{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:52:58Z","timestamp":1774367578377,"version":"3.50.1"},"reference-count":128,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11432-024-4328-1","type":"journal-article","created":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T16:16:16Z","timestamp":1742228176000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Privacy-preserving filtering, control and optimization for industrial cyber-physical systems"],"prefix":"10.1007","volume":"68","author":[{"given":"Derui","family":"Ding","sequence":"first","affiliation":[]},{"given":"Qing-Long","family":"Han","sequence":"additional","affiliation":[]},{"given":"Xiaohua","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Xian-Ming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"4328_CR1","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/TII.2019.2905295","volume":"15","author":"D Ding","year":"2019","unstructured":"Ding D, Han Q L, Wang Z, et al. A survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans Ind Inf, 2019, 15: 2483\u20132499","journal-title":"IEEE Trans Ind Inf"},{"key":"4328_CR2","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1080\/00207721.2024.2332644","volume":"55","author":"N Sakthivel","year":"2024","unstructured":"Sakthivel N, Keerthna S. $${\\cal H}_{\\infty}$$-based truncated predictive control for switched nonlinear cyber physical systems subjected to actuator faults and deception attacks. Int J Syst Sci, 2024, 55: 2094\u20132107","journal-title":"Int J Syst Sci"},{"key":"4328_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TASE.2021.3115937","volume":"20","author":"Z Ji","year":"2021","unstructured":"Ji Z, Chen C, He J, et al. Learning-based edge sensing and control co-design for industrial cyber-physical system. IEEE Trans Automat Sci Eng, 2021, 20: 59\u201373","journal-title":"IEEE Trans Automat Sci Eng"},{"key":"4328_CR4","doi-asserted-by":"publisher","first-page":"7986","DOI":"10.1109\/TII.2024.3363092","volume":"20","author":"J Zhu","year":"2024","unstructured":"Zhu J, Yuan Y, Wang F Y, et al. Federated control: a trustable control framework for large-scale cyber-physical systems. IEEE Trans Ind Inf, 2024, 20: 7986\u20137994","journal-title":"IEEE Trans Ind Inf"},{"key":"4328_CR5","first-page":"100001","volume":"3","author":"H Geng","year":"2024","unstructured":"Geng H, Mousavi A, Markatos N G, et al. Reliable cost prediction and control for intelligent manufacture: a key performance indicator perspective. Int J Netw Dyn Intell, 2024, 3: 100001","journal-title":"Int J Netw Dyn Intell"},{"key":"4328_CR6","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.1109\/JAS.2023.123588","volume":"11","author":"W Song","year":"2024","unstructured":"Song W, Wang Z, Li Z, et al. Nonlinear filtering with sample-based approximation under constrained communication: progress, insights and trends. IEEE CAA J Autom Sin, 2024, 11: 1539\u20131556","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR7","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/JAS.2023.124161","volume":"11","author":"W Sun","year":"2024","unstructured":"Sun W, Gao X, Ding L, et al. Distributed fault estimation for nonlinear systems with sensor saturation and deception attacks using stochastic communication protocols. IEEE CAA J Autom Sin, 2024, 11: 1865\u20131876","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR8","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/JAS.2022.105857","volume":"11","author":"M Ye","year":"2024","unstructured":"Ye M, Han Q L, Ding L, et al. Distributed Nash equilibrium seeking strategies under quantized communication. IEEE CAA J Autom Sin, 2024, 11: 103\u2013112","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR9","doi-asserted-by":"publisher","first-page":"180205","DOI":"10.1007\/s11432-023-4099-x","volume":"67","author":"R Yuan","year":"2024","unstructured":"Yuan R, An Z C, Shao S Y, et al. Dynamic event-triggered fault-tolerant cooperative resilient tracking control with prescribed performance for UAVs. Sci China Inf Sci, 2024, 67: 180205","journal-title":"Sci China Inf Sci"},{"key":"4328_CR10","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1109\/JAS.2024.124260","volume":"11","author":"L Feng","year":"2024","unstructured":"Feng L, Huang B, Sun J, et al. Adaptive event-triggered time-varying output group formation containment control of heterogeneous multiagent systems. IEEE CAA J Autom Sin, 2024, 11: 1398\u20131409","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR11","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/JAS.2023.123507","volume":"11","author":"X Ge","year":"2024","unstructured":"Ge X, Han Q L, Zhang X M, et al. Communication resource-efficient vehicle platooning control with various spacing policies. IEEE CAA J Autom Sin, 2024, 11: 362\u2013376","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR12","first-page":"100004","volume":"3","author":"C Li","year":"2024","unstructured":"Li C, Liu Y, Gao M, et al. Fault-tolerant formation consensus control for time-varying multi-agent systems with stochastic communication protocol. Int J Netw Dyn Intell, 2024, 3: 100004","journal-title":"Int J Netw Dyn Intell"},{"key":"4328_CR13","first-page":"100011","volume":"2","author":"Y Wang","year":"2023","unstructured":"Wang Y, Liu H, Tan H. An overview of filtering for sampled-data systems under communication constraints. Int J Netw Dyn Intell, 2023, 2: 100011","journal-title":"Int J Netw Dyn Intell"},{"key":"4328_CR14","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1109\/JAS.2022.105845","volume":"10","author":"X Ge","year":"2022","unstructured":"Ge X, Han Q L, Wu Q, et al. Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks. IEEE CAA J Autom Sin, 2022, 10: 1234\u20131251","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR15","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/JAS.2022.106058","volume":"11","author":"M Qi","year":"2024","unstructured":"Qi M, Wang Z, Han Q L, et al. Privacy protection for blockchain-based healthcare IoT systems: a survey. IEEE CAA J Autom Sin, 2024, 11: 1757\u20131776","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR16","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/JAS.2024.124692","volume":"11","author":"M Taheri","year":"2024","unstructured":"Taheri M, Khorasani K, Meskin N. On zero dynamics and controllable cyber-attacks in cyber-physical systems and dynamic coding schemes as their countermeasures. IEEE CAA J Autom Sin, 2024, 11: 2191\u20132203","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR17","doi-asserted-by":"publisher","first-page":"209201","DOI":"10.1007\/s11432-024-4119-0","volume":"67","author":"H Wen","year":"2024","unstructured":"Wen H, Li Y M, Tong S C. Distributed adaptive resilient formation control for nonlinear multi-agent systems under DoS attacks. Sci China Inf Sci, 2024, 67: 209201","journal-title":"Sci China Inf Sci"},{"key":"4328_CR18","doi-asserted-by":"publisher","first-page":"4884","DOI":"10.1109\/TAC.2017.2691310","volume":"62","author":"L Zou","year":"2017","unstructured":"Zou L, Wang Z, Hu J, et al. On $${\\cal H}_{\\infty}$$ finite-horizon filtering under stochastic protocol: dealing with high-rate communication networks. IEEE Trans Automat Contr, 2017, 62: 4884\u20134890","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR19","doi-asserted-by":"publisher","first-page":"3272","DOI":"10.1080\/00207721.2024.2367713","volume":"55","author":"F Li","year":"2024","unstructured":"Li F, Li K, Gao L, et al. Fuzzy $${\\cal H}_{\\infty}$$ control of nonlinear DC microgrids under aperiodic DoS attacks \u2014 an event-triggered approach. Int J Syst Sci, 2024, 55: 3272\u20133290","journal-title":"Int J Syst Sci"},{"key":"4328_CR20","doi-asserted-by":"publisher","first-page":"2897","DOI":"10.1080\/00207721.2024.2363546","volume":"55","author":"N Yi","year":"2024","unstructured":"Yi N, Xu J. Defense strategy selection based on incomplete information game for the false data injection attack. Int J Syst Sci, 2024, 55: 2897\u20132913","journal-title":"Int J Syst Sci"},{"key":"4328_CR21","doi-asserted-by":"publisher","first-page":"132105","DOI":"10.1007\/s11432-022-3717-9","volume":"67","author":"Q Y Zhao","year":"2024","unstructured":"Zhao Q Y, Jiang B B, Zhang Y, et al. Unbalanced private set intersection with linear communication complexity. Sci China Inf Sci, 2024, 67: 132105","journal-title":"Sci China Inf Sci"},{"key":"4328_CR22","unstructured":"Morgan S. Cybercrime to cost the world $10.5 trillion annually by 2025. Cybercrime Magazine. 2020. https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016"},{"key":"4328_CR23","first-page":"5312","volume":"69","author":"X Wang","year":"2022","unstructured":"Wang X, Ding D, Ge X, et al. Neural-network-based control with dynamic event-triggered mechanisms under DoS attacks and applications in load frequency control. IEEE Trans Circ Syst I, 2022, 69: 5312\u20135324","journal-title":"IEEE Trans Circ Syst I"},{"key":"4328_CR24","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/JAS.2022.105623","volume":"9","author":"H Geng","year":"2022","unstructured":"Geng H, Wang Z, Chen Y, et al. Variance-constrained filtering fusion for nonlinear cyber-physical systems with the denial-of-service attacks and stochastic communication protocol. IEEE CAA J Autom Sin, 2022, 9: 978\u2013989","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR25","doi-asserted-by":"publisher","first-page":"109128","DOI":"10.1016\/j.automatica.2020.109128","volume":"120","author":"D Zhao","year":"2020","unstructured":"Zhao D, Wang Z, Wei G, et al. A dynamic event-triggered approach to observer-based PID security control subject to deception attacks. Automatica, 2020, 120: 109128","journal-title":"Automatica"},{"key":"4328_CR26","doi-asserted-by":"publisher","first-page":"110926","DOI":"10.1016\/j.automatica.2023.110926","volume":"151","author":"T Li","year":"2023","unstructured":"Li T, Wang Z, Zou L, et al. A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems. Automatica, 2023, 151: 110926","journal-title":"Automatica"},{"key":"4328_CR27","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TSMC.2020.3041121","volume":"51","author":"D Ding","year":"2021","unstructured":"Ding D, Han Q L, Ge X, et al. Secure state estimation and control of cyber-physical systems: a survey. IEEE Trans Syst Man Cybern Syst, 2021, 51: 176\u2013190","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR28","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","volume":"275","author":"D Ding","year":"2018","unstructured":"Ding D, Han Q L, Xiang Y, et al. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 2018, 275: 1674\u20131683","journal-title":"Neurocomputing"},{"key":"4328_CR29","doi-asserted-by":"publisher","first-page":"109891","DOI":"10.1016\/j.cie.2024.109891","volume":"188","author":"H Harkat","year":"2024","unstructured":"Harkat H, Camarinha-Matos L M, Goes J, et al. Cyber-physical systems security: a systematic review. Comput Indust Eng, 2024, 188: 109891","journal-title":"Comput Indust Eng"},{"key":"4328_CR30","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","volume":"20","author":"Z Lu","year":"2018","unstructured":"Lu Z, Qu G, Liu Z. A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans Intell Transp Syst, 2018, 20: 760\u2013776","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4328_CR31","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.ins.2019.07.036","volume":"527","author":"J Feng","year":"2020","unstructured":"Feng J, Yang L T, Gati N J, et al. Privacy-preserving computation in cyber-physical-social systems: a survey of the state-of-the-art and perspectives. Inf Sci, 2020, 527: 341\u2013355","journal-title":"Inf Sci"},{"key":"4328_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar A, Aksu H, Uluagac A S, et al. A