{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:45Z","timestamp":1748751045825,"version":"3.41.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271187"},{"type":"electronic","value":"9783319271194"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27119-4_49","type":"book-chapter","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T04:39:29Z","timestamp":1447648769000},"page":"702-715","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Privacy-Preserving Compressive Data Gathering Scheme in WSNs"],"prefix":"10.1007","author":[{"given":"Kun","family":"Xie","sequence":"first","affiliation":[]},{"given":"Xueping","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jigang","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Xiaoxiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shiming","family":"He","sequence":"additional","affiliation":[]},{"given":"Daqiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,16]]},"reference":[{"issue":"3","key":"49_CR1","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.jpdc.2006.10.003","volume":"67","author":"K Xing","year":"2007","unstructured":"Xing, K., Cheng, X., Liu, F.: Location-centric storage for safety warning based on roadway sensor networks. J. Parallel Distrib. Comput. 67(3), 336\u2013345 (2007)","journal-title":"J. Parallel Distrib. Comput."},{"doi-asserted-by":"crossref","unstructured":"Xie, K., Wang, L., Wang, X.: Learning from the past: intelligent on-line weather monitoring based on matrix completion. In: ICDCS, pp. 176\u2013185. IEEE (2014)","key":"49_CR2","DOI":"10.1109\/ICDCS.2014.26"},{"doi-asserted-by":"crossref","unstructured":"Liu, F., Cheng, X., Chen, D.: Insider attacker detection inwireless sensor networks. In: Infocom, pp. 1937\u20131945 (2007)","key":"49_CR3","DOI":"10.1109\/INFCOM.2007.225"},{"issue":"8","key":"49_CR4","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TKDE.2007.1067","volume":"19","author":"W Wu","year":"2006","unstructured":"Wu, W., Cheng, X., Ding, M.: Localized outlying and boundary data detection in sensor networks. Knowl. Data Eng. 19(8), 1145\u20131157 (2006)","journal-title":"Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Ding, M., Cheng, X.: Robust event boundary detection in sensor networks - a mixture model based approach. In: INFOCOM 2009, pp. 2991\u20132995. IEEE (2009)","key":"49_CR5","DOI":"10.1109\/INFCOM.2009.5062273"},{"doi-asserted-by":"crossref","unstructured":"Zhang, B., Cheng, X., Zhang, N.: Sparse target counting and localization in sensor networks based on compressive sensing. In: INFOCOM, pp. 2255\u20132263 (2011)","key":"49_CR6","DOI":"10.1109\/INFCOM.2011.5935041"},{"issue":"5","key":"49_CR7","first-page":"226","volume":"131","author":"D Wu","year":"2012","unstructured":"Wu, D., Chen, D., Xing, K.: A statistical approach for target counting in sensor-based surveillance systems. INFOCOM 131(5), 226\u2013234 (2012)","journal-title":"INFOCOM"},{"doi-asserted-by":"crossref","unstructured":"Cheng, X., Chen, D., Cheng, W.: A monte carlo method for mobile target counting. In: ICDCS, pp. 750\u2013759 (2011)","key":"49_CR8","DOI":"10.1109\/ICDCS.2011.90"},{"issue":"99","key":"49_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2015.2466696","volume":"PP","author":"X Tian","year":"2015","unstructured":"Tian, X., Zhu, Y.H., Zhang, D.: Reliable and energy-efficient data forwarding in industrial wireless sensor networks. IEEE Syst,J. PP(99), 1\u201311 (2015)","journal-title":"IEEE Syst,.J."},{"doi-asserted-by":"crossref","unstructured":"Xie, K., Luo, W., Wang, X.: Road condition gathering with vehicular dtn. In: INFOCOM WKSHPS, pp. 576\u2013581. IEEE (2015)","key":"49_CR10","DOI":"10.1109\/INFCOMW.2015.7179447"},{"issue":"6","key":"49_CR11","first-page":"2754","volume":"12","author":"Y Tang","year":"2013","unstructured":"Tang, Y., Zhang, B., Jing, T.: Robust compressive data gathering in wireless sensor networks. Wireless Commun. 12(6), 2754\u20132761 (2013)","journal-title":"Wireless Commun."},{"doi-asserted-by":"crossref","unstructured":"Li, Y., Xie, K., Wang, X.: Pushing towards the limit of sampling rate: adaptive chasing sampling. In: MASS (2015)","key":"49_CR12","DOI":"10.1109\/MASS.2015.30"},{"issue":"4","key":"49_CR13","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"D Dl","year":"2006","unstructured":"Dl, D.: Compressed sensing. IEEE Trans. Inform. Theor. 52(4), 1289\u20131306 (2006)","journal-title":"IEEE Trans. Inform. Theor."