{"id":"https://openalex.org/W7131078234","doi":"https://doi.org/10.1186/s42400-026-00554-x","title":"Privacy-preserving and efficient outsourcing computation scheme for principal component analysis","display_name":"Privacy-preserving and efficient outsourcing computation scheme for principal component analysis","publication_year":2026,"publication_date":"2026-02-23","ids":{"openalex":"https://openalex.org/W7131078234","doi":"https://doi.org/10.1186/s42400-026-00554-x"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-026-00554-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00554-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00554-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00554-x.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126621766","display_name":"Yan Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I154341788","display_name":"Tangshan College","ror":"https://ror.org/00rfn0469","country_code":"CN","type":"education","lineage":["https://openalex.org/I154341788"]},{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]},{"id":"https://openalex.org/I4210115299","display_name":"TED University","ror":"https://ror.org/0285rh439","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210115299"]}],"countries":["CN","TR"],"is_corresponding":false,"raw_author_name":"Yan Ding","raw_affiliation_strings":["Beijing key laboratory of security and privacy in intelligent transportation, Beijing Jiaotong University, Beijing, 100044, China","School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, 100044, China","Tangshan Research Institute of Beijing Jiaotong University, Tangshan, Hebei, 063000, China"],"affiliations":[{"raw_affiliation_string":"Beijing key laboratory of security and privacy in intelligent transportation, Beijing Jiaotong University, Beijing, 100044, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, 100044, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Tangshan Research Institute of Beijing Jiaotong University, Tangshan, Hebei, 063000, China","institution_ids":["https://openalex.org/I154341788","https://openalex.org/I4210115299"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126617199","display_name":"Ye Du","orcid":null},"institutions":[{"id":"https://openalex.org/I154341788","display_name":"Tangshan College","ror":"https://ror.org/00rfn0469","country_code":"CN","type":"education","lineage":["https://openalex.org/I154341788"]},{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]},{"id":"https://openalex.org/I4210115299","display_name":"TED University","ror":"https://ror.org/0285rh439","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210115299"]}],"countries":["CN","TR"],"is_corresponding":true,"raw_author_name":"Ye Du","raw_affiliation_strings":["Beijing key laboratory of security and privacy in intelligent transportation, Beijing Jiaotong University, Beijing, 100044, China","School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, 100044, China","Tangshan Research Institute of Beijing Jiaotong University, Tangshan, Hebei, 063000, China"],"affiliations":[{"raw_affiliation_string":"Beijing key laboratory of security and privacy in intelligent transportation, Beijing Jiaotong University, Beijing, 100044, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, 100044, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Tangshan Research Institute of Beijing Jiaotong University, Tangshan, Hebei, 063000, China","institution_ids":["https://openalex.org/I154341788","https://openalex.org/I4210115299"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5126617199"],"corresponding_institution_ids":["https://openalex.org/I154341788","https://openalex.org/I21193070","https://openalex.org/I4210115299"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4319795,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.36660000681877136,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.36660000681877136,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.2126999944448471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.09480000287294388,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.8571000099182129},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7368000149726868},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5339000225067139},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4837000072002411},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4772000014781952},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47510001063346863},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.40230000019073486},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.3781999945640564},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.36340001225471497}],"concepts":[{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.8571000099182129},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7547000050544739},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7368000149726868},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.534500002861023},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5339000225067139},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4837000072002411},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4772000014781952},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47510001063346863},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.40230000019073486},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.3781999945640564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.376800000667572},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.36340001225471497},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.3617999851703644},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.35100001096725464},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.335999995470047},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3346000015735626},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.32269999384880066},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C138827492","wikidata":"https://www.wikidata.org/wiki/Q6661985","display_name":"Data