{"id":"https://openalex.org/W2970598121","doi":"https://doi.org/10.1109/tsc.2019.2937484","title":"Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization","display_name":"Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization","publication_year":2019,"publication_date":"2019-08-28","ids":{"openalex":"https://openalex.org/W2970598121","doi":"https://doi.org/10.1109/tsc.2019.2937484","mag":"2970598121"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2019.2937484","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2019.2937484","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]},{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["AU","CN"],"is_corresponding":true,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1632-5737","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000833104","display_name":"Zhenzhu Chen","orcid":"https://orcid.org/0000-0001-6094-5995"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenzhu Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-6094-5995","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008178136","display_name":"Yi Mu","orcid":"https://orcid.org/0000-0002-1637-845X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Mu","raw_affiliation_strings":["School of Mathematics and Informatics, Fujian Normal University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-1637-845X","affiliations":[{"raw_affiliation_string":"School of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-1562-5105","affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087052346","display_name":"Yinxia Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I152031979","display_name":"Nanjing Normal University","ror":"https://ror.org/036trcv74","country_code":"CN","type":"education","lineage":["https://openalex.org/I152031979"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinxia Sun","raw_affiliation_strings":["School of Computer Science and Technology, Nanjing Normal University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-6004-0985","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing Normal University, Nanjing, China","institution_ids":["https://openalex.org/I152031979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100600529","display_name":"Wu Jie","orcid":"https://orcid.org/0000-0002-3883-5818"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Wu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-3883-5818","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5048592388"],"corresponding_institution_ids":["https://openalex.org/I204824540","https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":4.34,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.95319927,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"15","issue":"1","first_page":"266","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.787743866443634},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7857178449630737},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.751333475112915},{"id":"https://openalex.org/keywords/matrix-decomposition","display_name":"Matrix decomposition","score":0.5629472136497498},{"id":"https://openalex.org/keywords/non-negative-matrix-factorization","display_name":"Non-negative matrix factorization","score":0.549584686756134},{"id":"https://openalex.org/keywords/factorization","display_name":"Factorization","score":0.468494713306427},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35721951723098755},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34949415922164917},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32821229100227356},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2063479721546173},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14508900046348572},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09274560213088989}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.787743866443634},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7857178449630737},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.751333475112915},{"id":"https://openalex.org/C42355184","wikidata":"https://www.wikidata.org/wiki/Q1361088","display_name":"Matrix decomposition","level":3,"score":0.5629472136497498},{"id":"https://openalex.org/C152671427","wikidata":"https://www.wikidata.org/wiki/Q10843505","display_name":"Non-negative matrix factorization","level":4,"score":0.549584686756134},{"id":"https://openalex.org/C187834632","wikidata":"https://www.wikidata.org/wiki/Q188804","display_name":"Factorization","level":2,"score":0.468494713306427},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35721951723098755},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34949415922164917},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32821229100227356},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2063479721546173},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14508900046348572},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09274560213088989},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C158693339","wikidata":"https://www.wikidata.org/wiki/Q190524","display_name":"Eigenvalues and eigenvectors","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsc.2019.2937484","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2019.2937484","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-5321","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/4312","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1802714444","display_name":null,"funder_award_id":"XYDXXJS-032","funder_id":"https://openalex.org/F4320326182","funder_display_name":"Six