survey on homomorphic encryption schemes. ACM Comput Surv, 2018, 51: 1\u201335","journal-title":"ACM Comput Surv"},{"key":"4328_CR33","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1080\/00207721.2024.2343734","volume":"55","author":"W Wang","year":"2024","unstructured":"Wang W, Ma L, Rui Q, et al. A survey on privacy-preserving control and filtering of networked control systems. Int J Syst Sci, 2024, 55: 2269\u20132288","journal-title":"Int J Syst Sci"},{"key":"4328_CR34","doi-asserted-by":"publisher","first-page":"111062","DOI":"10.1016\/j.automatica.2023.111062","volume":"153","author":"W Ding","year":"2023","unstructured":"Ding W, Zhou J, Yang W, et al. An efficient encoding mechanism against eavesdropper with side channel information. Automatica, 2023, 153: 111062","journal-title":"Automatica"},{"key":"4328_CR35","doi-asserted-by":"publisher","first-page":"3688","DOI":"10.1109\/TCYB.2022.3163245","volume":"53","author":"H T Wu","year":"2022","unstructured":"Wu H T, Cheung Y M, Zhuang Z, et al. Lossless data hiding in encrypted images compatible with homomorphic processing. IEEE Trans Cybern, 2022, 53: 3688\u20133701","journal-title":"IEEE Trans Cybern"},{"key":"4328_CR36","doi-asserted-by":"publisher","first-page":"6341","DOI":"10.1109\/TAC.2024.3379387","volume":"69","author":"J Wang","year":"2024","unstructured":"Wang J, Zhang J F. Differentially private distributed stochastic optimization with time-varying sample sizes. IEEE Trans Automat Contr, 2024, 69: 6341\u20136348","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR37","doi-asserted-by":"publisher","first-page":"5788","DOI":"10.1109\/TAC.2024.3351869","volume":"69","author":"J Wang","year":"2024","unstructured":"Wang J, Ke J, Zhang J F. Differentially private bipartite consensus over signed networks with time-varying noises. IEEE Trans Automat Contr, 2024, 69: 5788\u20135803","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR38","first-page":"1104","volume":"69","author":"L Yu","year":"2021","unstructured":"Yu L, Yu W, Lv Y. Multi-dimensional privacy-preserving average consensus in wireless sensor networks. IEEE Trans Circ Syst II, 2021, 69: 1104\u20131108","journal-title":"IEEE Trans Circ Syst II"},{"key":"4328_CR39","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1109\/TSP.2022.3182590","volume":"70","author":"A Moradi","year":"2022","unstructured":"Moradi A, Venkategowda N K D, Talebi S P, et al. Privacy-preserving distributed Kalman filtering. IEEE Trans Signal Process, 2022, 70: 3074\u20133089","journal-title":"IEEE Trans Signal Process"},{"key":"4328_CR40","first-page":"1490","volume":"70","author":"L Gao","year":"2022","unstructured":"Gao L, Zhou Y, Chen X, et al. Privacy-preserving dynamic average consensus via random number perturbation. IEEE Trans Circ Syst II, 2022, 70: 1490\u20131494","journal-title":"IEEE Trans Circ Syst II"},{"key":"4328_CR41","doi-asserted-by":"publisher","first-page":"5222","DOI":"10.1109\/TAC.2019.2910171","volume":"64","author":"J He","year":"2019","unstructured":"He J, Cai L, Cheng P, et al. Consensus-based data-privacy preserving data aggregation. IEEE Trans Automat Contr, 2019, 64: 5222\u20135229","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR42","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2021.10.019","volume":"468","author":"Z Zuo","year":"2022","unstructured":"Zuo Z, Tian R, Han Q, et al. Differential privacy for bipartite consensus over signed digraph. Neurocomputing, 2022, 468: 11\u201321","journal-title":"Neurocomputing"},{"key":"4328_CR43","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1109\/TCST.2022.3208456","volume":"31","author":"D Zhao","year":"2022","unstructured":"Zhao D, Zhang C, Cao X, et al. Differential privacy energy management for islanded microgrids with distributed consensus-based ADMM algorithm. IEEE Trans Contr Syst Technol, 2022, 31: 1018\u20131031","journal-title":"IEEE Trans Contr Syst Technol"},{"key":"4328_CR44","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1109\/TASE.2022.3217677","volume":"21","author":"J Hu","year":"2022","unstructured":"Hu J, Sun Q, Wang R, et al. An improved privacy-preserving consensus strategy for AC microgrids based on output mask approach and node decomposition mechanism. IEEE Trans Automat Sci Eng, 2022, 21: 642\u2013651","journal-title":"IEEE Trans Automat Sci Eng"},{"key":"4328_CR45","doi-asserted-by":"publisher","first-page":"109253","DOI":"10.1016\/j.automatica.2020.109253","volume":"122","author":"C Altafini","year":"2020","unstructured":"Altafini C. A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics. Automatica, 2020, 122: 109253","journal-title":"Automatica"},{"key":"4328_CR46","doi-asserted-by":"publisher","first-page":"6824","DOI":"10.1109\/TITS.2023.3346395","volume":"25","author":"Y Zhao","year":"2024","unstructured":"Zhao Y, Gong D, Wen S, et al. A privacy-preserving-based distributed collaborative scheme for connected autonomous vehicles at multi-lane signal-free intersections. IEEE Trans Intell Transp Syst, 2024, 25: 6824\u20136835","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4328_CR47","doi-asserted-by":"publisher","first-page":"109847","DOI":"10.1016\/j.automatica.2021.109847","volume":"133","author":"C Gao","year":"2021","unstructured":"Gao C, Wang Z, He X, et al. Sampled-data-based fault-tolerant consensus control for multi-agent systems: a data privacy preserving scheme. Automatica, 2021, 133: 109847","journal-title":"Automatica"},{"key":"4328_CR48","doi-asserted-by":"publisher","first-page":"2503","DOI":"10.1109\/LCSYS.2022.3166759","volume":"6","author":"J Zhang","year":"2022","unstructured":"Zhang J, Lu J, Chen X. Privacy-preserving average consensus via edge decomposition. IEEE Control Syst Lett, 2022, 6: 2503\u20132508","journal-title":"IEEE Control Syst Lett"},{"key":"4328_CR49","doi-asserted-by":"publisher","first-page":"110182","DOI":"10.1016\/j.automatica.2022.110182","volume":"139","author":"K