{"id":"https://openalex.org/W4415378008","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204617","title":"Split Differential Privacy for Privacy-Preserving Smart Meter Data Aggregation","display_name":"Split Differential Privacy for Privacy-Preserving Smart Meter Data Aggregation","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4415378008","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204617"},"language":null,"primary_location":{"id":"doi:10.1109/smartgridcomm65349.2025.11204617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204617","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071671574","display_name":"Humaira Arif","orcid":null},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Humaira Arif","raw_affiliation_strings":["University of Texas at El Paso,Department of Electrical and Computer Engineering,El Paso,TX,79968"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Department of Electrical and Computer Engineering,El Paso,TX,79968","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038684692","display_name":"Mohsin Raza","orcid":"https://orcid.org/0000-0002-7351-9749"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Salim Raza","raw_affiliation_strings":["University of Texas at El Paso,Department of Electrical and Computer Engineering,El Paso,TX,79968"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Department of Electrical and Computer Engineering,El Paso,TX,79968","institution_ids":["https://openalex.org/I164936912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019193172","display_name":"Sai Mounika Errapotu","orcid":"https://orcid.org/0000-0002-3759-3802"},"institutions":[{"id":"https://openalex.org/I164936912","display_name":"The University of Texas at El Paso","ror":"https://ror.org/04d5vba33","country_code":"US","type":"education","lineage":["https://openalex.org/I164936912"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Mounika Errapotu","raw_affiliation_strings":["University of Texas at El Paso,Department of Electrical and Computer Engineering,El Paso,TX,79968"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Texas at El Paso,Department of Electrical and Computer Engineering,El Paso,TX,79968","institution_ids":["https://openalex.org/I164936912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071671574"],"corresponding_institution_ids":["https://openalex.org/I164936912"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27724702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.902899980545044},{"id":"https://openalex.org/keywords/smart-meter","display_name":"Smart meter","score":0.7885000109672546},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.6664999723434448},{"id":"https://openalex.org/keywords/news-aggregator","display_name":"News aggregator","score":0.6345999836921692},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5778999924659729},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4997999966144562},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.46299999952316284},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4507000148296356},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.38769999146461487}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.902899980545044},{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.7885000109672546},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.692799985408783},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.6664999723434448},{"id":"https://openalex.org/C180505990","wikidata":"https://www.wikidata.org/wiki/Q498267","display_name":"News aggregator","level":2,"score":0.6345999836921692},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5778999924659729},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.46299999952316284},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4562999904155731},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4507000148296356},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40119999647140503},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.38769999146461487},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3239000141620636},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.322299987077713},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.32100000977516174},{"id":"https://openalex.org/C2778656907","wikidata":"https://www.wikidata.org/wiki/Q5164712","display_name":"Consumer privacy","level":3,"score":0.32089999318122864},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3206000030040741},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.31450000405311584},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.2849000096321106},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2702000141143799},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.2556000053882599},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm65349.2025.11204617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204617","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1973502285","https://openalex.org/W1987545487","https://openalex.org/W1997176470","https://openalex.org/W2165970106","https://openalex.org/W2246071452","https://openalex.org/W2730936454","https://openalex.org/W2911978475","https://openalex.org/W2990122383","https://openalex.org/W3046106141","https://openalex.org/W3108419517","https://openalex.org/W3158977067","https://openalex.org/W3206677816","https://openalex.org/W4220656177","https://openalex.org/W4293198504","https://openalex.org/W4303981459","https://openalex.org/W4405717599"],"related_works":[],"abstract_inverted_index":{"Due":[0],"to":[1,16,31,51,54,74,149,194,211],"the":[2,29,81,125,133,139,147,164],"rapid":[3],"rise":[4],"in":[5,69,78,89,118,167],"energy":[6,22,35,156],"consumption,":[7],"smart":[8,39,126],"grid":[9],"technologies":[10],"are":[11],"emerging":[12],"and":[13,20,33,45,59,98,129,145,162,172,188,207],"evolving":[14],"simultaneously":[15],"efficiently":[17],"manage":[18],"residential":[19],"commercial":[21],"consumption.":[23],"As":[24],"demand":[25],"increases,":[26],"so":[27],"does":[28],"need":[30],"monitor":[32],"analyze":[34],"usage":[36],"data":[37,50,76,158,233],"from":[38,159],"meter":[40,127],"readings,":[41],"for":[42],"efficient":[43],"planning":[44],"usage.":[46],"Mismanagement":[47],"can":[48,94],"cause":[49],"be":[52],"exposed":[53],"untrusted":[55],"aggregators,":[56],"malicious":[57],"entities,":[58],"third-party":[60],"adversaries.":[61],"Although":[62],"Differential":[63,110],"Privacy":[64,111],"plays":[65],"an":[66],"important":[67],"role":[68],"constructing":[70],"a":[71,90,108,202],"principled":[72],"framework":[73,84,166],"preserve":[75],"privacy":[77,99,171,181,228],"such":[79,177],"environments,":[80],"conventional":[82],"DP":[83],"often":[85],"requires":[86],"complete":[87],"trust":[88],"central":[91],"aggregator":[92,134],"which":[93],"introduce":[95],"security":[96],"vulnerabilities":[97],"leakage":[100,182],"possibilities.":[101],"To":[102],"address":[103],"this":[104],"issue,":[105],"we":[106,200],"propose":[107],"Split":[109],"(Split-Dp)":[112],"model":[113,137],"that":[114,222],"injects":[115],"randomized":[116],"noise":[117,209],"two":[119],"stages":[120],"-":[121],"(i)":[122],"locally":[123],"at":[124,132],"level;":[128],"(ii)":[130],"globally":[131],"level.":[135],"This":[136],"minimizes":[138],"reliance":[140],"on":[141],"any":[142],"trusted":[143],"party":[144],"reduces":[146],"vulnerability":[148],"collusion":[150],"attacks.":[151],"We":[152,174],"utilized":[153],"realistic":[154],"household":[155],"consumption":[157],"Muratori's":[160],"dataset":[161],"evaluated":[163],"proposed":[165,224],"terms":[168],"of":[169,205],"both":[170],"utility.":[173,234],"use":[175],"metrics":[176],"as":[178],"reconstruction":[179],"error,":[180],"percentage,":[183],"Mean":[184,190],"Absolute":[185],"Error":[186,192],"(MAE),":[187],"Root":[189],"Squared":[191],"(RMSE)":[193],"evaluate":[195],"our":[196,223],"model's":[197],"performance.":[198],"Additionally,":[199],"performed":[201],"comparative":[203],"analysis":[204],"Laplace":[206],"Gaussian":[208],"mechanisms":[210],"determine":[212],"their":[213],"respective":[214],"effectiveness":[215],"under":[216],"Split-Dp":[217],"conditions.":[218],"Experimental":[219],"results":[220],"show":[221],"approach":[225],"effectively":[226],"decreases":[227],"risks":[229],"while":[230],"preserving":[231],"acceptable":[232]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-21T00:00:00"}
