{"id":"https://openalex.org/W4409222087","doi":"https://doi.org/10.1109/tifs.2025.3558580","title":"FHECAP: An Encrypted Control System With Piecewise Continuous Actuation","display_name":"FHECAP: An Encrypted Control System With Piecewise Continuous Actuation","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409222087","doi":"https://doi.org/10.1109/tifs.2025.3558580"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3558580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3558580","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065421587","display_name":"Song Bian","orcid":"https://orcid.org/0000-0003-0467-6203"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Song Bian","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111615478","display_name":"Y. Fu","orcid":"https://orcid.org/0000-0002-9490-7177"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunhao Fu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101800628","display_name":"Dong Zhao","orcid":"https://orcid.org/0000-0002-6285-2896"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zhao","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014844953","display_name":"H. Pan","orcid":"https://orcid.org/0009-0008-4424-6762"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haowen Pan","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110156560","display_name":"Y.H. Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuexiang Jin","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002903770","display_name":"Jiayue Sun","orcid":"https://orcid.org/0000-0002-7774-2606"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayue Sun","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102177847","display_name":"Hui Qiao","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Qiao","raw_affiliation_strings":["Department of Automation, Beijing National Research Center for Information Science and Technology, Institute for Brain and Cognitive Sciences, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Beijing National Research Center for Information Science and Technology, Institute for Brain and Cognitive Sciences, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083017828","display_name":"Zhenyu Guan","orcid":"https://orcid.org/0000-0002-3959-338X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Guan","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5065421587"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03012853,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"4551","last_page":"4566"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9746999740600586,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.920799970626831,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.727081298828125},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5483900904655457},{"id":"https://openalex.org/keywords/piecewise","display_name":"Piecewise","score":0.5478576421737671},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4728044867515564},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3759080171585083},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.347654789686203},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22659540176391602},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18511930108070374},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12823709845542908},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.12064820528030396},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09385663270950317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.727081298828125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5483900904655457},{"id":"https://openalex.org/C164660894","wikidata":"https://www.wikidata.org/wiki/Q2037833","display_name":"Piecewise","level":2,"score":0.5478576421737671},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4728044867515564},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3759080171585083},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.347654789686203},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22659540176391602},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18511930108070374},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12823709845542908},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.12064820528030396},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09385663270950317},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3558580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3558580","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3206277010","display_name":null,"funder_award_id":"T2425023, 62202028, 62172025, U2241213","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3504531889","display_name":null,"funder_award_id":"2023YFB3106200","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W236632755","https://openalex.org/W913176383","https://openalex.org/W1892798954","https://openalex.org/W1966731635","https://openalex.org/W1976541741","https://openalex.org/W1991126170","https://openalex.org/W1997859100","https://openalex.org/W1999724422","https://openalex.org/W2040161058","https://openalex.org/W2055580199","https://openalex.org/W2097061644","https://openalex.org/W2101149746","https://openalex.org/W2106970188","https://openalex.org/W2132172731","https://openalex.org/W2308256798","https://openalex.org/W2400700555","https://openalex.org/W2579694272","https://openalex.org/W2768174108","https://openalex.org/W2794974431","https://openalex.org/W2811182211","https://openalex.org/W2900718115","https://openalex.org/W2938232911","https://openalex.org/W2938401652","https://openalex.org/W2942255051","https://openalex.org/W2945964968","https://openalex.org/W2963426216","https://openalex.org/W2990280959","https://openalex.org/W2996072473","https://openalex.org/W3040353046","https://openalex.org/W3115892855","https://openalex.org/W3117449869","https://openalex.org/W3126033163","https://openalex.org/W3134663857","https://openalex.org/W3176410512","https://openalex.org/W3200754280","https://openalex.org/W3204113425","https://openalex.org/W3204445038","https://openalex.org/W4281702731","https://openalex.org/W4285284542","https://openalex.org/W4288871358","https://openalex.org/W4307462889","https://openalex.org/W4377137173","https://openalex.org/W4378697376","https://openalex.org/W4380303768","https://openalex.org/W4382361346","https://openalex.org/W4384835155","https://openalex.org/W4385232227","https://openalex.org/W4387451004","https://openalex.org/W4389438372","https://openalex.org/W4391723839","https://openalex.org/W4394698470","https://openalex.org/W4398764896","https://openalex.org/W4399146444","https://openalex.org/W4400946744","https://openalex.org/W6724049718","https://openalex.org/W6748082217","https://openalex.org/W6778434676","https://openalex.org/W6779672763","https://openalex.org/W6870034696"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385263368","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W2355865573","https://openalex.org/W2155981143","https://openalex.org/W2155245395"],"abstract_inverted_index":{"We":[0,153],"propose":[1,121],"an":[2,85],"encrypted":[3,144,164],"controller":[4,34,59,87],"framework":[5,88],"for":[6,114,166],"linear":[7,33],"time-invariant":[8],"systems":[9,47],"with":[10,140,180],"actuator":[11,134],"non-linearity":[12],"based":[13],"on":[14,45],"fully":[15],"homomorphic":[16,28,124],"encryption":[17,29],"(FHE).":[18],"While":[19],"some":[20],"existing":[21,142],"works":[22],"explore":[23],"the":[24,36,39,43,46,55,58,96,100,133,137,141,155,160,174],"use":[25],"of":[26,38,42,157,163],"partially":[27],"(PHE)":[30],"in":[31,150,159],"implementing":[32],"systems,":[35],"impacts":[37],"non-linear":[40,93],"behaviors":[41],"actuators":[44,66,97],"are":[48],"often":[49],"left":[50],"unconcerned.":[51],"In":[52,103,136],"particular,":[53],"when":[54],"inputs":[56],"to":[57,71,95,98,126,131],"become":[60],"too":[61,64],"small":[62],"or":[63],"large,":[65],"may":[67],"burn":[68],"out":[69],"due":[70],"unstable":[72],"system":[73,101],"state":[74],"oscillations.":[75],"To":[76],"solve":[77],"this":[78],"dilemma,":[79],"we":[80,105,120],"design":[81,107],"and":[82],"implement":[83],"FHECAP,":[84,104],"FHEbased":[86],"that":[89,173],"can":[90],"homomorphically":[91],"apply":[92,127],"functions":[94],"rectify":[99],"inputs.":[102],"first":[106],"a":[108,122],"novel":[109],"data":[110],"encoding":[111],"scheme":[112],"tailored":[113],"efficient":[115],"gain":[116],"matrix":[117],"evaluation.":[118],"Then,":[119],"high-precision":[123],"algorithm":[125],"non-arithmetic":[128],"piecewise":[129],"function":[130],"realize":[132],"normalization.":[135],"experiments,":[138],"compared":[139],"state-of-the-art":[143],"controllers,":[145],"FHECAP":[146,158,175],"achieves":[147,176],"4\u00d7\u20131000\u00d7":[148],"reduction":[149],"computational":[151],"latency.":[152],"evaluate":[154],"effectiveness":[156],"real-world":[161],"application":[162],"control":[165],"spacecraft":[167,178],"rendezvous.":[168],"The":[169],"simulation":[170],"results":[171],"show":[172],"real-time":[177],"rendezvous":[179],"negligible":[181],"accuracy":[182],"loss.":[183]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
