{"id":"https://openalex.org/W2952675638","doi":"https://doi.org/10.1109/tifs.2019.2922277","title":"How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs","display_name":"How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs","publication_year":2019,"publication_date":"2019-06-12","ids":{"openalex":"https://openalex.org/W2952675638","doi":"https://doi.org/10.1109/tifs.2019.2922277","mag":"2952675638"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2922277","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2922277","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/8833568/08735830.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/10206/8833568/08735830.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047701790","display_name":"Pu Zhao","orcid":"https://orcid.org/0000-0003-3106-881X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pu Zhao","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101598769","display_name":"Hanlin Zhang","orcid":"https://orcid.org/0000-0001-8869-6863"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanlin Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043524348","display_name":"Zhan Qin","orcid":"https://orcid.org/0000-0001-7872-6969"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhan Qin","raw_affiliation_strings":["Electrical and Computer Engineering Department, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100390514","display_name":"Cong Wang","orcid":"https://orcid.org/0000-0003-0547-315X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Cong Wang","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047701790"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.7574,"has_fulltext":true,"cited_by_count":40,"citation_normalized_percentile":{"value":0.94664092,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"15","issue":null,"first_page":"315","last_page":"328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7820974588394165},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.6312127709388733},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6151456236839294},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6073713898658752},{"id":"https://openalex.org/keywords/partition","display_name":"Partition (number theory)","score":0.49167925119400024},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4866269528865814},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47488850355148315},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.47353407740592957},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23682329058647156},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.20852309465408325},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1807100474834442},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12130483984947205}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7820974588394165},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.6312127709388733},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6151456236839294},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6073713898658752},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.49167925119400024},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4866269528865814},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47488850355148315},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.47353407740592957},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23682329058647156},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.20852309465408325},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1807100474834442},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12130483984947205},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2922277","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2922277","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/8833568/08735830.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2019.2922277","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2922277","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/8833568/08735830.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G5219932531","display_name":null,"funder_award_id":"201701","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6366499801","display_name":null,"funder_award_id":"2019-MS-03","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G7182399848","display_name":null,"funder_award_id":"61572267","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8015513482","display_name":null,"funder_award_id":"2017011","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2952675638.pdf","grobid_xml":"https://content.openalex.org/works/W2952675638.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W150223756","https://openalex.org/W1484276943","https://openalex.org/W1494049356","https://openalex.org/W1537270317","https://openalex.org/W1539859404","https://openalex.org/W1798609567","https://openalex.org/W1968974811","https://openalex.org/W2010346244","https://openalex.org/W2024197950","https://openalex.org/W2031533839","https://openalex.org/W2036217746","https://openalex.org/W2063575624","https://openalex.org/W2084224084","https://openalex.org/W2092422002","https://openalex.org/W2092732149","https://openalex.org/W2101267973","https://openalex.org/W2102344476","https://openalex.org/W2111446139","https://openalex.org/W2117694832","https://openalex.org/W2159394589","https://openalex.org/W2168729706","https://openalex.org/W2242625908","https://openalex.org/W2323162780","https://openalex.org/W2606001152","https://openalex.org/W2766587611","https://openalex.org/W2770638201","https://openalex.org/W2781469847","https://openalex.org/W2885674165","https://openalex.org/W2900975904","https://openalex.org/W3141585064","https://openalex.org/W6606067566","https://openalex.org/W6629429546"],"related_works":["https://openalex.org/W4213239787","https://openalex.org/W2045745654","https://openalex.org/W2114337652","https://openalex.org/W4377131110","https://openalex.org/W4388857216","https://openalex.org/W4294559962","https://openalex.org/W2046590706","https://openalex.org/W4390419005","https://openalex.org/W2949444602","https://openalex.org/W1587991081"],"abstract_inverted_index":{"Finding":[0],"min-cut":[1,27,52,66,150],"is":[2,29,38,74,86,172],"a":[3,100,136,143],"fundamental":[4],"operation":[5],"in":[6,14,54],"graph":[7,37,180],"theory.":[8],"It":[9],"has":[10],"been":[11],"widely":[12],"used":[13],"many":[15],"applications":[16],"such":[17],"as":[18],"image":[19],"segmentation":[20],"and":[21,40,58,82,107,112,116,161],"network":[22],"partition.":[23],"However,":[24],"solving":[25],"the":[26,36,51,55,65,83,88,95,123,131,149,162,166,173],"problem":[28,53],"time-consuming":[30],"for":[31,64],"resource-constrained":[32],"devices,":[33],"especially":[34],"when":[35],"large":[39],"dense.":[41],"In":[42,94,127],"this":[43],"paper,":[44],"we":[45,98,141,156],"explore":[46],"how":[47],"to":[48,121,129],"securely":[49],"solve":[50],"cloud":[56,80,91,139],"environment,":[57],"propose":[59],"two":[60,77,152],"secure":[61,177],"outsourcing":[62,148,178],"schemes":[63],"of":[67,119,125,133,151,168,179],"undirected":[68],"edge-weighted":[69],"graphs.":[70,126,154],"The":[71],"first":[72,174],"scheme":[73],"based":[75],"on":[76,176],"non-colluded":[78],"untrusted":[79,90,138],"servers,":[81],"second":[84],"one":[85],"under":[87],"single":[89,137],"server":[92],"model.":[93],"designed":[96],"schemes,":[97],"develop":[99],"new":[101],"technique":[102],"that":[103],"contains":[104],"merging":[105],"vertices":[106,111,115],"edges,":[108,113],"inserting":[109],"fake":[110],"shuffling":[114],"randomizing":[117],"weights":[118],"edges":[120],"protect":[122],"privacy":[124],"order":[128],"realize":[130],"checkability":[132],"result":[134],"from":[135],"server,":[140],"design":[142],"novel":[144],"verification":[145],"mechanism":[146],"by":[147],"related":[153],"Besides,":[155],"also":[157],"provide":[158],"security":[159],"analysis":[160],"experimental":[163],"evaluation.":[164],"To":[165],"best":[167],"our":[169],"knowledge,":[170],"it":[171],"research":[175],"algorithm.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":4}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
