{"id":"https://openalex.org/W4399339292","doi":"https://doi.org/10.1109/tdsc.2024.3408816","title":"Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud","display_name":"Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud","publication_year":2024,"publication_date":"2024-06-04","ids":{"openalex":"https://openalex.org/W4399339292","doi":"https://doi.org/10.1109/tdsc.2024.3408816"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3408816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3408816","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091898557","display_name":"Yandong Zheng","orcid":"https://orcid.org/0000-0003-4534-5670"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yandong Zheng","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021292791","display_name":"Hui Zhu","orcid":"https://orcid.org/0000-0002-5853-633X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhu","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086477266","display_name":"Songnian Zhang","orcid":"https://orcid.org/0000-0002-0558-4485"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songnian Zhang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101864760","display_name":"Fengwei Wang","orcid":"https://orcid.org/0000-0002-6886-8258"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengwei Wang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040489898","display_name":"Jun Shao","orcid":"https://orcid.org/0000-0001-8352-0973"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Shao","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang E-Commerce Key Laboratory, Zhejiang Gongshang University, Hangzhou, Zhejiang, China","Zhejiang E-Commerce Key Laboratory, Hangzhou, China","School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang E-Commerce Key Laboratory, Zhejiang Gongshang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I75059550"]},{"raw_affiliation_string":"Zhejiang E-Commerce Key Laboratory, Hangzhou, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5091898557"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":2.049,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88283134,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"22","issue":"1","first_page":"534","last_page":"548"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9718999862670898,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.6050246953964233},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5917654037475586},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.569707453250885},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5233025550842285},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.41213223338127136},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3644660413265228},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19022434949874878},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06213301420211792}],"concepts":[{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.6050246953964233},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5917654037475586},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.569707453250885},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5233025550842285},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.41213223338127136},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3644660413265228},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19022434949874878},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06213301420211792},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3408816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3408816","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1014302991","display_name":null,"funder_award_id":"62302374","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6894247995","display_name":null,"funder_award_id":"2022M722498","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8104162393","display_name":null,"funder_award_id":"62272413","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1523494361","https://openalex.org/W1589843374","https://openalex.org/W1762781255","https://openalex.org/W2059094657","https://openalex.org/W2065221212","https://openalex.org/W2074356711","https://openalex.org/W2078401527","https://openalex.org/W2158194525","https://openalex.org/W2422800230","https://openalex.org/W2536125594","https://openalex.org/W2639926268","https://openalex.org/W2799869213","https://openalex.org/W2901608006","https://openalex.org/W2954220898","https://openalex.org/W2979076935","https://openalex.org/W2991037925","https://openalex.org/W3014422368","https://openalex.org/W3136533148","https://openalex.org/W3175228669","https://openalex.org/W3191008542","https://openalex.org/W3204250389","https://openalex.org/W4220968834","https://openalex.org/W4225832365","https://openalex.org/W4282600728","https://openalex.org/W4308338766","https://openalex.org/W4313162841","https://openalex.org/W4360993846","https://openalex.org/W4379382506","https://openalex.org/W4386902838","https://openalex.org/W4389315088","https://openalex.org/W6712419705"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W4244478748","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W2142036596","https://openalex.org/W2072657027","https://openalex.org/W2600246793"],"abstract_inverted_index":{"Weighted":[0],"set":[1,31,41],"sampling":[2,32,42],"has":[3,65,203],"been":[4,204],"proven":[5],"essential":[6],"for":[7,88,174],"generating":[8],"discrete":[9],"numbers":[10],"based":[11],"on":[12],"their":[13],"weights":[14],"and":[15,38,58,74,92,112,141,170],"found":[16],"broad":[17],"applications":[18],"in":[19,217],"recommendation":[20],"systems.":[21],"The":[22,199],"extension":[23],"of":[24,52,153,165,195],"this":[25,105],"method,":[26],"known":[27],"as":[28,126],"weighted":[29,40],"range":[30,37],"(WRSS),":[33],"specifies":[34],"a":[35,67,127,151,166,214],"query":[36,91],"applies":[39],"to":[43,62,70,104,129,156],"the":[44,50,120,146,163,171,187,193,219],"data":[45,57,59,72,79,93],"within":[46],"that":[47,210],"range.":[48],"With":[49],"proliferation":[51],"cloud":[53,63],"computing,":[54],"outsourcing":[55],"encrypted":[56],"processing":[60,75,94],"tasks":[61],"servers":[64],"become":[66],"common":[68],"practice":[69],"overcome":[71],"storage":[73,140],"challenges":[76,220],"while":[77],"protecting":[78],"privacy.":[80,159],"Existing":[81],"studies":[82],"have":[83,97],"proposed":[84,197,200],"many":[85],"privacy-preserving":[86,100,113,223],"solutions":[87],"various":[89],"customized":[90],"tasks,":[95],"none":[96],"specifically":[98],"addressed":[99],"WRSS.":[101,224],"In":[102],"response":[103],"gap,":[106],"our":[107,196,211],"paper":[108],"introduces":[109],"an":[110,131],"efficient":[111],"WRSS":[114,158],"scheme.":[115,198],"We":[116],"begin":[117],"by":[118,222],"leveraging":[119],"three-party":[121,133],"secret":[122,134],"sharing":[123,135],"(TPSS)":[124],"scheme":[125,137,161,212],"foundation":[128],"design":[130],"enhanced":[132],"(eTPSS)":[136],"with":[138],"superior":[139],"computational":[142],"efficiency.":[143],"Building":[144],"upon":[145],"eTPSS":[147],"scheme,":[148],"we":[149],"introduce":[150],"series":[152],"private":[154,180],"algorithms":[155],"safeguard":[157],"Our":[160],"integrates":[162],"use":[164],"binary":[167],"search":[168],"tree":[169],"alias":[172],"method":[173],"WRSS,":[175],"ensuring":[176],"privacy":[177],"through":[178,206],"eTPSS-based":[179],"algorithms.":[181],"A":[182],"thorough":[183],"security":[184],"analysis":[185],"under":[186],"simulation-based":[188],"real/ideal":[189],"worlds":[190],"model":[191],"showcases":[192],"effectiveness":[194],"scheme's":[201],"efficiency":[202],"substantiated":[205],"extensive":[207],"experiments,":[208],"demonstrating":[209],"marks":[213],"significant":[215],"advancement":[216],"addressing":[218],"posed":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
