{"id":"https://openalex.org/W4286306207","doi":"https://doi.org/10.23919/ascc56756.2022.9828260","title":"Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi","display_name":"Experimental Validation of Encrypted Quadratic Optimization Implemented on Raspberry Pi","publication_year":2022,"publication_date":"2022-05-04","ids":{"openalex":"https://openalex.org/W4286306207","doi":"https://doi.org/10.23919/ascc56756.2022.9828260"},"language":"en","primary_location":{"id":"doi:10.23919/ascc56756.2022.9828260","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ascc56756.2022.9828260","pdf_url":null,"source":{"id":"https://openalex.org/S4363607827","display_name":"2022 13th Asian Control Conference (ASCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 13th Asian Control Conference (ASCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052737234","display_name":"Ze Yang","orcid":"https://orcid.org/0000-0001-7737-5909"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ze Yang","raw_affiliation_strings":["Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology,Guiyang,China,550025"],"affiliations":[{"raw_affiliation_string":"Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology,Guiyang,China,550025","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035143434","display_name":"Zhenyong Zhang","orcid":"https://orcid.org/0000-0003-0950-1525"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyong Zhang","raw_affiliation_strings":["Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology,Guiyang,China,550025"],"affiliations":[{"raw_affiliation_string":"Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology,Guiyang,China,550025","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology,Guiyang,China,550025"],"affiliations":[{"raw_affiliation_string":"Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology,Guiyang,China,550025","institution_ids":["https://openalex.org/I178232147"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052737234"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":null,"apc_paid":null,"fwci":0.2078,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.39490412,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2018","last_page":"2023"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7950180768966675},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7377386689186096},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6619399189949036},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.608170747756958},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5903161764144897},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5583051443099976},{"id":"https://openalex.org/keywords/laptop","display_name":"Laptop","score":0.5568622946739197},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.47718346118927},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.46772515773773193},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.45715922117233276},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4134579598903656},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3349827826023102},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2008189857006073},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1746390461921692},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1356392204761505},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12561896443367004}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7950180768966675},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7377386689186096},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6619399189949036},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.608170747756958},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5903161764144897},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5583051443099976},{"id":"https://openalex.org/C2780008327","wikidata":"https://www.wikidata.org/wiki/Q3962","display_name":"Laptop","level":2,"score":0.5568622946739197},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.47718346118927},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.46772515773773193},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.45715922117233276},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4134579598903656},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3349827826023102},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2008189857006073},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1746390461921692},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1356392204761505},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12561896443367004},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/ascc56756.2022.9828260","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ascc56756.2022.9828260","pdf_url":null,"source":{"id":"https://openalex.org/S4363607827","display_name":"2022 13th Asian Control Conference (ASCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 13th Asian Control Conference (ASCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321927","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2076478806","https://openalex.org/W2109426455","https://openalex.org/W2145166073","https://openalex.org/W2534838589","https://openalex.org/W2570972465","https://openalex.org/W2578989164","https://openalex.org/W2782729493","https://openalex.org/W2793031414","https://openalex.org/W2798332289","https://openalex.org/W2932329902","https://openalex.org/W2997663905","https://openalex.org/W3015253035","https://openalex.org/W3040353046","https://openalex.org/W3087878582","https://openalex.org/W3161641506","https://openalex.org/W3168833844","https://openalex.org/W3172438887","https://openalex.org/W3211814639","https://openalex.org/W4285080523"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W2141019415","https://openalex.org/W2126560026","https://openalex.org/W4205636420"],"abstract_inverted_index":{"Cloud-based":[0],"outsourcing":[1,78],"framework":[2,58,80,94,113],"provides":[3],"an":[4],"effective":[5],"and":[6,47,81,89,104],"superior":[7],"means":[8],"of":[9,91],"information":[10,120],"processing":[11],"in":[12,28,43,75],"solving":[13,29],"quadratic":[14,31,62],"optimization":[15,32,63],"problems":[16,42,64],"with":[17,65,130],"linear":[18],"constraints":[19],"involving":[20],"multiple":[21],"agents.":[22],"However,":[23],"since":[24],"the":[25,30,44,71,76,82,92,101,111,118,125,128],"data":[26,45],"involved":[27],"problem":[33,74],"might":[34],"be":[35],"privacy-sensitive,":[36],"there":[37],"are":[38,85,95],"different":[39],"privacy":[40,72],"leakage":[41,73],"collection":[46],"calculation":[48,126],"stages.":[49],"In":[50],"this":[51],"study,":[52],"we":[53,69],"propose":[54],"a":[55],"general":[56],"cryptographic":[57,93,112],"for":[59],"securely":[60],"computing":[61,79,132],"sensitive":[66],"data.":[67],"Simultaneously,":[68],"analyze":[70],"cloud-based":[77],"corresponding":[83],"solutions":[84],"given.":[86],"The":[87,106],"correctness":[88],"efficiency":[90],"evaluated":[96],"by":[97],"conducting":[98],"experiments":[99],"on":[100,127],"Raspberry":[102],"Pi":[103],"laptop.":[105],"experimental":[107],"results":[108],"validate":[109],"that":[110],"not":[114],"only":[115],"effectively":[116],"protects":[117],"privacy-sensitive":[119],"but":[121],"also":[122],"can":[123],"complete":[124],"device":[129],"limited":[131],"resources.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
