{"id":"https://openalex.org/W4385194716","doi":"https://doi.org/10.1109/tcns.2023.3298198","title":"Privacy-Preserving Bipartite Consensus on Signed Networks","display_name":"Privacy-Preserving Bipartite Consensus on Signed Networks","publication_year":2023,"publication_date":"2023-07-24","ids":{"openalex":"https://openalex.org/W4385194716","doi":"https://doi.org/10.1109/tcns.2023.3298198"},"language":"en","primary_location":{"id":"doi:10.1109/tcns.2023.3298198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2023.3298198","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100709097","display_name":"Jing Zhang","orcid":"https://orcid.org/0000-0001-6115-5282"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049482611","display_name":"Jianquan Lu","orcid":"https://orcid.org/0000-0003-4423-6034"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianquan Lu","raw_affiliation_strings":["School of Mathematics, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025032996","display_name":"Xiangyong Chen","orcid":"https://orcid.org/0000-0001-7560-5467"},"institutions":[{"id":"https://openalex.org/I15823474","display_name":"Linyi University","ror":"https://ror.org/01knv0402","country_code":"CN","type":"education","lineage":["https://openalex.org/I15823474"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyong Chen","raw_affiliation_strings":["School of Automation and Electrical Engineering, Linyi University, Linyi, China"],"affiliations":[{"raw_affiliation_string":"School of Automation and Electrical Engineering, Linyi University, Linyi, China","institution_ids":["https://openalex.org/I15823474"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017943302","display_name":"Jie Zhong","orcid":"https://orcid.org/0000-0002-7196-5753"},"institutions":[{"id":"https://openalex.org/I135237710","display_name":"Zhejiang Normal University","ror":"https://ror.org/01vevwk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I135237710"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Zhong","raw_affiliation_strings":["School of Mathematical Sciences, Zhejiang Normal University, Jinhua, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Zhejiang Normal University, Jinhua, China","institution_ids":["https://openalex.org/I135237710"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100709097"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":1.6073,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84208066,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"11","issue":"2","first_page":"696","last_page":"704"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bipartite-graph","display_name":"Bipartite graph","score":0.8902968168258667},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7894363403320312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.622911274433136},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5931709408760071},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5560718774795532},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5079637169837952},{"id":"https://openalex.org/keywords/consensus","display_name":"Consensus","score":0.4880753755569458},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.4399332106113434},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.4323936104774475},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4212634861469269},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3726668357849121},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.3296806216239929},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16696211695671082},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16383245587348938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13430660963058472}],"concepts":[{"id":"https://openalex.org/C197657726","wikidata":"https://www.wikidata.org/wiki/Q174733","display_name":"Bipartite graph","level":3,"score":0.8902968168258667},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7894363403320312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.622911274433136},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5931709408760071},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5560718774795532},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5079637169837952},{"id":"https://openalex.org/C107107730","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus","level":3,"score":0.4880753755569458},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.4399332106113434},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.4323936104774475},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4212634861469269},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3726668357849121},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.3296806216239929},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16696211695671082},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16383245587348938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13430660963058472},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcns.2023.3298198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2023.3298198","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3936923285","display_name":null,"funder_award_id":"2023T160585","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G6768575545","display_name":null,"funder_award_id":"61973078","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7419691097","display_name":null,"funder_award_id":"62173175","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G871987622","display_name":null,"funder_award_id":"2021M702913","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W1538118056","https://openalex.org/W1892798954","https://openalex.org/W1967509640","https://openalex.org/W1989544744","https://openalex.org/W1998345701","https://openalex.org/W2080911030","https://openalex.org/W2083796634","https://openalex.org/W2096241946","https://openalex.org/W2138126900","https://openalex.org/W2141420453","https://openalex.org/W2300802593","https://openalex.org/W2343734929","https://openalex.org/W2605026797","https://openalex.org/W2765234683","https://openalex.org/W2883488044","https://openalex.org/W2887509958","https://openalex.org/W2916583047","https://openalex.org/W2942154814","https://openalex.org/W2944956658","https://openalex.org/W2963112534","https://openalex.org/W2964008526","https://openalex.org/W2970406861","https://openalex.org/W2972759927","https://openalex.org/W2972950073","https://openalex.org/W2974008242","https://openalex.org/W2977088403","https://openalex.org/W2993317151","https://openalex.org/W3000785930","https://openalex.org/W3018091741","https://openalex.org/W3092133968","https://openalex.org/W3094757083","https://openalex.org/W3106258785","https://openalex.org/W3137170932","https://openalex.org/W3137256724","https://openalex.org/W3141585064","https://openalex.org/W3147306200","https://openalex.org/W3167954799","https://openalex.org/W3204238558","https://openalex.org/W4210751359","https://openalex.org/W4312767194"],"related_works":["https://openalex.org/W2512080507","https://openalex.org/W2090870188","https://openalex.org/W2782532368","https://openalex.org/W2980987828","https://openalex.org/W2996939932","https://openalex.org/W2784200061","https://openalex.org/W2784026553","https://openalex.org/W2511063373","https://openalex.org/W3127518712","https://openalex.org/W3089005085"],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"the":[3,29,54,61,100,123],"privacy-preserving":[4,43],"bipartite":[5,12,44,56],"consensus":[6,13,45,57],"problem":[7],"on":[8,94],"signed":[9],"networks.":[10],"Traditional":[11],"protocols":[14],"need":[15],"agents":[16,81],"to":[17,52,74,98,121],"explicitly":[18],"exchange":[19,75],"initial":[20,62,91,102],"state":[21,30,63],"with":[22],"their":[23],"neighbors,":[24],"which":[25],"is":[26,31,47,73],"undesirable":[27],"when":[28],"private":[32],"or":[33],"contains":[34],"some":[35,132],"sensitive":[36],"information.":[37],"Therefore,":[38],"in":[39],"this":[40,71,126],"paper,":[41],"a":[42],"algorithm":[46,72,127],"proposed,":[48],"and":[49,86,110,128],"it":[50],"aims":[51],"compute":[53],"accurate":[55],"value":[58],"while":[59],"preserving":[60],"information":[64,83],"of":[65,70,125],"agents.":[66],"The":[67],"core":[68],"idea":[69],"encrypted":[76],"random":[77,96],"values":[78,97],"between":[79],"cooperative":[80],"before":[82],"iterative":[84],"update,":[85],"then":[87],"agent":[88],"constructs":[89],"false":[90],"states":[92,103],"based":[93],"these":[95],"replace":[99],"original":[101],"for":[104],"transmission.":[105],"A":[106],"specific":[107],"correctness":[108],"analysis":[109,112],"privacy":[111],"are":[113,119],"given":[114,120],"subsequently.":[115],"Finally,":[116],"numerical":[117],"examples":[118],"show":[122],"effectiveness":[124],"its":[129],"superiority":[130],"over":[131],"existing":[133],"methods.":[134]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
