{"id":"https://openalex.org/W4417438799","doi":"https://doi.org/10.1109/tnse.2025.3644926","title":"Privacy-Preserving K-Means Clustering for Vehicular Driving Behavior Analysis","display_name":"Privacy-Preserving K-Means Clustering for Vehicular Driving Behavior Analysis","publication_year":2025,"publication_date":"2025-12-17","ids":{"openalex":"https://openalex.org/W4417438799","doi":"https://doi.org/10.1109/tnse.2025.3644926"},"language":null,"primary_location":{"id":"doi:10.1109/tnse.2025.3644926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3644926","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101680031","display_name":"Yuan Chang","orcid":"https://orcid.org/0000-0002-7057-8452"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Chang","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101768334","display_name":"Yinuo Li","orcid":"https://orcid.org/0000-0003-1625-2715"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinuo Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040978564","display_name":"Tom H. Luan","orcid":"https://orcid.org/0000-0002-5215-7443"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tom H. Luan","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040806634","display_name":"Yuntao Wang","orcid":"https://orcid.org/0009-0002-9363-1575"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuntao Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036007592","display_name":"Jinkai Zheng","orcid":"https://orcid.org/0000-0002-7171-2668"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinkai Zheng","raw_affiliation_strings":["School of Electrical Engineering and Intelligentization, Dongguan University of Technology, Guangdong, China","School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Intelligentization, Dongguan University of Technology, Guangdong, China","institution_ids":["https://openalex.org/I2799850029"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101281023","display_name":"Su Zhou","orcid":"https://orcid.org/0000-0002-6518-3130"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Su","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101680031"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22611529,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"4930","last_page":"4945"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8434000015258789,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8434000015258789,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.05660000070929527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.03550000116229057,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.8039000034332275},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7975999712944031},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6198999881744385},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6021000146865845},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.4950000047683716},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43630000948905945},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.43309998512268066},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.42149999737739563},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.39649999141693115},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.3698999881744385}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82669997215271},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.8039000034332275},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7975999712944031},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6198999881744385},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6021000146865845},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.4950000047683716},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4388999938964844},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43630000948905945},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.43309998512268066},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.42149999737739563},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4138000011444092},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.39649999141693115},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3955000042915344},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.3698999881744385},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.3546000123023987},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.3301999866962433},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3276999890804291},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.32440000772476196},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3208000063896179},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3125},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3052999973297119},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.28760001063346863},{"id":"https://openalex.org/C2778974508","wikidata":"https://www.wikidata.org/wiki/Q2499178","display_name":"Cloud database","level":3,"score":0.2784999907016754},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.26510000228881836},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.2628999948501587},{"id":"https://openalex.org/C17212007","wikidata":"https://www.wikidata.org/wiki/Q5511111","display_name":"Fuzzy clustering","level":3,"score":0.26249998807907104},{"id":"https://openalex.org/C193143536","wikidata":"https://www.wikidata.org/wiki/Q5227360","display_name":"Data stream