{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:15:31Z","timestamp":1742955331372,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030622220"},{"type":"electronic","value":"9783030622237"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62223-7_48","type":"book-chapter","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:03:00Z","timestamp":1605002580000},"page":"547-557","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Low Energy-Consuming Security Data Aggregation Protocol"],"prefix":"10.1007","author":[{"given":"Hui","family":"Dou","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yangyang","family":"Long","sequence":"additional","affiliation":[]},{"given":"Yuanchao","family":"Tu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,11]]},"reference":[{"issue":"4","key":"48_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/COMST.2006.283821","volume":"8","author":"R Rajagopalan","year":"2006","unstructured":"Rajagopalan, R., Varshney, P.: Data-aggregation techniques in sensor networks: a survey. IEEE Commun. Surv. Tutor. 8(4), 48\u201363 (2006)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"11","key":"48_CR2","first-page":"2636","volume":"31","author":"X Hu","year":"2010","unstructured":"Hu, X., Wei, Q., Hui, T.: Model and simulation of creditability-based data aggregation for the internet of things. Chinese J. Sci. Instr. 31(11), 2636\u20132640 (2010)","journal-title":"Chinese J. Sci. Instr."},{"issue":"1","key":"48_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/LCOMM.2007.061291","volume":"11","author":"GG Messier","year":"2007","unstructured":"Messier, G.G., Finvers, I.G.: Traffic models for medical wireless sensor networks. IEEE Commun. Lett. 11(1), 13\u201315 (2007)","journal-title":"IEEE Commun. Lett."},{"unstructured":"Mathur, A., Newe, T.: Comparison and overview of Wireless sensor network systems for Medical Applications. In: International Conference on Sensing Technology, pp. 272\u2013277 (2014)","key":"48_CR4"},{"doi-asserted-by":"crossref","unstructured":"Lawrence, E., Navarro, K.F., Hoang, D., Lim, Y.Y.: Data collection, correlation and dis-semination of medical sensor information in a WSN. In: Fifth International Conference on Networking and Services, pp. 402\u2013408. IEEE (2009)","key":"48_CR5","DOI":"10.1109\/ICNS.2009.25"},{"issue":"5","key":"48_CR6","doi-asserted-by":"publisher","first-page":"10350","DOI":"10.3390\/s150510350","volume":"15","author":"H Ghayvat","year":"2015","unstructured":"Ghayvat, H., Mukhopadhyay, S., Gui, X., Suryadevara, N.: WSN-and IOT-based smart homes and their extension to smart buildings. Sensors 15(5), 10350\u201310379 (2015)","journal-title":"Sensors"},{"unstructured":"Krishnamachari, L., Estrin, D., Wicker, S.: The impact of data aggregation in wireless sensor networks. In: 22nd International Conference on Distributed Computing Systems Workshops, pp. 575\u2013578. IEEE (2002)","key":"48_CR7"},{"unstructured":"Al-Karaki, J.N., Ul-Mustafa, R., Kamal, A.E.: Data aggregation in wireless sensor networks-exact and approximate algorithms. In: Workshop on High Performance Switching and Routing, pp. 241\u2013245. IEEE, HPSR (2004)","key":"48_CR8"},{"doi-asserted-by":"crossref","unstructured":"Nagesh, R., Raga, S., Mishra, S.: Elimination of redundant data to enhance wireless sensor network performance using Multi level data aggregation technique. In: 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20135. IEEE (2019)","key":"48_CR9","DOI":"10.1109\/ICCCNT45670.2019.8944647"},{"issue":"4","key":"48_CR10","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1007\/s11831-018-9267-2","volume":"26","author":"D Vinodha","year":"2019","unstructured":"Vinodha, D., Anita, E.M.: Secure data aggregation techniques for wireless sensor networks: a review. Arch. Comput. Methods Eng. 26(4), 1007\u20131027 (2019)","journal-title":"Arch. Comput. Methods Eng."