{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T17:47:52Z","timestamp":1769017672532,"version":"3.49.0"},"reference-count":25,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62103203"],"award-info":[{"award-number":["62103203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tianjin Postgraduate Scientific Research and Innovation Project","award":["2021YJSB249"],"award-info":[{"award-number":["2021YJSB249"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Systems Science"],"published-print":{"date-parts":[[2024,3,11]]},"DOI":"10.1080\/00207721.2023.2293479","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T12:00:23Z","timestamp":1703246423000},"page":"590-602","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-preserving consensus via edge-based state decomposition"],"prefix":"10.1080","volume":"55","author":[{"given":"Shengtong","family":"Lin","sequence":"first","affiliation":[{"name":"College of Artificial Intelligence, Nankai University, Tianjin, People's Republic of China"}]},{"given":"Ao","family":"Cao","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Nankai University, Tianjin, People's Republic of China"}]},{"given":"Tongtong","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, Tianjin, People's Republic of China"}]},{"given":"Fuyong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Nankai University, Tianjin, People's Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2023,12,22]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257523"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3256479"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2771560"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2890645"},{"key":"e_1_3_3_6_1","doi-asserted-by":"crossref","unstructured":"Hadjicostis C. N. (2018). Privary preserving distributed average consensus via homomorphic encryption. In 2018 IEEE conference on decision and control (CDC) (pp. 1258\u20131263). IEEE.","DOI":"10.1109\/CDC.2018.8619120"},{"key":"e_1_3_3_7_1","doi-asserted-by":"crossref","unstructured":"Huang Z. Mitra S. & Dullerud G. (2012). Differentially private iterative synchronous consensus. In Proceedings of the 2012 ACM workshop on privacy in the electronic society (pp. 81\u201390).","DOI":"10.1145\/2381966.2381978"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2723963"},{"key":"e_1_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Lin S. Wang F. Liu Z. & Chen Z. (2022). Privacy-preserving average consensus via enhanced state decomposition. In 2022 41st Chinese control conference (CCC) (pp. 4484\u20134488). IEEE.","DOI":"10.23919\/CCC55666.2022.9902777"},{"key":"e_1_3_3_10_1","doi-asserted-by":"crossref","unstructured":"Lin Y. Farokhi F. Shames I. & Ne\u0161i\u0107 D. (2018). Secure control of nonlinear systems using semi-homomorphic encryption. In 2018 IEEE conference on decision and control (CDC) (pp. 5002\u20135007). IEEE.","DOI":"10.1109\/CDC.2018.8619569"},{"key":"e_1_3_3_11_1","doi-asserted-by":"crossref","unstructured":"Manitara N. E. & Hadjicostis C. N. (2013). Privacy-preserving asymptotic average consensus. In 2013 European control conference (ECC) (pp. 760\u2013765). IEEE.","DOI":"10.23919\/ECC.2013.6669251"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2528539"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2564339"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.10.331"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.073"},{"key":"e_1_3_3_16_1","doi-asserted-by":"crossref","unstructured":"Ruan M. Ahmad M. & Wang Y. (2017). Secure and privacy-preserving average consensus. In Proceedings of the 2017 workshop on cyber-physical systems security and privacy (pp. 123\u2013129).","DOI":"10.1145\/3140241.3140243"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/23307706.2022.2067252"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_3_19_1","doi-asserted-by":"crossref","unstructured":"Suganthi S. & Sree Kala T. (2023). A novel secure aware privacy preserved data sharing framework in an e-government system based on a consortium blockchain. Journal of Control and Decision 1\u201319.","DOI":"10.1080\/23307706.2023.2211071"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3081372"},{"issue":"8","key":"e_1_3_3_22_1","first-page":"2815","article-title":"Asynchronous quasi-consensus of heterogeneous multiagent systems with nonuniform input delays","volume":"50","author":"Wang Z.","year":"2018","unstructured":"Wang, Z., & He, H. (2018). Asynchronous quasi-consensus of heterogeneous multiagent systems with nonuniform input delays. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50(8), 2815\u20132827.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110223"},{"key":"e_1_3_3_24_1","doi-asserted-by":"crossref","unstructured":"Yao A. C. (1982). Protocols for secure computations. In 23rd Annual symposium on foundations of computer science (SFCS 1982) (pp. 160\u2013164). IEEE.","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3166759"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2618944"}],"container-title":["International Journal of Systems Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207721.2023.2293479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T19:07:46Z","timestamp":1727204866000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207721.2023.2293479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,3,11]]}},"alternative-id":["10.1080\/00207721.2023.2293479"],"URL":"https:\/\/doi.org\/10.1080\/00207721.2023.2293479","relation":{},"ISSN":["0020-7721","1464-5319"],"issn-type":[{"value":"0020-7721","type":"print"},{"value":"1464-5319","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tsys20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tsys20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-06-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}