{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T08:05:01Z","timestamp":1770710701158,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T00:00:00Z","timestamp":1752105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T00:00:00Z","timestamp":1752105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11432-024-4269-5","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T00:53:42Z","timestamp":1752454422000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure data transmission and classification for digital twin"],"prefix":"10.1007","volume":"68","author":[{"given":"Weizheng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dequan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhusen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qipeng","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]},{"given":"Changgen","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"4269_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.001.2001237","volume":"59","author":"M Groshev","year":"2021","unstructured":"Groshev M, Guimar\u00e3es C, Mart\u00edn-P\u00e9rez J, et al. Toward intelligent cyber-physical systems: digital twin meets artificial intelligence. IEEE Commun Mag, 2021, 59: 14\u201320","journal-title":"IEEE Commun Mag"},{"key":"4269_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.001.21143","volume":"60","author":"L U Khan","year":"2022","unstructured":"Khan L U, Saad W, Niyato D, et al. Digital-twin-enabled 6G: vision, architectural trends, and future directions. IEEE Commun Mag, 2022, 60: 74\u201380","journal-title":"IEEE Commun Mag"},{"key":"4269_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/10_2020_138","volume-title":"Digital Twins","author":"R Portela","year":"2020","unstructured":"Portela R, Varsakelis C, Richelle A, et al. When is an in silico representation a digital twin? A biopharmaceutical industry approach to the digital twin concept. In: Digital Twins. Berlin: Springer, 2020. 35\u201355"},{"key":"4269_CR4","volume-title":"Proceedings the 53rd AIAA\/ASME\/ASCE\/AHS\/ASC Structures, Structural Dynamics and Materials Conference","author":"E Glaessgen","year":"2012","unstructured":"Glaessgen E, Stargel D. The digital twin paradigm for future NASA and US Air Force vehicles. In: Proceedings the 53rd AIAA\/ASME\/ASCE\/AHS\/ASC Structures, Structural Dynamics and Materials Conference, 2012"},{"key":"4269_CR5","doi-asserted-by":"publisher","first-page":"5909","DOI":"10.3390\/app11135909","volume":"11","author":"D Lee","year":"2021","unstructured":"Lee D, Lee S H. Digital twin for supply chain coordination in modular construction. Appl Sci, 2021, 11: 5909","journal-title":"Appl Sci"},{"key":"4269_CR6","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.jmsy.2020.04.015","volume":"58","author":"M Glatt","year":"2021","unstructured":"Glatt M, Sinnwell C, Yi L, et al. Modeling and implementation of a digital twin of material flows based on physics simulation. J Manufacturing Syst, 2021, 58: 231\u2013245","journal-title":"J Manufacturing Syst"},{"key":"4269_CR7","first-page":"1","volume-title":"Proceedings of the 15th International Conference on Computer Systems and Applications","author":"A Karakra","year":"2018","unstructured":"Karakra A, Fontanili F, Lamine E, et al. Pervasive computing integrated discrete event simulation for a hospital digital twin. In: Proceedings of the 15th International Conference on Computer Systems and Applications, 2018. 1\u20136"},{"key":"4269_CR8","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/COMST.2022.3171465","volume":"24","author":"C Alcaraz","year":"2022","unstructured":"Alcaraz C, Lopez J. Digital twin: a comprehensive survey of security threats. IEEE Commun Surv Tut, 2022, 24: 1475\u20131503","journal-title":"IEEE Commun Surv Tut"},{"key":"4269_CR9","doi-asserted-by":"publisher","first-page":"112303","DOI":"10.1007\/s11432-022-3768-8","volume":"67","author":"X Y Hu","year":"2024","unstructured":"Hu X Y, Wan Z, Huang K Z, et al. Modulated symbol-based one-time pad secure transmission scheme using physical layer keys. Sci China Inf Sci, 2024, 67: 112303","journal-title":"Sci China Inf Sci"},{"key":"4269_CR10","volume-title":"Product Lifecycle Management: Driving the Next Generation of Lean Thinking","author":"M Githens","year":"2007","unstructured":"Githens M. Product Lifecycle Management: Driving the Next Generation of Lean Thinking. Hoboken: Wiley, 2007"},{"key":"4269_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-38756-7_4","volume-title":"Transdisciplinary Perspectives on Complex Systems","author":"M Grieves","year":"2017","unstructured":"Grieves M, Vickers J. Digital twin: mitigating unpredictable, undesirable emergent behavior in complex systems. In: Transdisciplinary Perspectives on Complex Systems. Berlin: Springer, 2017. 