Zhang","year":"2022","unstructured":"Zhang K, Li Z, Wang Y, et al. Privacy-preserving dynamic average consensus via state decomposition: case study on multi-robot formation control. Automatica, 2022, 139: 110182","journal-title":"Automatica"},{"key":"4328_CR50","first-page":"3307","volume":"71","author":"P Zhao","year":"2024","unstructured":"Zhao P, Ding D, Dong H, et al. Secure distributed state estimation for microgrids with eavesdroppers based on variable decomposition. IEEE Trans Circ Syst I, 2024, 71: 3307\u20133316","journal-title":"IEEE Trans Circ Syst I"},{"key":"4328_CR51","doi-asserted-by":"publisher","first-page":"4711","DOI":"10.1109\/TAC.2019.2902731","volume":"64","author":"Y Wang","year":"2019","unstructured":"Wang Y. Privacy-preserving average consensus via state decomposition. IEEE Trans Automat Contr, 2019, 64: 4711\u20134716","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR52","doi-asserted-by":"publisher","first-page":"1814","DOI":"10.1109\/TIFS.2022.3170271","volume":"17","author":"Y Liu","year":"2022","unstructured":"Liu Y, Geng J, Shang F, et al. Laplacian smoothing stochastic ADMMs with differential privacy guarantees. IEEE Trans Inform Forensic Secur, 2022, 17: 1814\u20131826","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4328_CR53","doi-asserted-by":"publisher","first-page":"3153","DOI":"10.1109\/TSMC.2024.3355409","volume":"54","author":"Y Qi","year":"2024","unstructured":"Qi Y, Tang Y, Kawano Y. Full differential privacy preserving for switched LPV systems. IEEE Trans Syst Man Cybern Syst, 2024, 54: 3153\u20133163","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR54","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1109\/TSG.2020.3038757","volume":"12","author":"H Wang","year":"2020","unstructured":"Wang H, Zhang J, Lu C, et al. Privacy preserving in non-intrusive load monitoring: a differential privacy perspective. IEEE Trans Smart Grid, 2020, 12: 2529\u20132543","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR55","doi-asserted-by":"publisher","first-page":"3665","DOI":"10.1109\/TSG.2021.3067142","volume":"12","author":"B Fan","year":"2021","unstructured":"Fan B, Wang X. Distributed privacy-preserving active power sharing and frequency regulation in microgrids. IEEE Trans Smart Grid, 2021, 12: 3665\u20133668","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR56","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.1109\/TIFS.2021.3050064","volume":"16","author":"Q Li","year":"2021","unstructured":"Li Q, Gundersen J S, Heusdens R, et al. Privacy-preserving distributed processing: metrics, bounds and algorithms. IEEE Trans Inform Forensic Secur, 2021, 16: 2090\u20132103","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4328_CR57","doi-asserted-by":"publisher","first-page":"5627","DOI":"10.1109\/TAC.2024.3379256","volume":"69","author":"J Zhang","year":"2024","unstructured":"Zhang J, Lu J, Hadjicostis C N. Average consensus for expressed and private opinions. IEEE Trans Automat Contr, 2024, 69: 5627\u20135634","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR58","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TSMC.2024.3391065","volume":"54","author":"K Zhu","year":"2024","unstructured":"Zhu K, Wang Z, Ding D, et al. Privacy-preserving control for 2-D systems with guaranteed probability. IEEE Trans Syst Man Cybern Syst, 2024, 54: 4999\u20135011","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR59","unstructured":"Zhang K, Li Z, Wang Y, et al. Privacy-preserved nonlinear cloud-based model predictive control via affine masking. 2021. ArXiv:2112.10625"},{"key":"4328_CR60","doi-asserted-by":"publisher","first-page":"4947","DOI":"10.1109\/TCYB.2022.3151234","volume":"53","author":"S Liang","year":"2022","unstructured":"Liang S, Lam J, Lin H. Secure estimation with privacy protection. IEEE Trans Cybern, 2022, 53: 4947\u20134961","journal-title":"IEEE Trans Cybern"},{"key":"4328_CR61","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1109\/TCNS.2022.3182234","volume":"10","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Peng Z, Wen G, et al. Privacy preserving-based resilient consensus for multiagent systems via state decomposition. IEEE Trans Control Netw Syst, 2022, 10: 1172\u20131183","journal-title":"IEEE Trans Control Netw Syst"},{"key":"4328_CR62","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TAES.2021.3124866","volume":"58","author":"X Shen","year":"2021","unstructured":"Shen X, Liu Y. Privacy-preserving distributed estimation over multitask networks. IEEE Trans Aerosp Electron Syst, 2021, 58: 1953\u20131965","journal-title":"IEEE Trans Aerosp Electron Syst"},{"key":"4328_CR63","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1109\/TSG.2020.3023891","volume":"12","author":"J Wang","year":"2020","unstructured":"Wang J, Shi D, Chen J, et al. Privacy-preserving hierarchical state estimation in untrustworthy cloud environments. IEEE Trans Smart Grid, 2020, 12: 1541\u20131551","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR64","doi-asserted-by":"publisher","first-page":"8670","DOI":"10.1002\/rnc.6303","volume":"32","author":"J Wang","year":"2022","unstructured":"Wang J, Zhang J, Liu X. Differentially private resilient distributed cooperative online estimation over digraphs. Intl J Robust Nonlinear, 2022, 32: 8670\u20138688","journal-title":"Intl J Robust Nonlinear"},{"key":"4328_CR65","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1109\/TCNS.2022.3155109","volume":"9","author":"W Ding","year":"2022","unstructured":"Ding W, Yang W, Zhou J, et al. Privacy preserving via secure summation in distributed Kalman filtering. IEEE Trans Control Netw Syst, 2022, 9: 1481\u20131492","journal-title":"IEEE Trans Control Netw Syst"},{"key":"4328_CR66","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.isatra.2022.05.035","volume":"127","author":"J Huang","year":"2022","unstructured":"Huang