{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:22:23Z","timestamp":1775578943444,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2441244"],"award-info":[{"award-number":["U2441244"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173259"],"award-info":[{"award-number":["62173259"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LZ24F030006"],"award-info":[{"award-number":["LZ24F030006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Contr."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tac.2025.3546087","type":"journal-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T14:13:52Z","timestamp":1740579232000},"page":"5808-5822","source":"Crossref","is-referenced-by-count":4,"title":["Cryptography-Based Privacy-Preserving Method for Distributed Optimization Over Time-Varying Directed Graphs With Enhanced Efficiency"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6667-9250","authenticated-orcid":false,"given":"Bing","family":"Liu","sequence":"first","affiliation":[{"name":"Engineering Research Center of Metallurgical Automation and Measurement Technology, Wuhan University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2714-3293","authenticated-orcid":false,"given":"Furan","family":"Xie","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Metallurgical Automation and Measurement Technology, Wuhan University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4331-0565","authenticated-orcid":false,"given":"Li","family":"Chai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038417"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483403"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.05.006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2907410"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3255140"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2161027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2298712"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2304432"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/14096668X"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/16m1076629"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2698261"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3218663"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2009515"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2730481"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/16M1084316"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4208\/jcm.1606-m2015-0452"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2672698"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2797164"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2018.2834316"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2737582"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-018-0596-y"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2972824"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2364096"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2969721"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/10556788.2023.2261602"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683597"},{"key":"ref28","first-page":"41","article-title":"PrOLoc: Resilient localization with private observers using partial homomorphic encryption","volume-title":"Proc. ACM\/IEEE Int. Conf. Inf. Process. Sens. Netw.","author":"Alanwar","year":"2017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2684464.2684480"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798915"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2541298"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2614100"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.2976273"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3005766"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3059427"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3232210"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2023.3272968"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.191"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2728644"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8430960"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.110878"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2024.3402430"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.07.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2890887"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2855169"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2018.2873152"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2019.8866439"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3005920"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3063712"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3132940"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3348816"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref53","first-page":"19","volume-title":"Advanced Encryption Standard","author":"Rijmen","year":"2001"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511546891"},{"issue":"15","key":"ref55","first-page":"15","article-title":"A study of encryption algorithms AES, DES and RSA for security","volume":"13","author":"Mahajan","year":"2013","journal-title":"Glob. J. Comput. Sci. Technol."},{"key":"ref56","volume-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings","year":"2013"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2022.3185561"},{"key":"ref60","article-title":"PyCryptodome library (3.15.0)","author":"Eijs","year":"2022"},{"key":"ref61","article-title":"Non-parametric Entropy Estimation Toolbox (NPEET)","author":"Steeg","year":"2022"},{"key":"ref62","article-title":"Python Paillier library (1.5.0)","year":"2022"}],"container-title":["IEEE Transactions on Automatic Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9\/11143928\/10904491.pdf?arnumber=10904491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T20:07:22Z","timestamp":1756498042000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10904491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":62,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tac.2025.3546087","relation":{},"ISSN":["0018-9286","1558-2523","2334-3303"],"issn-type":[{"value":"0018-9286","type":"print"},{"value":"1558-2523","type":"electronic"},{"value":"2334-3303","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}