{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:00:33Z","timestamp":1760576433668,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_20","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:50Z","timestamp":1760555930000},"page":"318-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fully Homomorphic Encryption-Based KNN Classification Scheme for\u00a0Electric Vehicles Data"],"prefix":"10.1007","author":[{"given":"Zhicheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Teng","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Peijun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Nian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiuyue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Visaria, A.A., Jensen, A.F., Thorhauge, M., Mabit, S.E.: User preferences for EV charging, pricing schemes, and charging infrastructure. Transp. Res. Part A: Policy Pract. 165, 120\u2013143 (2022)","DOI":"10.1016\/j.tra.2022.08.013"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"107096","DOI":"10.1016\/j.tej.2022.107096","volume":"35","author":"HAU Khan","year":"2022","unstructured":"Khan, H.A.U., Price, S., Avraam, C., Dvorkin, Y.: Inequitable access to EV charging infrastructure. Electr. J. 35(3), 107096 (2022)","journal-title":"Electr. J."},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"112660","DOI":"10.1016\/j.enpol.2021.112660","volume":"160","author":"F Schulz","year":"2022","unstructured":"Schulz, F., Rode, J.: Public charging infrastructure and electric vehicles in Norway. Energy Policy 160, 112660 (2022)","journal-title":"Energy Policy"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Kaur, J., Jain, K., Maana, M.S., Singh, A.: A multi-feature analysis of electric vehicle performance using statistical techniques. In: 2025 IEEE International Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1\u20136 (2025)","DOI":"10.1109\/SCEECS64059.2025.10940985"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, J.: A real-time fault assessment method for electric vehicles based on EV-Pile interaction data. In: 2024 IEEE 2nd International Conference on Power Science and Technology (ICPST), pp. 1088\u20131093 (2024)","DOI":"10.1109\/ICPST61417.2024.10602203"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Harishitha,\u00a0S.V., Priyadharshini, S., Aswini, J.,\u00a0Dhivya, J., Iyar, V.: Data analysis on the comparison of IC vs EV vehicles. In: 2025 3rd International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), pp. 1\u20134 (2025)","DOI":"10.1109\/ICAECA63854.2025.11012171"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Kargupta, H., Datta, S.,\u00a0Wang, Q., Sivakumar, K.: Random-data perturbation techniques and privacy-preserving data mining. Knowl. Inf. Syst. 7, 387\u2013414 (2005)","DOI":"10.1007\/s10115-004-0173-6"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD \u201900, pp. 439\u2013450. Association for Computing Machinery, New York (2000)","DOI":"10.1145\/342009.335438"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., Clifton, C.: Privately computing a distributed K-NN classifier. In: Proceedings of the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, PKDD \u201904, pp. 279\u2013290. Springer-Verlag, Berlin (2004)","DOI":"10.1007\/978-3-540-30116-5_27"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Xiong, L., Chitti, S., Liu, L.: K nearest neighbor classification across multiple private databases. In: Proceedings of the 15th ACM International Conference on Information and Knowledge Management, CIKM \u201906, pp. 840\u2013841. Association for Computing Machinery, New York (2006)","DOI":"10.1145\/1183614.1183757"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Alotaibi, K., Rayward-Smith, V.J., Wang, W., de la Iglesia, B.: Non-linear dimensionality reduction for privacy-preserving data classification. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 694\u2013701 (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.76"},{"key":"20_CR12","unstructured":"Yao, B., Li, F., Xiao, X.: Secure nearest neighbor revisited. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 733\u2013744 (2013)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: 2014 IEEE 30th International Conference on Data Engineering, pp. 664\u2013675 (2014)","DOI":"10.1109\/ICDE.2014.6816690"},{"issue":"5","key":"20_CR14","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1109\/TKDE.2014.2364027","volume":"27","author":"BK Samanthula","year":"2015","unstructured":"Samanthula, B.K., Elmehdwi, Y., Jiang, W.: k-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1261\u20131273 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.1109\/TKDE.2016.2520473","volume":"28","author":"X Yi","year":"2016","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate K nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546\u20131559 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Sun, M., Yang, R.: An efficient secure K nearest neighbor classification protocol with high-dimensional features. Int. J. Intell. Syst. 35(11), 1791\u20131813 (2020)","DOI":"10.1002\/int.22272"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Hu, X., Tian, J., Xiang, J., Zhou, J., Li, H.: K-means clustering and KNN classification based on negative databases. Appl. Soft Comput. 110, 107732 (2021)","DOI":"10.1016\/j.asoc.2021.107732"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1109\/TIFS.2023.3337940","volume":"19","author":"Z Li","year":"2024","unstructured":"Li, Z., Wang, H., Zhang, S., Zhang, W., Rongxing, L.: SecKNN: FSS-based secure multi-party KNN classification under general distance functions. IEEE Trans. Inf. Forensics Secur. 19, 1326\u20131341 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Sundarapandi, G.P., Bokhary, S., Samanthula, B.K., Dong, B.: A probabilistic approach for secure and verifiable computation of KNN queries in cloud. In: 2023 IEEE Cloud Summit, pp. 15\u201320 (2023)","DOI":"10.1109\/CloudSummit57601.2023.00009"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Teng, Y., Liu, L., Qi, J., Pan, H., Fan, C.: VMR-Tree: efficient and verifiable location-based KNN queries on blockchain. In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 342\u2013351 (2023)","DOI":"10.1109\/TrustCom60117.2023.00064"},{"issue":"4","key":"20_CR21","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1109\/TDSC.2023.3291715","volume":"21","author":"Y Zheng","year":"2024","unstructured":"Zheng, Y., et al.: PHRkNN: efficient and privacy-preserving reverse KNN query over high-dimensional data in cloud. IEEE Trans. Dependable Secure Comput. 21(4), 1831\u20131844 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Peikert, C.: How (not) to instantiate Ring-LWE. In: Zikas, V., De\u00a0Prisco, R. (eds.) Security and Cryptography for Networks, pp. 411\u2013430. Springer International Publishing, Cham (2016)","DOI":"10.1007\/978-3-319-44618-9_22"},{"key":"20_CR23","unstructured":"Microsoft SEAL (release 4.1). Microsoft Research, Redmond, WA (2023). https:\/\/github.com\/Microsoft\/SEAL"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:18:57Z","timestamp":1760555937000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}