J, Gao C, He X. Privacy-preserving state estimation with unreliable channels. ISA Trans, 2022, 127: 4\u201312","journal-title":"ISA Trans"},{"key":"4328_CR67","doi-asserted-by":"publisher","first-page":"6240","DOI":"10.1109\/TAC.2022.3230735","volume":"68","author":"K H Degue","year":"2022","unstructured":"Degue K H, Le Ny J. Differentially private Kalman filtering with signal aggregation. IEEE Trans Automat Contr, 2022, 68: 6240\u20136246","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR68","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/TAES.2022.3219799","volume":"59","author":"X Yan","year":"2022","unstructured":"Yan X, Chen B, Zhang Y, et al. Guaranteeing differential privacy in distributed fusion estimation. IEEE Trans Aerosp Electron Syst, 2022, 59: 3416\u20133423","journal-title":"IEEE Trans Aerosp Electron Syst"},{"key":"4328_CR69","doi-asserted-by":"publisher","first-page":"102396","DOI":"10.1016\/j.inffus.2024.102396","volume":"108","author":"X Yi","year":"2024","unstructured":"Yi X, Xu T. Distributed event-triggered estimation for dynamic average consensus: a perturbation-injected privacy-preservation scheme. Inf Fusion, 2024, 108: 102396","journal-title":"Inf Fusion"},{"key":"4328_CR70","first-page":"4434","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"Y Song","year":"2018","unstructured":"Song Y, Wang C, Tay W. Privacy-aware Kalman filtering. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018. 4434\u20134438"},{"key":"4328_CR71","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/LCSYS.2024.3398200","volume":"8","author":"J Zou","year":"2024","unstructured":"Zou J, Liu H, Liu C, et al. Optimal privacy-preserving transmission schedule against eavesdropping attacks on remote state estimation. IEEE Control Syst Lett, 2024, 8: 538\u2013543","journal-title":"IEEE Control Syst Lett"},{"key":"4328_CR72","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/TAES.2020.3038243","volume":"57","author":"N Das","year":"2020","unstructured":"Das N, Bhattacharya R. Privacy and utility aware data sharing for space situational awareness from ensemble and unscented Kalman filtering perspective. IEEE Trans Aerosp Electron Syst, 2020, 57: 1162\u20131176","journal-title":"IEEE Trans Aerosp Electron Syst"},{"key":"4328_CR73","doi-asserted-by":"publisher","first-page":"100786","DOI":"10.1016\/j.ejcon.2023.100786","volume":"71","author":"A Alanwar","year":"2023","unstructured":"Alanwar A, Ga\u00dfmann V, He X, et al. Privacy-preserving set-based estimation using partially homomorphic encryption. Eur J Control, 2023, 71: 100786","journal-title":"Eur J Control"},{"key":"4328_CR74","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/TAC.2020.2999022","volume":"66","author":"V Krishnan","year":"2020","unstructured":"Krishnan V, Martinez S. A probabilistic framework for moving-horizon estimation: stability and privacy guarantees. IEEE Trans Automat Contr, 2020, 66: 1817\u20131824","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR75","doi-asserted-by":"publisher","first-page":"17301","DOI":"10.1109\/TITS.2022.3154650","volume":"23","author":"H Gao","year":"2022","unstructured":"Gao H, Li Z, Wang Y. Privacy-preserving collaborative estimation for networked vehicles with application to collaborative road profile estimation. IEEE Trans Intell Transp Syst, 2022, 23: 17301\u201317311","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4328_CR76","doi-asserted-by":"publisher","first-page":"3940","DOI":"10.1109\/TDSC.2022.3210017","volume":"20","author":"H Y Tran","year":"2023","unstructured":"Tran H Y, Hu J, Pota H R. A privacy-preserving state estimation scheme for smart grids. IEEE Trans Dependable Secure Comput, 2023, 20: 3940\u20133956","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"4328_CR77","doi-asserted-by":"crossref","unstructured":"Zhao P, Chen Y, Ding D, et al. Privacy-preserving distributed state estimation for microgrids based on encrypted measurements under bit-rate constraints. Int J Syst Sci, 2025,: 1\u201318","DOI":"10.1080\/00207721.2024.2448773"},{"key":"4328_CR78","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1109\/TSMC.2022.3220578","volume":"53","author":"J Zhang","year":"2023","unstructured":"Zhang J, Lu J, Liang J, et al. Privacy-preserving average consensus in multiagent systems via partial information transmission. IEEE Trans Syst Man Cybern Syst, 2023, 53: 2781\u20132791","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR79","doi-asserted-by":"publisher","first-page":"4520","DOI":"10.1109\/TSMC.2019.2939680","volume":"51","author":"A Wang","year":"2021","unstructured":"Wang A, He H, Liao X. Event-triggered privacy-preserving average consensus for multiagent networks with time delay: an output mask approach. IEEE Trans Syst Man Cybern Syst, 2021, 51: 4520\u20134531","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR80","doi-asserted-by":"publisher","first-page":"4437","DOI":"10.1109\/TSMC.2024.3379375","volume":"54","author":"Y Liu","year":"2024","unstructured":"Liu Y, Xie X, Sun J, et al. Event-triggered privacy preservation consensus control and containment control for nonlinear MASs: an output mask approach. IEEE Trans Syst Man Cybern Syst, 2024, 54: 4437\u20134447","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR81","doi-asserted-by":"publisher","first-page":"1954","DOI":"10.1109\/JAS.2022.105941","volume":"11","author":"M Xie","year":"2024","unstructured":"Xie M, Ding D, Ge X, et al. Distributed platooning control of automated vehicles subject to replay attacks based on proportional integral observers. IEEE CAA J Autom Sin, 2024, 11: 1954\u20131966","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR82","doi-asserted-by":"publisher","first-page":"6147","DOI":"10.1109\/TITS.2023.3339659","volume":"25","author":"R Li","year":"2024","unstructured":"Li R, Liu Z, Ma Y, et al. RPPM: a reputation-based and privacy-preserving platoon management scheme