clustering","level":5,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3644926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3644926","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":70,"referenced_works":["https://openalex.org/W10211916","https://openalex.org/W66018615","https://openalex.org/W1568702141","https://openalex.org/W1837145606","https://openalex.org/W1966836595","https://openalex.org/W2031674781","https://openalex.org/W2132172731","https://openalex.org/W2140036537","https://openalex.org/W2548368809","https://openalex.org/W2582817594","https://openalex.org/W2582843861","https://openalex.org/W2761568138","https://openalex.org/W2792106796","https://openalex.org/W2896642734","https://openalex.org/W2935736869","https://openalex.org/W2969693276","https://openalex.org/W2996129147","https://openalex.org/W3004270304","https://openalex.org/W3009532126","https://openalex.org/W3022760157","https://openalex.org/W3033227554","https://openalex.org/W3044566172","https://openalex.org/W3092485457","https://openalex.org/W3154810849","https://openalex.org/W3155628839","https://openalex.org/W3183523595","https://openalex.org/W3194360255","https://openalex.org/W3201541548","https://openalex.org/W3204359140","https://openalex.org/W3206246976","https://openalex.org/W3217066153","https://openalex.org/W4213429267","https://openalex.org/W4214516815","https://openalex.org/W4285147105","https://openalex.org/W4285290083","https://openalex.org/W4293512762","https://openalex.org/W4312553126","https://openalex.org/W4312754566","https://openalex.org/W4312814001","https://openalex.org/W4312879360","https://openalex.org/W4313547781","https://openalex.org/W4381785576","https://openalex.org/W4387145983","https://openalex.org/W4387319234","https://openalex.org/W4387350571","https://openalex.org/W4389169868","https://openalex.org/W4392308942","https://openalex.org/W4392667176","https://openalex.org/W4395028297","https://openalex.org/W4400905266","https://openalex.org/W4402435475","https://openalex.org/W4403534272","https://openalex.org/W4405182551","https://openalex.org/W4405218860","https://openalex.org/W4405521134","https://openalex.org/W4406094205","https://openalex.org/W4407506718","https://openalex.org/W4407900317","https://openalex.org/W4408145506","https://openalex.org/W4408946361","https://openalex.org/W4409917141","https://openalex.org/W4409917787","https://openalex.org/W4410204204","https://openalex.org/W4410640244","https://openalex.org/W4411269984","https://openalex.org/W4411687852","https://openalex.org/W4412164074","https://openalex.org/W4413156345","https://openalex.org/W4413318867","https://openalex.org/W4413318887"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"development":[2],"of":[3,12,155,177],"intelligent":[4],"transportation":[5],"systems":[6],"has":[7],"led":[8],"to":[9,63,93],"the":[10,25,64,161,167,175,186,196],"generation":[11],"massive":[13],"vehicular":[14,113],"data":[15,146],"from":[16,35],"onboard":[17],"sensors,":[18],"GPS":[19],"devices,":[20],"and":[21,133,183,210],"driving":[22,51,114],"logs,":[23],"paving":[24],"way":[26],"for":[27,50,112],"advanced":[28],"driver":[29],"behavior":[30,52,115],"profiling.":[31],"To":[32,96],"extract":[33],"insights":[34],"such":[36],"data,":[37],"clustering":[38,49,109,170,204],"techniques,":[39],"particularly":[40],"k-means,":[41],"are":[42,61],"widely":[43],"employed.":[44],"However,":[45],"traditional":[46],"centralized":[47],"k-means":[48,71,108,169],"analysis":[53],"poses":[54],"potential":[55],"privacy":[56],"leakage,":[57],"as":[58],"raw":[59],"features":[60],"transmitted":[62],"cloud":[65,162],"server":[66,163],"in":[67],"plaintext.":[68],"Existing":[69],"privacy-preserving":[70,107],"schemes":[72],"either":[73],"rely":[74],"on":[75,195],"interactive":[76],"homomorphic":[77],"encryption":[78],"protocols,":[79],"which":[80,89,160],"incur":[81],"significant":[82],"communication":[83,209],"overhead,":[84],"or":[85,142],"adopt":[86],"differential":[87],"privacy,":[88],"reduces":[90],"accuracy":[91,205],"due":[92],"noise":[94],"injection.":[95],"address":[97],"these":[98],"challenges,":[99],"we":[100],"propose":[101],"<bold":[102],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[103],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">PPKC</b>,":[104],"a":[105,124,152],"non-interactive":[106],"framework":[110],"tailored":[111],"analysis.":[116],"PPKC":[117,201],"leverages":[118],"an":[119],"improved":[120],"Paillier":[121],"cryptosystem":[122],"with":[123,145,189,206],"three-":[125],"modulus":[126],"construction,":[127],"enabling":[128],"secure":[129],"Euclidean":[130],"distance":[131],"computation":[132,211],"cluster":[134],"center":[135],"updates":[136],"directly":[137],"over":[138],"ciphertexts":[139],"without":[140],"decryption":[141],"repeated":[143],"interaction":[144],"owners.":[147],"Each":[148],"vehicle":[149],"only":[150],"uploads":[151],"single":[153],"round":[154],"encrypted":[156],"feature":[157],"vectors,":[158],"after":[159],"can":[164],"independently":[165],"execute":[166],"complete":[168],"process.":[171],"We":[172],"rigorously":[173],"analyze":[174],"security":[176,182],"PPKC,":[178],"proving":[179],"its":[180],"semantic":[181],"indistinguishability":[184],"under":[185],"IND-CCA":[187],"assumption":[188],"unforgeable":[190],"digital":[191],"signatures.":[192],"Extensive":[193],"experiments":[194],"highD":[197],"dataset":[198],"demonstrate":[199],"that":[200],"achieves":[202],"high":[203],"significantly":[207],"lower":[208],"overhead":[212],"than":[213],"existing":[214],"protocols.":[215]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-17T00:00:00"}