Talent Peaks Project in Jiangsu Province"},{"id":"https://openalex.org/G3807962687","display_name":null,"funder_award_id":"61572255","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5234939074","display_name":null,"funder_award_id":"61872087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G594611116","display_name":null,"funder_award_id":"61502237","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320324852","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760"},{"id":"https://openalex.org/F4320325211","display_name":"Nanjing Agricultural University","ror":"https://ror.org/05td3s095"},{"id":"https://openalex.org/F4320326182","display_name":"Six Talent Peaks Project in Jiangsu Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W875809763","https://openalex.org/W1500496335","https://openalex.org/W1544333246","https://openalex.org/W1601098769","https://openalex.org/W1630587103","https://openalex.org/W1902027874","https://openalex.org/W1975199330","https://openalex.org/W1980516015","https://openalex.org/W1981577150","https://openalex.org/W2011596851","https://openalex.org/W2040132274","https://openalex.org/W2076478806","https://openalex.org/W2093909024","https://openalex.org/W2103560185","https://openalex.org/W2104819583","https://openalex.org/W2110096996","https://openalex.org/W2124172487","https://openalex.org/W2132172731","https://openalex.org/W2135029798","https://openalex.org/W2136624667","https://openalex.org/W2144359569","https://openalex.org/W2145166073","https://openalex.org/W2147667726","https://openalex.org/W2150415460","https://openalex.org/W2153486647","https://openalex.org/W2170444562","https://openalex.org/W2308297356","https://openalex.org/W2409809914","https://openalex.org/W2611557754","https://openalex.org/W2763958004","https://openalex.org/W2781091734","https://openalex.org/W2793031414","https://openalex.org/W2808273161","https://openalex.org/W2883825586","https://openalex.org/W2885674165","https://openalex.org/W2886682270","https://openalex.org/W2908825189","https://openalex.org/W4210300416","https://openalex.org/W4244286987","https://openalex.org/W4297787516","https://openalex.org/W6640057573","https://openalex.org/W6680012447"],"related_works":["https://openalex.org/W2127243424","https://openalex.org/W4390394189","https://openalex.org/W2037504162","https://openalex.org/W2539013788","https://openalex.org/W2792706544","https://openalex.org/W1568451138","https://openalex.org/W2156699640","https://openalex.org/W2045265907","https://openalex.org/W2972997031","https://openalex.org/W34555840"],"abstract_inverted_index":{"It":[0,59],"is":[1,60,81,194],"inevitable":[2],"and":[3,143,183,190],"evident":[4],"that":[5,187],"outsourcing":[6,149],"complicated":[7],"intensive":[8],"tasks":[9],"to":[10,24,54,64,101,138,161,171],"public":[11,29,74],"cloud":[12,30,75],"vendors":[13,31],"would":[14],"be":[15,107],"the":[16,28,39,43,56,70,188],"primary":[17],"option":[18],"for":[19,85,133],"resource-constrained":[20],"clients":[21,173],"in":[22,95,174,197],"order":[23],"save":[25],"cost.":[26],"Unfortunately,":[27],"are":[32],"usually":[33],"untrusted.":[34],"They":[35],"may":[36],"inadvertently":[37],"leak":[38],"data":[40,87,97,163],"or":[41,49],"misuse":[42],"user\u2019s":[44,47],"data,":[45],"compromise":[46],"privacy":[48],"intentionally":[50],"corrupt":[51],"computational":[52,71],"results":[53,177],"make":[55],"system":[57],"unreliable.":[58],"therefore":[61],"important":[62],"how":[63],"stop":[65],"this":[66,122,126,198],"happening":[67],"whilst":[68],"embracing":[69],"power":[72],"of":[73,192],"vendors.":[76],"Non-negative":[77],"matrix":[78],"factorization":[79],"(NMF)":[80],"a":[82,129,168],"significant":[83],"method":[84],"conducting":[86],"dimension":[88],"reduction,":[89],"which":[90,136],"has":[91],"been":[92],"widely":[93],"used":[94],"large-scale":[96],"processing.":[98],"Nevertheless,":[99],"due":[100],"its":[102],"non-polynomial":[103],"hardness,":[104],"NMF":[105,134],"cannot":[106],"conducted":[108],"efficiently":[109],"using":[110],"local":[111],"computation":[112],"resources,":[113],"especially":[114],"when":[115],"dealing":[116],"with":[117,178],"big":[118],"data.":[119],"Motivated":[120],"by":[121,127,148],"issue,":[123],"we":[124],"address":[125],"presenting":[128],"novel":[130],"outsourced":[131],"scheme":[132],"(O-NMF),":[135],"aims":[137],"lessen":[139],"clients\u2019":[140],"computing":[141],"burden":[142],"tackle":[144],"secure":[145],"problems":[146],"faced":[147],"NMF.":[150],"Particularly,":[151],"based":[152],"on":[153],"two":[154],"non-collusion":[155],"servers,":[156],"O-NMF":[157,166,193],"exploits":[158],"Paillier":[159],"homomorphism":[160],"preserve":[162],"privacy.":[164],"Additionally,":[165],"allows":[167],"verification":[169],"mechanism":[170],"assist":[172],"verifying":[175],"returned":[176],"high":[179],"probability.":[180],"Security":[181],"analysis":[182],"experimental":[184],"evaluation":[185],"demonstrates":[186],"validity":[189],"practicality":[191],"also":[195],"provided":[196],"work.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":12}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2025-10-10T00:00:00"}