in vehicular networks. IEEE Trans Intell Transp Syst, 2024, 25: 6147\u20136160","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4328_CR83","doi-asserted-by":"publisher","first-page":"16290","DOI":"10.1109\/TITS.2022.3149600","volume":"23","author":"Z Ying","year":"2022","unstructured":"Ying Z, Cao S, Liu X, et al. PrivacySignal: privacy-preserving traffic signal control for intelligent transportation system. IEEE Trans Intell Transp Syst, 2022, 23: 16290\u201316303","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4328_CR84","doi-asserted-by":"publisher","first-page":"15029","DOI":"10.1109\/TITS.2024.3390779","volume":"25","author":"J Liu","year":"2024","unstructured":"Liu J, Dong J. Privacy-preserving cruise control for heterogeneous platoon vehicle system under actuator faults and uncertainties. IEEE Trans Intell Transp Syst, 2024, 25: 15029\u201315039","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"4328_CR85","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1109\/TSMC.2022.3226901","volume":"53","author":"D Pan","year":"2023","unstructured":"Pan D, Ding D, Ge X, et al. Privacy-preserving platooning control of vehicular cyber-physical systems with saturated inputs. IEEE Trans Syst Man Cybern Syst, 2023, 53: 2083\u20132097","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR86","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1109\/TVT.2021.3133902","volume":"71","author":"C D Liang","year":"2021","unstructured":"Liang C D, Ge M F, Xu J Z, et al. Secure and privacy-preserving formation control for networked marine surface vehicles with sampled-data interactions. IEEE Trans Veh Technol, 2021, 71: 1307\u20131318","journal-title":"IEEE Trans Veh Technol"},{"key":"4328_CR87","doi-asserted-by":"publisher","first-page":"3369","DOI":"10.1109\/TSG.2022.3171267","volume":"13","author":"Z Wang","year":"2022","unstructured":"Wang Z, Ma M, Zhou Q, et al. A privacy-preserving distributed control strategy in islanded AC microgrids. IEEE Trans Smart Grid, 2022, 13: 3369\u20133382","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR88","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1109\/TSG.2016.2553647","volume":"9","author":"A Abdallah","year":"2016","unstructured":"Abdallah A, Shen X S. A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans Smart Grid, 2016, 9: 396\u2013405","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR89","doi-asserted-by":"publisher","first-page":"6818","DOI":"10.1109\/TII.2022.3141428","volume":"18","author":"J Hu","year":"2022","unstructured":"Hu J, Sun Q, Wang R, et al. Privacy-preserving sliding mode control for voltage restoration of AC microgrids based on output mask approach. IEEE Trans Ind Inf, 2022, 18: 6818\u20136827","journal-title":"IEEE Trans Ind Inf"},{"key":"4328_CR90","doi-asserted-by":"publisher","first-page":"10334","DOI":"10.1109\/TII.2023.3240878","volume":"19","author":"J Hu","year":"2023","unstructured":"Hu J, Sun Q, Zhai M, et al. Privacy-preserving consensus strategy for secondary control in microgrids against multilink false data injection attacks. IEEE Trans Ind Inf, 2023, 19: 10334\u201310343","journal-title":"IEEE Trans Ind Inf"},{"key":"4328_CR91","doi-asserted-by":"publisher","first-page":"4424","DOI":"10.1109\/TSG.2024.3399233","volume":"15","author":"Z Wang","year":"2024","unstructured":"Wang Z, Zhou L, Xiong L, et al. Parameter-adaptive distributed model-predictive control for islanded AC microgrids: privacy-preserving perspective. IEEE Trans Smart Grid, 2024, 15: 4424\u20134435","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR92","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.1109\/TNSE.2022.3151380","volume":"9","author":"J Zhang","year":"2022","unstructured":"Zhang J, Lu J, Lou J. Privacy-preserving average consensus via finite time-varying transformation. IEEE Trans Netw Sci Eng, 2022, 9: 1756\u20131764","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"4328_CR93","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/LCSYS.2023.3240655","volume":"7","author":"J Ke","year":"2023","unstructured":"Ke J, Wang J, Zhang J F. Differentiated output-based privacy-preserving average consensus. IEEE Control Syst Lett, 2023, 7: 1369\u20131374","journal-title":"IEEE Control Syst Lett"},{"key":"4328_CR94","doi-asserted-by":"publisher","first-page":"110440","DOI":"10.1016\/j.automatica.2022.110440","volume":"142","author":"J Wang","year":"2022","unstructured":"Wang J, Zhang J F, He X. Differentially private distributed algorithms for stochastic aggregative games. Automatica, 2022, 142: 110440","journal-title":"Automatica"},{"key":"4328_CR95","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1109\/TAC.2022.3174187","volume":"68","author":"Y Wang","year":"2022","unstructured":"Wang Y, Poor H V. Decentralized stochastic optimization with inherent privacy protection. IEEE Trans Automat Contr, 2022, 68: 2293\u20132308","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR96","first-page":"1350","volume":"70","author":"Q Luo","year":"2022","unstructured":"Luo Q, Liu S, Wang L, et al. Privacy-preserved distributed optimization for multi-agent systems with antagonistic interactions. IEEE Trans Circuits Syst I, 2022, 70: 1350\u20131360","journal-title":"IEEE Trans Circuits Syst I"},{"key":"4328_CR97","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1109\/TAC.2021.3075183","volume":"67","author":"M Ye","year":"2021","unstructured":"Ye M, Hu G, Xie L, et al. Differentially private distributed Nash equilibrium seeking for aggregative games. IEEE Trans Automat Contr, 2021, 67: 2451\u20132458","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR98","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/TAC.2023.3264164","volume":"69","author":"Y Lin","year":"2023","unstructured":"Lin Y, Liu K, Han D, et al. Statistical privacy-preserving online distributed Nash equilibrium tracking in aggregative games. IEEE Trans