{"id":"https://openalex.org/W7104908249","doi":"https://doi.org/10.1109/tce.2025.3631905","title":"A Protection Scheme for Vehicle Communication in IoT Using Distributed Differential Privacy and M-Ary Averaging Trees","display_name":"A Protection Scheme for Vehicle Communication in IoT Using Distributed Differential Privacy and M-Ary Averaging Trees","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7104908249","doi":"https://doi.org/10.1109/tce.2025.3631905"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3631905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3631905","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yuan Tian","orcid":"https://orcid.org/0000-0002-2307-8201"},"institutions":[{"id":"https://openalex.org/I2799736854","display_name":"Nanjing Institute of Technology","ror":"https://ror.org/00n6txq60","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799736854"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Tian","raw_affiliation_strings":["Nanjing Institute of Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Institute of Technology, Nanjing, China","institution_ids":["https://openalex.org/I2799736854"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yanfeng Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I2799736854","display_name":"Nanjing Institute of Technology","ror":"https://ror.org/00n6txq60","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799736854"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanfeng Shi","raw_affiliation_strings":["Nanjing Institute of Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Institute of Technology, Nanjing, China","institution_ids":["https://openalex.org/I2799736854"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yue Zhang","orcid":"https://orcid.org/0000-0002-7207-6456"},"institutions":[{"id":"https://openalex.org/I2799736854","display_name":"Nanjing Institute of Technology","ror":"https://ror.org/00n6txq60","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799736854"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Zhang","raw_affiliation_strings":["Nanjing Institute of Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Institute of Technology, Nanjing, China","institution_ids":["https://openalex.org/I2799736854"]}]},{"author_position":"last","author":{"id":null,"display_name":"Biao Song","orcid":"https://orcid.org/0000-0002-0423-7369"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Song","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I2799736854"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.77651051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1377","last_page":"1387"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8252999782562256,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8252999782562256,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.11460000276565552,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.02500000037252903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.9283000230789185},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.5616999864578247},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5346999764442444},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5121999979019165},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.45739999413490295},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.43459999561309814},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4237000048160553},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42089998722076416},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.41350001096725464},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.4041000008583069}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.9283000230789185},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7335000038146973},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.5616999864578247},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5346999764442444},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5121999979019165},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.45739999413490295},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4237000048160553},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42089998722076416},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4205000102519989},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.41350001096725464},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.4041000008583069},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.40220001339912415},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3856000006198883},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.35519999265670776},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.3343000113964081},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.3257000148296356},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.32409998774528503},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.32010000944137573},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.313400000333786},{"id":"https://openalex.org/C165700671","wikidata":"https://www.wikidata.org/wiki/Q203484","display_name":"Laplace operator","level":2,"score":0.31279999017715454},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2994999885559082},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C163797641","wikidata":"https://www.wikidata.org/wiki/Q2067937","display_name":"Tree structure","level":3,"score":0.29440000653266907},{"id":"https://openalex.org/C2781142347","wikidata":"https://www.wikidata.org/wiki/Q1366592","display_name":"Hilbert curve","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2727000117301941},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.26919999718666077},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26820001006126404},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.25450000166893005},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25440001487731934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3631905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3631905","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,5,38,43,46,120,128,135,140,144,159],"widespread":[2],"adoption":[3],"of":[4,7,37,48,123,130],"Internet":[6],"things":[8],"(IoT)":[9],"and":[10,50,165,195,201,207],"cloud":[11],"computing,":[12],"vehicle":[13,59],"intelligent":[14],"interactive":[15],"systems":[16],"have":[17],"gained":[18],"significant":[19],"attention.":[20],"This":[21,117],"has":[22,81,187],"led":[23],"to":[24,55,58,85,151,199],"extensive":[25],"research":[26],"on":[27,42,102,107],"ensuring":[28,127],"privacy":[29,39,66,131,136],"protection":[30,68],"for":[31],"in-vehicle":[32],"communication":[33],"data.":[34],"The":[35],"significance":[36],"study":[40],"rests":[41],"fact":[44],"that":[45,183],"leakage":[47],"navigation":[49],"location":[51,67],"information":[52],"can":[53],"lead":[54],"potential":[56],"threats":[57],"owners":[60],"or":[61],"car":[62],"manufacturers.":[63],"Existing":[64],"differential":[65,98],"methods":[69,203],"are":[70],"primarily":[71],"applied":[72],"in":[73],"a":[74,97,108,168,175,192],"continuous":[75,124],"query":[76,88,189],"environment,":[77],"where":[78],"noise":[79,122],"overlay":[80],"been":[82],"reported":[83],"previously":[84],"cause":[86],"reduced":[87],"accuracy.":[89,208],"To":[90],"address":[91],"this":[92,94],"problem,":[93],"paper":[95],"proposes":[96],"privacy-preserving":[99],"method":[100,118,186],"based":[101,106],"an":[103],"M-ary":[104,154],"tree":[105,156],"<italic":[109],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[110],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>-anonymity":[111],"set":[112],"constructed":[113],"from":[114],"Hilbert":[115],"curves.":[116],"reduces":[119,143],"data":[121,163],"queries":[125],"while":[126],"strength":[129],"protection.":[132],"Especially":[133],"when":[134],"budget":[137,171],"is":[138],"0.5,":[139],"proposed":[141,185],"algorithm":[142],"mean":[145],"error":[146,177],"by":[147],"about":[148],"20000":[149],"compared":[150,198],"existing":[152],"algorithms.":[153],"averaging":[155],"structure":[157],"partitions":[158],"anonymized":[160],"data,":[161],"improves":[162],"utility,":[164],"rigorously":[166],"derives":[167],"Laplacian":[169],"private":[170],"allocation":[172],"strategy":[173],"with":[174,204],"small":[176],"upper":[178],"bound.":[179],"Extensive":[180],"experiments":[181],"demonstrate":[182],"our":[184],"smaller":[188],"errors":[190],"over":[191],"wide":[193],"range":[194],"gradually":[196],"stabilizes":[197],"Dwork":[200],"EHWT-DP":[202],"higher":[205],"efficiency":[206]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-12T00:00:00"}