processing","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2639000117778778},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.26030001044273376},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-026-00554-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00554-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00554-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:543309066a4d415e8e1f23dddb45bfdd","is_oa":true,"landing_page_url":"https://doaj.org/article/543309066a4d415e8e1f23dddb45bfdd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-026-00554-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00554-x","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00554-x.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.41008031368255615}],"awards":[{"id":"https://openalex.org/G1430554724","display_name":null,"funder_award_id":"2024JBZX018","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2497960124","display_name":null,"funder_award_id":"2024JBZX018","funder_id":"https://openalex.org/F4320335880","funder_display_name":"Fundamental Research Funds for Central Universities of the Central South University"}],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320335880","display_name":"Fundamental Research Funds for Central Universities of the Central South University","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7131078234.pdf","grobid_xml":"https://content.openalex.org/works/W7131078234.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1484276943","https://openalex.org/W1557386445","https://openalex.org/W1997690112","https://openalex.org/W2030818161","https://openalex.org/W2041519450","https://openalex.org/W2071128523","https://openalex.org/W2096900708","https://openalex.org/W2294798173","https://openalex.org/W2308297356","https://openalex.org/W2594048902","https://openalex.org/W2771366055","https://openalex.org/W2775015656","https://openalex.org/W2788930986","https://openalex.org/W2800679800","https://openalex.org/W2887843685","https://openalex.org/W2981264804","https://openalex.org/W3186458945","https://openalex.org/W4295362399","https://openalex.org/W4320002891","https://openalex.org/W4361019706","https://openalex.org/W4362591432","https://openalex.org/W4385080612","https://openalex.org/W4387212335","https://openalex.org/W4390518052","https://openalex.org/W4400679085","https://openalex.org/W4400877448","https://openalex.org/W4401247362","https://openalex.org/W4404914824","https://openalex.org/W4406047251"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Currently,":[1],"the":[2,12,24,82,127,141,145,151,158,167,170,173,177,180,184,204,207],"rapid":[3],"development":[4],"of":[5,7,16,129,169,179,206,212],"Internet":[6],"Things":[8],"(IoT)":[9],"technology":[10],"and":[11,55,84,117,132,176,199,217],"deepening":[13],"digital":[14],"transformation":[15,116],"traditional":[17],"industries":[18],"have":[19,90],"driven":[20],"substantial":[21],"growth":[22],"in":[23,49,210,228],"Machine":[25],"Learning":[26],"as":[27,42,52],"a":[28,43,66,105,162,188,221],"Service":[29],"(MLaaS)":[30],"market":[31],"to":[32,74,78,96,125,153],"meet":[33],"massive":[34],"data":[35,88,171],"processing":[36,54],"demands.":[37],"Principal":[38],"Component":[39],"Analysis":[40],"(PCA),":[41],"widely":[44],"used":[45],"dimensionality":[46],"reduction":[47],"algorithm":[48],"fields":[50],"such":[51],"image":[53],"finance,":[56],"involves":[57],"multiple":[58],"matrix":[59,115],"operations":[60],"with":[61,69,161],"high":[62],"computational":[63,142,215],"complexity.":[64],"As":[65],"result,":[67],"clients":[68],"low-capability":[70],"devices":[71],"often":[72],"choose":[73],"outsource":[75],"these":[76],"computations":[77],"cloud":[79,159],"servers.":[80],"However,":[81],"privacy":[83,128,213],"security":[85,168,197],"issues":[86],"during":[87,172],"outsourcing":[89,107,174,226],"become":[91],"critical":[92],"challenges":[93],"that":[94],"need":[95],"be":[97],"addressed":[98],"urgently.":[99],"In":[100],"this":[101],"paper,":[102],"we":[103,202],"propose":[104],"secure":[106,225],"computation":[108,181],"scheme":[109,136,186,209],"for":[110,224],"PCA":[111],"based":[112],"on":[113,144],"Householder":[114],"Double":[118],"Random":[119],"Perturbation":[120],"Encryption":[121],"(DRPE)":[122],"techniques,":[123],"aiming":[124],"protect":[126],"user":[130],"inputs":[131],"outputs.":[133],"The":[134],"proposed":[135,185,208],"not":[137],"only":[138],"significantly":[139],"reduces":[140],"complexity":[143],"client":[146,152],"side":[147],"but":[148],"also":[149],"enables":[150],"detect":[154],"malicious":[155],"behaviors":[156],"from":[157],"server":[160],"non-negligible":[163],"probability,":[164],"thereby":[165],"enhancing":[166],"process":[175],"reliability":[178],"results.":[182],"Furthermore,":[183],"adopts":[187],"non-interactive":[189],"design,":[190],"effectively":[191],"reducing":[192],"communication":[193],"overhead.":[194],"Through":[195],"comprehensive":[196],"analysis":[198],"performance":[200],"evaluation,":[201],"demonstrate":[203],"superiority":[205],"terms":[211],"protection,":[214],"efficiency,":[216],"verification":[218],"capability,":[219],"providing":[220],"novel":[222],"solution":[223],"computing":[227],"IoT":[229],"environments.":[230]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-02-24T00:00:00"}