Automat Contr, 2023, 69: 323\u2013330","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR99","doi-asserted-by":"publisher","first-page":"2835","DOI":"10.1109\/TNNLS.2022.3192346","volume":"35","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Yang S, Xu W, et al. Privacy-preserving distributed ADMM with event-triggered communication. IEEE Trans Neural Netw Learn Syst, 2022, 35: 2835\u20132847","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"4328_CR100","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TAC.2016.2541298","volume":"62","author":"S Han","year":"2016","unstructured":"Han S, Topcu U, Pappas G J. Differentially private distributed constrained optimization. IEEE Trans Automat Contr, 2016, 62: 50\u201364","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR101","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TCNS.2016.2614100","volume":"5","author":"E Nozari","year":"2016","unstructured":"Nozari E, Tallapragada P, Cortes J. Differentially private distributed convex optimization via functional perturbation. IEEE Trans Control Netw Syst, 2016, 5: 395\u2013408","journal-title":"IEEE Trans Control Netw Syst"},{"key":"4328_CR102","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1109\/LSP.2020.3029706","volume":"27","author":"N K D Venkategowda","year":"2020","unstructured":"Venkategowda N K D, Werner S. Privacy-preserving distributed maximum consensus. IEEE Signal Process Lett, 2020, 27: 1839\u20131843","journal-title":"IEEE Signal Process Lett"},{"key":"4328_CR103","doi-asserted-by":"publisher","first-page":"5842","DOI":"10.1109\/TSP.2020.3027917","volume":"68","author":"Y Ye","year":"2020","unstructured":"Ye Y, Chen H, Xiao M, et al. Privacy-preserving incremental ADMM for decentralized consensus optimization. IEEE Trans Signal Process, 2020, 68: 5842\u20135854","journal-title":"IEEE Trans Signal Process"},{"key":"4328_CR104","doi-asserted-by":"publisher","first-page":"3718","DOI":"10.1109\/TAC.2020.3022856","volume":"66","author":"X Cao","year":"2020","unstructured":"Cao X, Zhang J, Poor H V, et al. Differentially private ADMM for regularized consensus optimization. IEEE Trans Automat Contr, 2020, 66: 3718\u20133725","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR105","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TIFS.2021.3139267","volume":"17","author":"C Gratton","year":"2021","unstructured":"Gratton C, Venkategowda N K D, Arablouei R, et al. Privacy-preserved distributed learning with zeroth-order optimization. IEEE Trans Inform Forensic Secur, 2021, 17: 265\u2013279","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4328_CR106","doi-asserted-by":"publisher","first-page":"3172","DOI":"10.1109\/TAC.2021.3097295","volume":"67","author":"D Han","year":"2021","unstructured":"Han D, Liu K, Sandberg H, et al. Privacy-preserving dual averaging with arbitrary initial conditions for distributed optimization. IEEE Trans Automat Contr, 2021, 67: 3172\u20133179","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR107","doi-asserted-by":"publisher","first-page":"7974","DOI":"10.1109\/TAC.2023.3256479","volume":"68","author":"X Chen","year":"2023","unstructured":"Chen X, Huang L, Ding K, et al. Privacy-preserving push-sum average consensus via state decomposition. IEEE Trans Automat Contr, 2023, 68: 7974\u20137981","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR108","doi-asserted-by":"publisher","first-page":"4035","DOI":"10.1109\/TAC.2019.2890887","volume":"64","author":"M Ruan","year":"2019","unstructured":"Ruan M, Gao H, Wang Y. Secure and privacy-preserving consensus. IEEE Trans Automat Contr, 2019, 64: 4035\u20134049","journal-title":"IEEE Trans Automat Contr"},{"key":"4328_CR109","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TCNS.2018.2873152","volume":"6","author":"C Zhang","year":"2018","unstructured":"Zhang C, Wang Y. Enabling privacy-preservation in decentralized optimization. IEEE Trans Control Netw Syst, 2018, 6: 679\u2013689","journal-title":"IEEE Trans Control Netw Syst"},{"key":"4328_CR110","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1109\/TCNS.2023.3264932","volume":"10","author":"X Chen","year":"2023","unstructured":"Chen X, Huang L, He L, et al. A differentially private method for distributed optimization in directed networks via state decomposition. IEEE Trans Control Netw Syst, 2023, 10: 2165\u20132177","journal-title":"IEEE Trans Control Netw Syst"},{"key":"4328_CR111","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1109\/LCSYS.2023.3292463","volume":"7","author":"X Chen","year":"2023","unstructured":"Chen X, Jiang W, Charalambous T, et al. A privacy-preserving finite-time push-sum-based gradient method for distributed optimization over digraphs. IEEE Control Syst Lett, 2023, 7: 3133\u20133138","journal-title":"IEEE Control Syst Lett"},{"key":"4328_CR112","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JAS.2023.124122","volume":"11","author":"W Chen","year":"2024","unstructured":"Chen W, Liu G P. Privacy-preserving consensus-based distributed economic dispatch of smart grids via state decomposition. IEEE CAA J Autom Sin, 2024, 11: 1250\u20131261","journal-title":"IEEE CAA J Autom Sin"},{"key":"4328_CR113","doi-asserted-by":"publisher","unstructured":"Sun L, Ding D, Dong H, et al. Distributed economic dispatch of microgrids based on ADMM algorithms with encryption-decryption rules. IEEE Trans Automat Sci Eng, 2025. doi: https:\/\/doi.org\/10.1109\/TASE.2024.3485922","DOI":"10.1109\/TASE.2024.3485922"},{"key":"4328_CR114","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.1109\/TSG.2023.3324138","volume":"15","author":"L Sun","year":"2024","unstructured":"Sun L, Ding D, Dong H, et al. Privacy-preserving distributed economic dispatch for microgrids based on state decomposition with added noises. IEEE Trans Smart Grid, 2024, 15: 2424\u20132433","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR115","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1109\/TIFS.2024.3438129","volume":"20","author":"W