85\u2013113"},{"key":"4269_CR12","first-page":"141","volume-title":"Proceedings of High-Performance Marine Vehicles","author":"S O Erikstad","year":"2017","unstructured":"Erikstad S O. Merging physics, big data analytics and simulation for the next-generation digital twins. In: Proceedings of High-Performance Marine Vehicles, 2017. 141\u2013151"},{"key":"4269_CR13","volume-title":"Proceedings of IEEE International Conference on Big Data","author":"D Riemer","year":"2018","unstructured":"Riemer D. Feeding the digital twin: basics, models and lessons learned from building an IoT analytics toolbox (invited talk). In: Proceedings of IEEE International Conference on Big Data, 2018"},{"key":"4269_CR14","first-page":"154","volume-title":"Proceedings of VIII Brazilian Symposium on Computing Systems Engineering (SBESC)","author":"C Steinmetz","year":"2018","unstructured":"Steinmetz C, Rettberg A, Ribeiro F G C, et al. Internet of Things ontology for digital twin in cyber physical systems. In: Proceedings of VIII Brazilian Symposium on Computing Systems Engineering (SBESC), 2018. 154\u2013159"},{"key":"4269_CR15","first-page":"7","volume-title":"Proceedings of the 14th Annual Conference System of Systems Engineering (SoSE)","author":"J Sleuters","year":"2019","unstructured":"Sleuters J, Li Y, Verriet J, et al. A digital twin method for automated behavior analysis of large-scale distributed IoT systems. In: Proceedings of the 14th Annual Conference System of Systems Engineering (SoSE), 2019. 7\u201312"},{"key":"4269_CR16","first-page":"1","volume-title":"Proceedings of IEEE Sensors Applications Symposium (SAS)","author":"E Y Song","year":"2019","unstructured":"Song E Y, Burns M, Pandey A, et al. IEEE 1451 smart sensor digital twin federation for IoT\/CPS research. In: Proceedings of IEEE Sensors Applications Symposium (SAS), 2019. 1\u20136"},{"key":"4269_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/3198458.3198464","volume-title":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","author":"M Eckhart","year":"2018","unstructured":"Eckhart M, Ekelhart A. Towards security-aware virtual environments for digital twins. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018. 61\u201372"},{"key":"4269_CR18","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1080\/17517575.2018.1526324","volume":"13","author":"J Bao","year":"2019","unstructured":"Bao J, Guo D, Li J, et al. The modelling and operations for the digital twin in the context of manufacturing. Enterprise Inf Syst, 2019, 13: 534\u2013556","journal-title":"Enterprise Inf Syst"},{"key":"4269_CR19","first-page":"1","volume-title":"Proceedings of the 7th International Conference on the Internet of Things","author":"M Kritzler","year":"2017","unstructured":"Kritzler M, Funk M, Michahelles F, et al. The virtual twin: controlling smart factories using a spatially-correct augmented reality representation. In: Proceedings of the 7th International Conference on the Internet of Things, 2017. 1\u20132"},{"key":"4269_CR20","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.promfg.2017.04.043","volume":"9","author":"T H J Uhlemann","year":"2017","unstructured":"Uhlemann T H J, Schock C, Lehmann C, et al. The digital twin: demonstrating the potential of real time data acquisition in production systems. Procedia Manuf, 2017, 9: 113\u2013120","journal-title":"Procedia Manuf"},{"key":"4269_CR21","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.cirp.2018.04.055","volume":"67","author":"F Tao","year":"2018","unstructured":"Tao F, Zhang M, Liu Y, et al. Digital twin driven prognostics and health management for complex equipment. CIRP Ann, 2018, 67: 169\u2013172","journal-title":"CIRP Ann"},{"key":"4269_CR22","doi-asserted-by":"publisher","first-page":"49088","DOI":"10.1109\/ACCESS.2019.2909828","volume":"7","author":"Y Liu","year":"2019","unstructured":"Liu Y, Zhang L, Yang Y, et al. A novel cloud-based framework for the elderly healthcare services using digital twin. IEEE Access, 2019, 7: 49088\u201349101","journal-title":"IEEE Access"},{"key":"4269_CR23","first-page":"4194","volume-title":"Proceedings of IEEE International Conference on Big Data","author":"B Korth","year":"2018","unstructured":"Korth B, Schwede C, Zajac M. Simulation-ready digital twin for realtime management of logistics systems. In: Proceedings of IEEE International Conference on Big Data, 2018. 