{"id":"https://openalex.org/W2963245972","doi":"https://doi.org/10.1109/tac.2019.2910171","title":"Consensus-Based Data-Privacy Preserving Data Aggregation","display_name":"Consensus-Based Data-Privacy Preserving Data Aggregation","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W2963245972","doi":"https://doi.org/10.1109/tac.2019.2910171","mag":"2963245972"},"language":"en","primary_location":{"id":"doi:10.1109/tac.2019.2910171","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2019.2910171","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004668792","display_name":"Jianping He","orcid":"https://orcid.org/0000-0002-6253-7802"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianping He","raw_affiliation_strings":["Department of Automation and the Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation and the Key Laboratory of System Control and Information Processing, Ministry of Education of China, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061150224","display_name":"Lin Cai","orcid":"https://orcid.org/0000-0002-1093-4865"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Lin Cai","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051951845","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4221-2162"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["State Key Lab of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043097022","display_name":"Jianping Pan","orcid":"https://orcid.org/0000-0003-4893-6847"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jianping Pan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007329669","display_name":"Ling Shi","orcid":"https://orcid.org/0000-0002-6771-8258"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ling Shi","raw_affiliation_strings":["Department of Electric and Computer Engineering, Hong Kong University of Science and Technology, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electric and Computer Engineering, Hong Kong University of Science and Technology, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004668792"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":9.6384,"has_fulltext":false,"cited_by_count":91,"citation_normalized_percentile":{"value":0.98349214,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"64","issue":"12","first_page":"5222","last_page":"5229"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7580825090408325},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5509464144706726},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5297637581825256},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.513587236404419},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5128886699676514},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.485761433839798},{"id":"https://openalex.org/keywords/consensus-algorithm","display_name":"Consensus algorithm","score":0.4229614734649658},{"id":"https://openalex.org/keywords/sigma","display_name":"Sigma","score":0.41966816782951355},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37729954719543457},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3718881607055664},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.27940359711647034},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26996004581451416},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2674851417541504},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14270305633544922},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12234491109848022}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7580825090408325},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5509464144706726},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5297637581825256},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.513587236404419},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5128886699676514},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.485761433839798},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.4229614734649658},{"id":"https://openalex.org/C2778049214","wikidata":"https://www.wikidata.org/wiki/Q7512234","display_name":"Sigma","level":2,"score":0.41966816782951355},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37729954719543457},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3718881607055664},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.27940359711647034},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26996004581451416},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2674851417541504},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14270305633544922},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12234491109848022},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tac.2019.2910171","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tac.2019.2910171","pdf_url":null,"source":{"id":"https://openalex.org/S184954342","display_name":"IEEE Transactions on Automatic Control","issn_l":"0018-9286","issn":["0018-9286","1558-2523","2334-3303"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automatic Control","raw_type":"journal-article"},{"id":"pmh:oai:repository.ust.hk:1783.1-101168","is_oa":false,"landing_page_url":"http://www.scopus.com/record/display.url?eid=2-s2.0-85072981600&origin=inward","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5099999904632568}],"awards":[{"id":"https://openalex.org/G3883416204","display_name":null,"funder_award_id":"61761136012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4708066375","display_name":null,"funder_award_id":"61828301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1992261446","https://openalex.org/W1998345701","https://openalex.org/W2000077104","https://openalex.org/W2036169870","https://openalex.org/W2040176268","https://openalex.org/W2058533888","https://openalex.org/W2092685727","https://openalex.org/W2096241946","https://openalex.org/W2098863504","https://openalex.org/W2104208424","https://openalex.org/W2106221286","https://openalex.org/W2117905067","https://openalex.org/W2120212478","https://openalex.org/W2122265331","https://openalex.org/W2133940231","https://openalex.org/W2136161678","https://openalex.org/W2160643434","https://openalex.org/W2167465093","https://openalex.org/W2293805773","https://openalex.org/W2430154064","https://openalex.org/W2605026797","https://openalex.org/W2800873021","https://openalex.org/W2963112534","https://openalex.org/W4244375620","https://openalex.org/W6674727558"],"related_works":["https://openalex.org/W2793666424","https://openalex.org/W1521063997","https://openalex.org/W2558765606","https://openalex.org/W2020898051","https://openalex.org/W2616808126","https://openalex.org/W2950706573","https://openalex.org/W2357958079","https://openalex.org/W3159884765","https://openalex.org/W2138505526","https://openalex.org/W3007478357"],"abstract_inverted_index":{"Privacy-preserving":[0],"data":[1],"aggregation":[2,60],"(DA)":[3],"in":[4,33],"ad":[5],"hoc":[6],"networks":[7],"is":[8,78,90],"a":[9,50],"challenging":[10,39],"problem,":[11],"considering":[12],"the":[13,28,43,63,72,83,97],"distributed":[14,44],"communication":[15,23],"and":[16,77,82,88,103,106],"control":[17],"requirement,":[18],"dynamic":[19],"network":[20,111],"topology,":[21],"unreliable":[22],"links,":[24],"etc.":[25],"Different":[26],"from":[27],"widely":[29],"used":[30],"cryptographic":[31],"approaches,":[32],"this":[34,38],"paper,":[35],"we":[36,69],"address":[37],"problem":[40],"by":[41],"exploiting":[42],"consensus":[45],"technique.":[46],"We":[47],"first":[48],"propose":[49],"secure":[51],"consensus-based":[52],"DA":[53],"algorithm":[54,74,99],"that":[55,71,96],"guarantees":[56],"an":[57],"accurate":[58],"sum":[59],"while":[61],"preserving":[62],"privacy":[64],"of":[65],"sensitive":[66],"data.":[67],"Then,":[68],"prove":[70],"proposed":[73,98],"converges":[75],"accurately":[76],"$(\\epsilon,":[79],"\\sigma)$-data":[80],"privacy,":[81],"mathematical":[84],"relationship":[85],"between":[86],"$\\epsilon$":[87],"$\\sigma$":[89],"provided.":[91],"Extensive":[92],"simulations":[93],"have":[94],"shown":[95],"has":[100],"high":[101],"accuracy":[102],"low":[104],"complexity,":[105],"they":[107],"are":[108],"robust":[109],"against":[110],"dynamics.":[112]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
