orcid":"https://orcid.org/0000-0002-6294-6761"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Li","raw_affiliation_strings":["Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-6294-6761","affiliations":[{"raw_affiliation_string":"Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133313619","display_name":"Jingying Li","orcid":"https://orcid.org/0009-0008-5293-3095"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingying Li","raw_affiliation_strings":["Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0009-0008-5293-3095","affiliations":[{"raw_affiliation_string":"Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123899881","display_name":"Maoguo Gong","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Maoguo Gong","raw_affiliation_strings":["Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-0415-8556","affiliations":[{"raw_affiliation_string":"Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006614329","display_name":"A. K. Qin","orcid":"https://orcid.org/0000-0001-6631-1651"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"A. K. Qin","raw_affiliation_strings":["Swinburne University of Technology, Melbourne, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0001-6631-1651","affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yue Wu","orcid":"https://orcid.org/0000-0002-3459-5079"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Wu","raw_affiliation_strings":["Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-3459-5079","affiliations":[{"raw_affiliation_string":"Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5133291730","display_name":"Lining Xing","orcid":"https://orcid.org/0000-0002-6983-4244"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lining Xing","raw_affiliation_strings":["Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-6983-4244","affiliations":[{"raw_affiliation_string":"Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79209569,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"2","first_page":"68","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.14890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.14890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10100","display_name":"Metaheuristic Optimization Algorithms Research","score":0.10450000315904617,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12101","display_name":"Advanced Bandit Algorithms Research","score":0.08139999955892563,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/human-multitasking","display_name":"Human multitasking","score":0.8392000198364258},{"id":"https://openalex.org/keywords/evolutionary-computation","display_name":"Evolutionary computation","score":0.2662999927997589},{"id":"https://openalex.org/keywords/computer-multitasking","display_name":"Computer multitasking","score":0.24459999799728394},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.24310000240802765},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.22660000622272491}],"concepts":[{"id":"https://openalex.org/C107418235","wikidata":"https://www.wikidata.org/wiki/Q1520565","display_name":"Human multitasking","level":2,"score":0.8392000198364258},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7749000191688538},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43149998784065247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3352000117301941},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2922999858856201},{"id":"https://openalex.org/C105902424","wikidata":"https://www.wikidata.org/wiki/Q1197129","display_name":"Evolutionary computation","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C154556556","wikidata":"https://www.wikidata.org/wiki/Q192969","display_name":"Computer multitasking","level":2,"score":0.24459999799728394},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.24310000240802765},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.22660000622272491},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.2152000069618225}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mci.2026.3655683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mci.2026.3655683","pdf_url":null,"source":{"id":"https://openalex.org/S104797584","display_name":"IEEE Computational Intelligence Magazine","issn_l":"1556-603X","issn":["1556-603X","1556-6048"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Computational Intelligence Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2159723965","display_name":null,"funder_award_id":"LP180100114","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G3698760113","display_name":null,"funder_award_id":"DP200102611","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G7277765046","display_name":null,"funder_award_id":"62576259","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1489331864","https://openalex.org/W1831950995","https://openalex.org/W2342630703","https://openalex.org/W2410677328","https://openalex.org/W2413527939","https://openalex.org/W2559508241","https://openalex.org/W2588058706","https://openalex.org/W2701059868","https://openalex.org/W2724993384","https://openalex.org/W2727592975","https://openalex.org/W2734259173","https://openalex.org/W2763433602","https://openalex.org/W2776317535","https://openalex.org/W2793031414","https://openalex.org/W2810440851","https://openalex.org/W2843946816","https://openalex.org/W2888985868","https://openalex.org/W2897734904","https://openalex.org/W2897866893","https://openalex.org/W2904693359","https://openalex.org/W2923639984","https://openalex.org/W2929275958","https://openalex.org/W2940478829","https://openalex.org/W2948943518","https://openalex.org/W2968224633","https://openalex.org/W2980307621","https://openalex.org/W2982889533","https://openalex.org/W2998409228","https://openalex.org/W3001257018","https://openalex.org/W3003532255","https://openalex.org/W3010117582","https://openalex.org/W3010321770","https://openalex.org/W3019361465","https://openalex.org/W3036073540","https://openalex.org/W3037248710","https://openalex.org/W3085986313","https://openalex.org/W3093021001","https://openalex.org/W3111929660","https://openalex.org/W3130238944","https://openalex.org/W3152038424","https://openalex.org/W3165186616","https://openalex.org/W3203702773","https://openalex.org/W3216331645","https://openalex.org/W4206289801","https://openalex.org/W4306667131","https://openalex.org/W4307901396","https://openalex.org/W4360838244","https://openalex.org/W4386702825","https://openalex.org/W4387068152","https://openalex.org/W4390684310","https://openalex.org/W4390825338","https://openalex.org/W4399527017","https://openalex.org/W4411600101","https://openalex.org/W4411867204"],"related_works":[],"abstract_inverted_index":{"Evolutionary":[0],"multitasking":[1],"optimization":[2,13],"(EMTO)":[3],"has":[4],"emerged":[5],"as":[6,102],"a":[7,59,92,103],"powerful":[8],"tool":[9],"for":[10,63,76],"addressing":[11],"complex":[12],"problems,":[14],"particularly":[15],"those":[16],"involving":[17],"multiple":[18],"related":[19],"tasks.":[20,42],"However,":[21],"current":[22],"EMTO":[23,50,73,87,109,128],"methods":[24,110],"prioritize":[25],"promoting":[26],"convergence":[27,150],"characteristics":[28],"while":[29,135],"paying":[30],"little":[31],"attention":[32],"to":[33,105],"potential":[34],"privacy":[35,133],"leakage":[36],"issues":[37],"during":[38],"knowledge":[39,55,118],"transfer":[40],"among":[41],"This":[43],"paper":[44],"designs":[45],"privacy-preserving":[46,126],"centralized":[47,65,127],"and":[48,57,69,80,114,139],"decentralized":[49],"models":[51],"based":[52],"on":[53],"inter-task":[54],"transfer,":[56],"proposes":[58],"perturbation":[60],"query":[61],"strategy":[62],"the":[64,77,108,124,140,149,153],"EMTO.":[66],"Furthermore,":[67],"passive":[68],"active":[70,84,97,142],"attacks":[71,85],"in":[72,86],"are":[74],"proposed":[75,125,141],"first":[78],"time,":[79],"an":[81],"example":[82],"of":[83,152],"is":[88],"provided":[89],"by":[90],"constructing":[91],"deceptive":[93],"malicious":[94,117],"task.":[95,155],"The":[96],"attack":[98,143],"technique":[99,144],"can":[100,111,130,145],"serve":[101],"test":[104],"determine":[106],"whether":[107],"effectively":[112],"identify":[113],"defend":[115],"against":[116],"transfer.":[119],"Experimental":[120],"results":[121],"show":[122],"that":[123],"method":[129],"protect":[131],"clients\u2019":[132],"information":[134],"maintaining":[136],"algorithm":[137],"performance,":[138],"significantly":[146],"slow":[147],"down":[148],"speed":[151],"target":[154]},"counts_by_year":[],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2026-04-10T00:00:00"}