4194\u20134201"},{"key":"4269_CR24","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3390\/logistics5040084","volume":"5","author":"A Z Abideen","year":"2021","unstructured":"Abideen A Z, Sundram V P K, Pyeman J, et al. Digital twin integrated reinforced learning in supply chain and logistics. Logistics, 2021, 5: 84","journal-title":"Logistics"},{"key":"4269_CR25","first-page":"223","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptographic Techniques","author":"P Paillier","year":"1999","unstructured":"Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, 1999. 223\u2013238"},{"key":"4269_CR26","first-page":"4016","volume":"7","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhao Y, Wu J, et al. LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Int Things J, 2020, 7: 4016\u20134027","journal-title":"IEEE Int Things J"},{"key":"4269_CR27","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.ins.2020.03.107","volume":"526","author":"H Shen","year":"2020","unstructured":"Shen H, Liu Y, Xia Z, et al. An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Inf Sci, 2020, 526: 289\u2013300","journal-title":"Inf Sci"},{"key":"4269_CR28","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/JSAC.2020.2986617","volume":"38","author":"J Cui","year":"2020","unstructured":"Cui J, Wei L, Zhong H, et al. Edge computing in VANETs \u2014 an efficient and privacy-preserving cooperative downloading scheme. IEEE J Sel Areas Commun, 2020, 38: 1191\u20131204","journal-title":"IEEE J Sel Areas Commun"},{"key":"4269_CR29","doi-asserted-by":"publisher","first-page":"1930","DOI":"10.1109\/TIFS.2022.3174389","volume":"17","author":"X Zhang","year":"2022","unstructured":"Zhang X, Zhong H, Fan C, et al. CBACS: a privacy-preserving and efficient cache-based access control scheme for software defined vehicular networks. IEEE Trans Inform Forensic Secur, 2022, 17: 1930\u20131945","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4269_CR30","doi-asserted-by":"publisher","first-page":"6607","DOI":"10.1109\/TII.2020.2965578","volume":"16","author":"Y Ding","year":"2020","unstructured":"Ding Y, Wang B, Wang Y, et al. Secure metering data aggregation with batch verification in industrial smart grid. IEEE Trans Ind Inf, 2020, 16: 6607\u20136616","journal-title":"IEEE Trans Ind Inf"},{"key":"4269_CR31","doi-asserted-by":"publisher","first-page":"170305","DOI":"10.1007\/s11432-023-3978-y","volume":"67","author":"L Sun","year":"2024","unstructured":"Sun L, Wang Y Y, Ren Y J, et al. Path signature-based XAI-enabled network time series classification. Sci China Inf Sci, 2024, 67: 170305","journal-title":"Sci China Inf Sci"},{"key":"4269_CR32","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TIFS.2022.3144869","volume":"17","author":"T Li","year":"2022","unstructured":"Li T, Wang H, He D, et al. Synchronized provable data possession based on blockchain for digital twin. IEEE Trans Inform Forensic Secur, 2022, 17: 472\u2013485","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4269_CR33","doi-asserted-by":"publisher","first-page":"12407","DOI":"10.1109\/TITS.2024.3368342","volume":"25","author":"C Wang","year":"2024","unstructured":"Wang C, Ming Y, Liu H, et al. Secure and flexible data sharing with dual privacy protection in vehicular digital twin networks. IEEE Trans Intell Transp Syst, 2024, 25: 12407\u201312420","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4269_CR34","doi-asserted-by":"publisher","first-page":"103793","DOI":"10.1016\/j.cose.2024.103793","volume":"140","author":"C Patel","year":"2024","unstructured":"Patel C, Pasikhani A, Gope P, et al. User-empowered secure privacy-preserving authentication scheme for digital twin. Comput Secur, 2024, 140: 103793","journal-title":"Comput Secur"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4269-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-024-4269-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4269-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T07:08:49Z","timestamp":1757228929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-024-4269-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,10]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4269"],"URL":"https:\/\/doi.org\/10.1007\/s11432-024-4269-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,10]]},"assertion":[{"value":"30 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"182303"}}