An","year":"2025","unstructured":"An W, Ding D, Dong H, et al. Privacy-preserving distributed optimization for economic dispatch over balanced directed networks. IEEE Trans Inform Forensic Secur, 2025, 20: 1362\u20131373","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4328_CR116","doi-asserted-by":"publisher","first-page":"10103","DOI":"10.1109\/TII.2024.3393569","volume":"20","author":"F Teng","year":"2024","unstructured":"Teng F, Ban Z, Li T, et al. A privacy-preserving distributed economic dispatch method for integrated port microgrid and computing power network. IEEE Trans Ind Inf, 2024, 20: 10103\u201310112","journal-title":"IEEE Trans Ind Inf"},{"key":"4328_CR117","doi-asserted-by":"publisher","first-page":"4506","DOI":"10.1109\/TSG.2021.3084934","volume":"12","author":"T Wu","year":"2021","unstructured":"Wu T, Zhao C, Zhang Y J A. Privacy-preserving distributed optimal power flow with partially homomorphic encryption. IEEE Trans Smart Grid, 2021, 12: 4506\u20134521","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR118","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TSG.2022.3189665","volume":"14","author":"W Chen","year":"2022","unstructured":"Chen W, Liu L, Liu G P. Privacy-preserving distributed economic dispatch of microgrids: a dynamic quantization-based consensus scheme with homomorphic encryption. IEEE Trans Smart Grid, 2022, 14: 701\u2013713","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR119","doi-asserted-by":"publisher","first-page":"2638","DOI":"10.1109\/TSMC.2023.3344885","volume":"54","author":"W Chen","year":"2024","unstructured":"Chen W, Wang Z, Hu J, et al. Privacy-preserving distributed economic dispatch of microgrids using edge-based additive perturbations: an accelerated consensus algorithm. IEEE Trans Syst Man Cybern Syst, 2024, 54: 2638\u20132650","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"4328_CR120","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/TPWRS.2023.3246998","volume":"39","author":"D Zhao","year":"2023","unstructured":"Zhao D, Liu D, Liu L. Distributed privacy preserving algorithm for economic dispatch over time-varying communication. IEEE Trans Power Syst, 2023, 39: 643\u2013657","journal-title":"IEEE Trans Power Syst"},{"key":"4328_CR121","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TII.2021.3077509","volume":"18","author":"B Huang","year":"2021","unstructured":"Huang B, Li Y, Zhan F, et al. A distributed robust economic dispatch strategy for integrated energy system considering cyber-attacks. IEEE Trans Ind Inf, 2021, 18: 880\u2013890","journal-title":"IEEE Trans Ind Inf"},{"key":"4328_CR122","doi-asserted-by":"crossref","first-page":"3413","DOI":"10.1109\/TPWRS.2022.3233772","volume":"38","author":"X Chang","year":"2023","unstructured":"Chang X, Xu Y, Sun H, et al. Privacy-preserving distributed energy transaction in active distribution networks. IEEE Trans Power Syst, 2023, 38: 3413\u20133426","journal-title":"IEEE Trans Power Syst"},{"key":"4328_CR123","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1109\/TSG.2023.3293549","volume":"15","author":"J Liu","year":"2024","unstructured":"Liu J, Long Q, Liu R P, et al. Privacy-preserving peer-to-peer energy trading via hybrid secure computations. IEEE Trans Smart Grid, 2024, 15: 1951\u20131964","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR124","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TSG.2023.3309405","volume":"15","author":"Z P Yuan","year":"2024","unstructured":"Yuan Z P, Li P, Li Z L, et al. A fully distributed privacy-preserving energy management system for networked microgrid cluster based on homomorphic encryption. IEEE Trans Smart Grid, 2024, 15: 1735\u20131748","journal-title":"IEEE Trans Smart Grid"},{"key":"4328_CR125","doi-asserted-by":"publisher","first-page":"4352","DOI":"10.1109\/TIFS.2021.3106161","volume":"16","author":"F Ye","year":"2021","unstructured":"Ye F, Cheng Z, Cao X, et al. A random-weight privacy-preserving algorithm with error compensation for microgrid distributed energy management. IEEE Trans Inform Forensic Secur, 2021, 16: 4352\u20134362","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4328_CR126","doi-asserted-by":"publisher","first-page":"3155","DOI":"10.1080\/00207721.2024.2366415","volume":"55","author":"Z Zhao","year":"2024","unstructured":"Zhao Z, Yang Z, Ji Q. Privacy preserving distributed event-triggered optimisation for multi-agent systems. Int J Syst Sci, 2024, 55: 3155\u20133165","journal-title":"Int J Syst Sci"},{"key":"4328_CR127","first-page":"100015","volume":"3","author":"Y Zou","year":"2024","unstructured":"Zou Y, Tian E. Guaranteed cost intermittent control for discrete-time system: a data-driven method. Int J Netw Dyn Intell, 2024, 3: 100015","journal-title":"Int J Netw Dyn Intell"},{"key":"4328_CR128","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TICPS.2023.3323600","volume":"1","author":"J Chae","year":"2023","unstructured":"Chae J, Lee S, Jang J, et al. A survey and perspective on industrial cyber-physical systems (ICPS): from ICPS to AIaugmented ICPS. Trans Ind Cyb-Phy Sys, 2023, 1: 257\u2013272","journal-title":"Trans Ind Cyb-Phy Sys"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4328-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-024-4328-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4328-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T16:17:28Z","timestamp":1742228248000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-024-4328-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,13]]},"references-count":128,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["4328"],"URL":"https:\/\/doi.org\/10.1007\/s11432-024-4328-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,13]]},"assertion":[{"value":"23 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"141201"}}