{"id":"https://openalex.org/W3197742284","doi":"https://doi.org/10.1109/tii.2021.3110808","title":"A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs","display_name":"A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs","publication_year":2021,"publication_date":"2021-09-08","ids":{"openalex":"https://openalex.org/W3197742284","doi":"https://doi.org/10.1109/tii.2021.3110808","mag":"3197742284"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3110808","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3110808","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100335132","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiong Li","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004010435","display_name":"Jiabei He","orcid":"https://orcid.org/0000-0003-1296-3675"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiabei He","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028044712","display_name":"Pandi Vijayakumar","orcid":"https://orcid.org/0000-0001-5451-8946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pandi Vijayakumar","raw_affiliation_strings":["Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064078720","display_name":"Victor Chang","orcid":"https://orcid.org/0000-0002-8012-5852"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Victor Chang","raw_affiliation_strings":["School of Computing and Digital Technologies, Teesside University, Middlesbrough, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Digital Technologies, Teesside University, Middlesbrough, U.K","institution_ids":["https://openalex.org/I874055015"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100335132"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":6.9981,"has_fulltext":false,"cited_by_count":56,"citation_normalized_percentile":{"value":0.97466572,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"18","issue":"8","first_page":"5494","last_page":"5503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8136860132217407},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.809799313545227},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7405184507369995},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6845031976699829},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6367268562316895},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48398256301879883},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4809957444667816},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4647466540336609},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4206623435020447},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4092205762863159},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.33295485377311707},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3307981491088867},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3263104557991028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23478680849075317},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16365522146224976}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8136860132217407},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.809799313545227},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7405184507369995},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6845031976699829},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6367268562316895},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48398256301879883},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4809957444667816},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4647466540336609},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4206623435020447},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4092205762863159},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33295485377311707},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3307981491088867},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3263104557991028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23478680849075317},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16365522146224976},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2021.3110808","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3110808","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:openaire/c73d019c-bdf6-4c80-9a15-a03b3cf7a28e","is_oa":false,"landing_page_url":"https://research.tees.ac.uk/en/publications/c73d019c-bdf6-4c80-9a15-a03b3cf7a28e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Li, X, He, J, Vijayakumar, P, Zhang, X & Chang, V 2021, 'A Verifiable Privacy-preserving Machine Learning Prediction Scheme for Edge-enhanced HCPSs', IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2021.3110808","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1525844701","display_name":null,"funder_award_id":"62072078","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1490994218","https://openalex.org/W1529862094","https://openalex.org/W1798609567","https://openalex.org/W2132172731","https://openalex.org/W2492294785","https://openalex.org/W2597998853","https://openalex.org/W2701059868","https://openalex.org/W2736194861","https://openalex.org/W2752243939","https://openalex.org/W2765200655","https://openalex.org/W2767079719","https://openalex.org/W2787473289","https://openalex.org/W2803199352","https://openalex.org/W2883753518","https://openalex.org/W2884294766","https://openalex.org/W2901023550","https://openalex.org/W2907842073","https://openalex.org/W2943983563","https://openalex.org/W2963015168","https://openalex.org/W2970606380","https://openalex.org/W2981915020","https://openalex.org/W2984242138","https://openalex.org/W3008569902","https://openalex.org/W3021238006","https://openalex.org/W3097272009"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2139109546","https://openalex.org/W2128900334"],"abstract_inverted_index":{"As":[0],"a":[1,54,77],"highly":[2],"integrated":[3],"industrial":[4],"system,":[5],"human":[6],"cyber-physical":[7],"systems":[8],"(HCPSs)":[9],"provide":[10],"accurate":[11],"and":[12,36,107,141],"high-quality":[13],"services":[14],"for":[15,28,61,71],"Industry":[16],"5.0.":[17],"In":[18,42],"HCPSs,":[19,64],"machine":[20,57],"learning":[21,58],"(ML)":[22],"prediction":[23,26,59,69,80,108],"provides":[24],"reliable":[25],"results":[27,70,81,112],"users":[29,72],"based":[30,45],"on":[31,46,154],"matured":[32],"models,":[33],"while":[34],"security":[35],"privacy":[37,74,102],"protection":[38],"are":[39],"considerable":[40],"issues.":[41],"this":[43],"article,":[44],"the":[47,62,67,90,101,115,121,125,137,145,155],"modified":[48],"Okamoto\u2013Uchiyama":[49],"homomorphic":[50],"encryption,":[51],"we":[52],"propose":[53],"verifiable":[55,68],"privacy-preserving":[56],"scheme":[60,99,135],"edge-enhanced":[63],"which":[65,88],"outputs":[66],"without":[73],"leakage.":[75],"Specifically,":[76],"batch":[78,142],"of":[79,92,103,124],"can":[82],"be":[83],"verified":[84],"at":[85],"one":[86],"time,":[87],"improves":[89],"efficiency":[91],"verification.":[93],"Security":[94],"analysis":[95],"shows":[96,136],"that":[97,114],"our":[98,134],"protects":[100],"inputs,":[104],"ML":[105],"model,":[106],"results.":[109],"The":[110],"experiment":[111],"demonstrate":[113],"edge":[116],"computing":[117],"architecture":[118],"remarkably":[119],"alleviates":[120],"computational":[122],"burden":[123],"cloud":[126],"server.":[127],"Furthermore,":[128],"compared":[129,150],"with":[130,151],"other":[131],"related":[132],"schemes,":[133],"best":[138],"execution":[139],"efficiency,":[140],"verification":[143,153],"optimizes":[144],"performance":[146],"by":[147],"about":[148],"15%":[149],"single":[152],"same":[156],"scale.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":15}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