},{"doi-asserted-by":"crossref","unstructured":"Luo, C., Wu, F., Sun, J.: Compressive data gathering for large-scale wireless sensor networks. In: Mobile computing and networking, pp. 145\u2013156. ACM (2009)","key":"49_CR14","DOI":"10.1145\/1614320.1614337"},{"doi-asserted-by":"crossref","unstructured":"Xiang, L., Luo, J., Vasilakos, A.: Compressed data aggregation for energy efficient wireless sensor networks. In: SECON, pp. 46\u201354 (2011)","key":"49_CR15","DOI":"10.1109\/SAHCN.2011.5984932"},{"issue":"6","key":"49_CR16","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1109\/TNET.2012.2229716","volume":"21","author":"L Xiang","year":"2013","unstructured":"Xiang, L., Luo, J., Rosenberg, C.: Compressed data aggregation: energy-efficient and high-fidelity data collection. Networking 21(6), 1722\u20131735 (2013)","journal-title":"Networking"},{"doi-asserted-by":"crossref","unstructured":"Zhao, C., Zhang, W., Yang, X.: A novel compressive sensing based data aggregation scheme for wireless sensor networks. In: ICC, pp. 18\u201323 (2014)","key":"49_CR17","DOI":"10.1109\/ICC.2014.6883288"},{"issue":"1","key":"49_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/LCOMM.2013.111513.131818","volume":"18","author":"M Kaneko","year":"2014","unstructured":"Kaneko, M., Agha, A.K.: Compressed sensing based protocol for interfering data recovery in multi-hop sensor networks. Commun. Lett. 18(1), 42\u201345 (2014)","journal-title":"Commun. Lett."},{"doi-asserted-by":"crossref","unstructured":"Hu, P., Xing, K., Cheng, X.: Information leaks out: attacks and countermeasures on compressive data gathering in wireless sensor networks. In: 2014 Proceedings IEEE INFOCOM, pp. 1258\u20131266 (2014)","key":"49_CR19","DOI":"10.1109\/INFOCOM.2014.6848058"},{"unstructured":"Benaloh, J.: Dense probabilistic encryption. In: Proceedings of the Workshop on Selected Areas of Cryptography (1994)","key":"49_CR20"},{"key":"49_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"issue":"1","key":"49_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1137\/S003614450037906X","volume":"43","author":"SS Chen","year":"2001","unstructured":"Chen, S.S., Donoho, D.L.: Atomic decomposition by basis pursuit. SIAM Rev. 43(1), 33\u201361 (2001)","journal-title":"SIAM Rev."},{"issue":"8","key":"49_CR23","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1002\/cpa.20124","volume":"59","author":"E Candes","year":"2006","unstructured":"Candes, E., Romberg, J., Tao, T.: Stable signal recovery from incomplete and inaccurate measurements. Commun. Pure Appl. Math. 59(8), 1207\u20131223 (2006)","journal-title":"Commun. Pure Appl. Math."},{"doi-asserted-by":"crossref","unstructured":"Iwen, M.A.: Simple deterministically constructible rip matrices with sublinear fourier sampling requirements. In: CISS, pp. 870\u2013875 (2009)","key":"49_CR24","DOI":"10.1109\/CISS.2009.5054839"},{"issue":"4","key":"49_CR25","first-page":"435","volume":"34","author":"J Emmanuel","year":"2004","unstructured":"Emmanuel, J., Cands, T.T.: Decoding by linear programming. IEEE Trans. Inf. Theory 34(4), 435\u2013443 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"49_CR26","doi-asserted-by":"publisher","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies. Inf. Theory 52(12), 5406\u20135425 (2006)","journal-title":"Inf. Theory"},{"issue":"12","key":"49_CR27","doi-asserted-by":"publisher","first-page":"4203","DOI":"10.1109\/TIT.2005.858979","volume":"51","author":"EJ Candes","year":"2005","unstructured":"Candes, E.J., Tao, T.: Decoding by linear programming. Inf. Theory 51(12), 4203\u20134215 (2005)","journal-title":"Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Bajwa, W., Haupt, J., Sayeed, A.: Compressive wireless sensing. In: IPSN, pp. 134\u2013142 (2006)","key":"49_CR28","DOI":"10.1145\/1127777.1127801"},{"doi-asserted-by":"crossref","unstructured":"Charbiwala, Z., Chakraborty, S., Zahedi, S.: Compressive oversampling for robust data transmission in sensor networks. In: INFOCOM, pp. 1\u20139 (2010)","key":"49_CR29","DOI":"10.1109\/INFCOM.2010.5461926"},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Tang, S., Yin, B.: Data gathering in wireless sensor networks through intelligent compressive sensing. In: INFOCOM, pp. 603\u2013611 (2012)","key":"49_CR30","DOI":"10.1109\/INFCOM.2012.6195803"},{"issue":"1","key":"49_CR31","first-page":"105","volume":"2","author":"Y Challal","year":"2005","unstructured":"Challal, Y., Seba, H.: Group key management protocols: a novel taxonomy. Int. J. Inf. Technol. 2(1), 105\u2013118 (2005)","journal-title":"Int. J. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Lin, X., Lu, R., Zhu, H.: Asrpake: an anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks. In: Communications, pp. 1247\u20131253 (2007)","key":"49_CR32","DOI":"10.1109\/ICC.2007.211"},{"issue":"12","key":"49_CR33","doi-asserted-by":"publisher","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","volume":"53","author":"A Joel","year":"2007","unstructured":"Joel, A., Tropp, A.C.G.: Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inform. Theory 53(12), 4655\u20134666 (2007)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"49_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","volume-title":"Designing Privacy Enhancing Technologies","author":"J-F Raymond","year":"2001","unstructured":"Raymond, J.-F.: Traffic analysis: protocols, attacks, design issues, and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10\u201329. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27119-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T11:59:32Z","timestamp":1748692772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27119-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271187","9783319271194"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27119-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}