{"id":"https://openalex.org/W2891008581","doi":"https://doi.org/10.1109/tii.2018.2871174","title":"Privacy-Preserving Tensor-Based Multiple Clusterings on Cloud for Industrial IoT","display_name":"Privacy-Preserving Tensor-Based Multiple Clusterings on Cloud for Industrial IoT","publication_year":2018,"publication_date":"2018-09-20","ids":{"openalex":"https://openalex.org/W2891008581","doi":"https://doi.org/10.1109/tii.2018.2871174","mag":"2891008581"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2018.2871174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2018.2871174","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062857871","display_name":"Yaliang Zhao","orcid":"https://orcid.org/0000-0002-7117-605X"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaliang Zhao","raw_affiliation_strings":["School of Computer and Information Engineering, Henan University, Kaifeng, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Henan University, Kaifeng, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049154222","display_name":"Laurence T. Yang","orcid":"https://orcid.org/0000-0002-7986-4244"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Laurence T. Yang","raw_affiliation_strings":["Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101947151","display_name":"Jiayu Sun","orcid":"https://orcid.org/0000-0001-6483-0159"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayu Sun","raw_affiliation_strings":["Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062857871"],"corresponding_institution_ids":["https://openalex.org/I173899330"],"apc_list":null,"apc_paid":null,"fwci":2.877,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.92833552,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"15","issue":"4","first_page":"2372","last_page":"2381"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7822842597961426},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7703801393508911},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7172457575798035},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6679836511611938},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6121534109115601},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.533348798751831},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5227701663970947},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5061630606651306},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45113736391067505},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.42301687598228455},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.41458427906036377},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41203171014785767},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.32967787981033325},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2600773572921753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24881768226623535},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.22315359115600586},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16070646047592163},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.12731996178627014}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7822842597961426},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7703801393508911},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7172457575798035},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6679836511611938},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6121534109115601},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.533348798751831},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5227701663970947},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5061630606651306},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45113736391067505},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.42301687598228455},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.41458427906036377},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41203171014785767},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.32967787981033325},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2600773572921753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24881768226623535},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.22315359115600586},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16070646047592163},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.12731996178627014},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2018.2871174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2018.2871174","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6100000143051147}],"awards":[{"id":"https://openalex.org/G279046860","display_name":null,"funder_award_id":"JCYJ20170307172200714","funder_id":"https://openalex.org/F4320329791","funder_display_name":"Shenzhen Fundamental Research Program"},{"id":"https://openalex.org/G4278539166","display_name":null,"funder_award_id":"61802112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329791","display_name":"Shenzhen Fundamental Research Program","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1413286666","https://openalex.org/W1967066839","https://openalex.org/W2031738616","https://openalex.org/W2041785419","https://openalex.org/W2050243336","https://openalex.org/W2061598784","https://openalex.org/W2088339831","https://openalex.org/W2097184218","https://openalex.org/W2131580514","https://openalex.org/W2132172731","https://openalex.org/W2157253445","https://openalex.org/W2158112071","https://openalex.org/W2165835468","https://openalex.org/W2178073758","https://openalex.org/W2297059404","https://openalex.org/W2317339301","https://openalex.org/W2397159079","https://openalex.org/W2530307160","https://openalex.org/W2613814461","https://openalex.org/W2753870817","https://openalex.org/W2757727956","https://openalex.org/W2794079809","https://openalex.org/W2900996896","https://openalex.org/W4239982965","https://openalex.org/W4240788698","https://openalex.org/W6631628602","https://openalex.org/W6672902793","https://openalex.org/W6676454710","https://openalex.org/W6712394519"],"related_works":["https://openalex.org/W4323528671","https://openalex.org/W4386820853","https://openalex.org/W4238582915","https://openalex.org/W2094069016","https://openalex.org/W1575311728","https://openalex.org/W2369575317","https://openalex.org/W4212859770","https://openalex.org/W3036675567","https://openalex.org/W4390887375","https://openalex.org/W3032578772"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"discovering":[2],"hidden":[3],"different":[4,11,167],"data":[5,9],"structures":[6],"in":[7,27],"big":[8,197],"from":[10],"perspectives,":[12],"a":[13,66,78,95,118],"tensor-based":[14,80,129],"multiple":[15,81,110,130],"clustering":[16,82,111,164,194],"method":[17,83],"has":[18,185],"been":[19],"developed":[20],"recently,":[21],"which":[22,146],"can":[23,58],"be":[24],"widely":[25],"used":[26],"Industrial":[28,195],"Internet":[29],"of":[30,49,69,120],"Things":[31],"(IoT)":[32],"to":[33,41,53,98,107,126,166],"improve":[34],"production":[35],"and":[36,46,138,161],"service":[37],"quality.":[38],"However,":[39],"due":[40],"the":[42,75,85,133,144,156,183],"high":[43,67,186],"computational":[44],"cost":[45],"huge":[47],"volume":[48],"data,":[50],"outsourcing":[51],"computing":[52],"relatively":[54],"inexpensive":[55],"cloud":[56,88,105,181],"servers":[57,106],"greatly":[59],"save":[60],"local":[61],"costs,":[62],"but":[63],"there":[64],"is":[65,89,147,159,175,190],"risk":[68],"revealing":[70],"user":[71],"privacy.":[72],"To":[73],"address":[74],"above":[76],"problem,":[77],"privacy-preserving":[79,128],"on":[84,143],"secure":[86],"hybrid":[87],"proposed.":[90],"The":[91],"proposed":[92,125,134,157],"scheme":[93,158,184],"utilizes":[94],"homomorphic":[96],"cryptosystem":[97],"encrypt":[99],"object":[100,115],"tensors":[101],"and,":[102],"then,":[103],"employs":[104],"completely":[108],"implement":[109],"calculation":[112],"over":[113],"encrypted":[114],"tensors.":[116],"Furthermore,":[117],"series":[119],"related":[121],"security":[122],"subprotocols":[123],"are":[124,141],"support":[127],"clusterings.":[131],"In":[132],"scheme,":[135],"only":[136],"encryption":[137],"removing":[139],"perturbation":[140],"performed":[142],"client,":[145],"very":[148,191],"lightweight":[149],"for":[150,193],"users.":[151],"Experimental":[152],"results":[153],"show":[154],"that":[155],"accurate":[160],"efficient":[162],"when":[163,178],"objects":[165],"groups,":[168],"while":[169],"no":[170],"private":[171],"or":[172],"additional":[173],"information":[174],"leaked.":[176],"Moreover,":[177],"employing":[179],"more":[180],"nodes,":[182],"scalability;":[187],"thus,":[188],"it":[189],"suitable":[192],"IoT":[196],"data.":[198]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
