{"id":"https://openalex.org/W4392667070","doi":"https://doi.org/10.1109/tifs.2024.3376201","title":"Privacy-Preserving Approximate Minimum Community Search on Large Networks","display_name":"Privacy-Preserving Approximate Minimum Community Search on Large Networks","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4392667070","doi":"https://doi.org/10.1109/tifs.2024.3376201"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3376201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3376201","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007259437","display_name":"Fangyuan Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fangyuan Sun","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["Cyber Security Laboratory, School of Engineering and IT, The University of New South Wales, Kensington, NSW, Australia","School of Engineering and IT, Cyber Security Laboratory, University of New South Wales, Australian Defence Force Academy, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"Cyber Security Laboratory, School of Engineering and IT, The University of New South Wales, Kensington, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]},{"raw_affiliation_string":"School of Engineering and IT, Cyber Security Laboratory, University of New South Wales, Australian Defence Force Academy, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007259437"],"corresponding_institution_ids":["https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":2.6563,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89558382,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"4146","last_page":"4160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138859868049622},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42655229568481445},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3475760221481323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2541522979736328}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138859868049622},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42655229568481445},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3475760221481323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2541522979736328}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3376201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3376201","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.5400000214576721}],"awards":[{"id":"https://openalex.org/G5155659853","display_name":null,"funder_award_id":"2022CXGC020102","funder_id":"https://openalex.org/F4320329857","funder_display_name":"Major Scientific and Technological Innovation Project of Shandong Province"},{"id":"https://openalex.org/G7748622017","display_name":null,"funder_award_id":"62172245","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329857","display_name":"Major Scientific and Technological Innovation Project of Shandong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W776559747","https://openalex.org/W950821216","https://openalex.org/W1539859404","https://openalex.org/W1798609567","https://openalex.org/W1964419312","https://openalex.org/W1984903982","https://openalex.org/W2004107885","https://openalex.org/W2037487875","https://openalex.org/W2125895010","https://openalex.org/W2147991930","https://openalex.org/W2164928285","https://openalex.org/W2294347342","https://openalex.org/W2547646153","https://openalex.org/W2770638201","https://openalex.org/W2901443058","https://openalex.org/W2952675638","https://openalex.org/W2962788915","https://openalex.org/W2965783709","https://openalex.org/W3046468956","https://openalex.org/W3088910537","https://openalex.org/W3165561456","https://openalex.org/W3184859216","https://openalex.org/W3214720357","https://openalex.org/W4213005048","https://openalex.org/W4225691509","https://openalex.org/W4289127653","https://openalex.org/W4376851522","https://openalex.org/W4384283505"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,200,214],"minimum":[1,9,47,66,153,198,231],"community":[2,11,48,67,83,154,190,232],"search":[3,49,130,163],"is":[4],"used":[5],"to":[6,44,53,78,110,149,157,182],"identify":[7,79],"a":[8,14,18,122,142],"dense":[10],"that":[12,74,204,223],"includes":[13],"specified":[15],"vertex":[16],"in":[17,31,99],"large":[19,235],"network.":[20,91],"It":[21],"has":[22],"gained":[23],"significant":[24],"attention":[25],"because":[26],"of":[27,89,96,116,161],"its":[28],"various":[29],"applications":[30],"social-network":[32],"analysis,":[33],"e-commerce":[34],"transactions,":[35],"biological":[36],"network":[37],"modeling,":[38],"and":[39,106,128,140],"other":[40],"areas.":[41],"Nevertheless,":[42],"how":[43],"realize":[45],"privacy-preserving":[46,64,151,184],"remains":[50],"unexplored":[51],"up":[52],"now.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58,102,165],"initiate":[59],"the":[60,80,86,90,94,100,117,138,146,159,162,174,188,196,224],"first":[61],"research":[62],"on":[63,145,173,218,234],"approximate":[65,152,197,230],"search.":[68],"We":[69],"propose":[70],"an":[71,168],"effective":[72],"scheme":[73,133,206,226],"allows":[75],"cloud":[76,180,212],"servers":[77,181],"smallest":[81],"possible":[82],"while":[84],"safeguarding":[85,125],"private":[87,126],"information":[88,98,127],"To":[92,120],"ensure":[93],"privacy":[95,160],"sensitive":[97],"network,":[101],"employ":[103],"obfuscation":[104],"technology":[105,109],"graph":[107],"encryption":[108],"construct":[111],"two":[112,210],"secure":[113,147,158],"indexes":[114,148],"instead":[115],"original":[118],"graph.":[119],"strike":[121],"balance":[123],"between":[124],"maintaining":[129],"efficiency,":[131],"our":[132,205],"incorporates":[134],"Bloom":[135],"filters":[136],"into":[137],"index":[139],"implements":[141],"two-step":[143],"strategy":[144],"achieve":[150],"searches.":[155],"Furthermore,":[156],"result,":[164],"carefully":[166],"design":[167],"array":[169],"comparison":[170],"protocol":[171,178],"based":[172,217],"BGN":[175],"cryptosystem.":[176],"This":[177],"enables":[179],"perform":[183],"heuristic":[185],"searches":[186,233],"from":[187],"initial":[189],"without":[191],"exposing":[192],"any":[193],"details":[194],"about":[195],"community.":[199],"security":[201],"analysis":[202],"confirms":[203],"achieves":[207],"CQA2-security":[208],"for":[209],"non-colluding":[211],"servers.":[213],"experimental":[215],"results":[216],"real":[219],"social":[220],"networks":[221],"show":[222],"proposed":[225],"can":[227],"efficiently":[228],"handle":[229],"networks.":[236]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