},{"doi-asserted-by":"crossref","unstructured":"Madden, S., Franklin, M.J., Hellerstein, J.M, Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Oper. Syst. Rev. 36(SI), 131\u2013146 (2002)","key":"48_CR11","DOI":"10.1145\/844128.844142"},{"issue":"12","key":"48_CR12","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1016\/j.comnet.2009.02.023","volume":"53","author":"S Ozdemir","year":"2009","unstructured":"Ozdemir, S., Yang, X.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. 53(12), 2022\u20132037 (2009)","journal-title":"Comput. Netw."},{"unstructured":"Wenbo, H., Xue, L., Hoang, N., Klara, N., Tarek, A.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, Barcelona, Spain, pp. 2045\u20132053. IEEE Press (2007)","key":"48_CR13"},{"unstructured":"Laurent, E., Virgil, D.G.: A key-management scheme for distributed sensor networks. In: 9th ACM conference on Computer and Communications Security, Washington, MD, pp. 41\u201347. ACM Press (2002)","key":"48_CR14"},{"doi-asserted-by":"crossref","unstructured":"Zeng, W., Lin, Y., Wang, L.: Privacy-preserving data aggregation based on the p-function set in wireless sensor networks. In: 2010 10th IEEE International Conference on Computer and Information Technology, pp. 2831\u20132836. IEEE (2010)","key":"48_CR15","DOI":"10.1109\/CIT.2010.473"},{"doi-asserted-by":"crossref","unstructured":"Sen, J.: Secure and energy-efficient data aggregation in wireless sensor networks. In: 2012 2nd IEEE National Conference on Computational Intelligence and Signal Processing (CISP), pp. 23\u201326. IEEE (2012)","key":"48_CR16","DOI":"10.1109\/NCCISP.2012.6189671"},{"key":"48_CR17","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.ins.2019.12.007","volume":"514","author":"X Shen","year":"2020","unstructured":"Shen, X., Zhu, L., Xu, C.: A privacy-preserving data aggregation scheme for dynamic groups in fog computing. Inf. Sci. 514, 118\u2013130 (2020)","journal-title":"Inf. Sci."},{"issue":"3","key":"48_CR18","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1007\/s12083-019-00849-6","volume":"13","author":"P Hu","year":"2020","unstructured":"Hu, P., et al.: A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. Peer-to-Peer Netw. Appl. 13(3), 1002\u20131013 (2020). https:\/\/doi.org\/10.1007\/s12083-019-00849-6","journal-title":"Peer-to-Peer Netw. Appl."},{"unstructured":"Yasuda, S.: Verifiable privacy-preserving data aggregation protocols. IEICE Trans. Fund. Electron. Commun. Comput. Sci. 103(1), 183\u2013194 (2020)","key":"48_CR19"},{"issue":"3","key":"48_CR20","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","volume":"15","author":"YN Liu","year":"2019","unstructured":"Liu, Y.N.: A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Industr. Inf. 15(3), 1767\u20131774 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"doi-asserted-by":"crossref","unstructured":"Guo, Z.W., Ding, X.J.: Low energy-consuming cluster-based algorithm to enforce integrity and preserve privacy in data aggregation. In: 13th International Symposium on Distributed Computing and Applications to Business, pp. 152\u2013156 (2014)","key":"48_CR21","DOI":"10.1109\/DCABES.2014.32"},{"doi-asserted-by":"crossref","unstructured":"Li, P., Li, S.J., Yan, H.Y., Ke, L.S., Huang, T., Hassan, A.: A group identification protocol with leakage resilience of secret sharing scheme. Complexity, 1\u201313 (2020)","key":"48_CR22","DOI":"10.1155\/2020\/1784276"},{"unstructured":"Hassan, Saeed\u2010Ul., Waheed, H., Aljohani, N.R., Ali, M., Ventura, S., Herrera, F.: Virtual learning environment to predict withdrawal by leveraging deep learning. Int. J. Intell. Syst. 34(8), 1935\u20131952 (2019)","key":"48_CR23"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62223-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T10:20:23Z","timestamp":1605003623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62223-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030622220","9783030622237"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62223-7_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"360","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"118","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}