{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:48Z","timestamp":1773615708275,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.3103\/s0146411625700166","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T15:27:55Z","timestamp":1751642875000},"page":"194-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Differential Privacy and Multilayer Grouping Consensus Algorithm for Social Network Privacy and Security Management"],"prefix":"10.3103","volume":"59","author":[{"family":"Hejun Zhou","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,7,4]]},"reference":[{"key":"7827_CR1","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1093\/ct\/qtz035","volume":"31","author":"S. Trepte","year":"2021","unstructured":"Trepte, S., The social media privacy model: Privacy and communication in the light of social media affordances, Commun. Theory, 2021, vol. 31, no. 4, pp. 549\u2013570. https:\/\/doi.org\/10.1093\/ct\/qtz035","journal-title":"Commun. Theory"},{"key":"7827_CR2","doi-asserted-by":"publisher","first-page":"4688","DOI":"10.1109\/tsg.2020.3006883","volume":"11","author":"Yu. Wang","year":"2020","unstructured":"Wang, Yu., Nguyen, T.-L., Xu, Ya., Tran, Q.-T., and Caire, R., Peer-to-peer control for networked microgrids: Multi-layer and multi-agent architecture design, IEEE Trans. Smart Grid, 2020, vol. 11, no. 6, pp. 4688\u20134699. https:\/\/doi.org\/10.1109\/tsg.2020.3006883","journal-title":"IEEE Trans. Smart Grid"},{"key":"7827_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.jpdc.2020.06.003","volume":"145","author":"M. Ul Hassan","year":"2020","unstructured":"Ul Hassan, M., Rehmani, M.H., and Chen, J., Differential privacy in blockchain technology: A futuristic approach, J. Parallel Distrib. Comput., 2020, vol. 145, no. 3, pp. 50\u201374. https:\/\/doi.org\/10.1016\/j.jpdc.2020.06.003","journal-title":"J. Parallel Distrib. Comput."},{"key":"7827_CR4","doi-asserted-by":"publisher","first-page":"10430","DOI":"10.1109\/jiot.2021.3057419","volume":"8","author":"B. Jiang","year":"2021","unstructured":"Jiang, B., Li, J., Yue, G., and Song, H., Differential privacy for Industrial Internet of Things: Opportunities, applications, and challenges, IEEE Internet Things J., 2021, vol. 8, no. 13, pp. 10430\u201310451. https:\/\/doi.org\/10.1109\/jiot.2021.3057419","journal-title":"IEEE Internet Things J."},{"key":"7827_CR5","doi-asserted-by":"publisher","first-page":"1522","DOI":"10.1080\/00207543.2019.1660829","volume":"58","author":"I.J. Orji","year":"2020","unstructured":"Orji, I.J., Kusi-Sarpong, S., and Gupta, H., The critical success factors of using social media for supply chain social sustainability in the freight logistics industry, Int. J. Prod. Res., 2020, vol. 58, no. 5, pp. 1522\u20131539. https:\/\/doi.org\/10.1080\/00207543.2019.1660829","journal-title":"Int. J. Prod. Res."},{"key":"7827_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3382769","volume":"21","author":"Zh. Lv","year":"2021","unstructured":"Lv, Zh. and Piccialli, F., The security of medical data on Internet based on differential privacy technology, ACM Trans. Internet Technol., 2021, vol. 21, no. 3, pp. 1\u201318. https:\/\/doi.org\/10.1145\/3382769","journal-title":"ACM Trans. Internet Technol."},{"key":"7827_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.23919\/jcc.2020.09.005","volume":"17","author":"M. Bi","year":"2020","unstructured":"Bi, M., Wang, Yi., Cai, Zh., and Tong, X., A privacy-preserving mechanism based on local differential privacy in edge computing, China Commun., 2020, vol. 17, no. 9, pp. 50\u201365. https:\/\/doi.org\/10.23919\/jcc.2020.09.005","journal-title":"China Commun."},{"key":"7827_CR8","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1080\/08874417.2022.2089775","volume":"63","author":"J. Vasa","year":"2023","unstructured":"Vasa, J. and Thakkar, A., Deep learning: Differential privacy preservation in the era of big data, J. Comput. Inf. Syst., 2023, vol. 63, no. 3, pp. 608\u2013631. https:\/\/doi.org\/10.1080\/08874417.2022.2089775","journal-title":"J. Comput. Inf. Syst."},{"key":"7827_CR9","doi-asserted-by":"publisher","first-page":"8836","DOI":"10.1109\/jiot.2020.3037194","volume":"8","author":"Ya. Zhao","year":"2020","unstructured":"Zhao, Ya., Zhao, J., Yang, M., Wang, T., Wang, N., Lyu, L., Niyato, D., and Lam, K.-Y., Local differential privacy-based federated learning for Internet of Things, IEEE Internet Things J., 2020, vol. 8, no. 11, pp. 8836\u20138853. https:\/\/doi.org\/10.1109\/jiot.2020.3037194","journal-title":"IEEE Internet Things J."},{"key":"7827_CR10","doi-asserted-by":"publisher","first-page":"6367","DOI":"10.1002\/cpe.6367","volume":"33","author":"T. Fan","year":"2021","unstructured":"Fan, T. and Cui, Zh., Adaptive differential privacy preserving based on multi-objective optimization in deep neural networks, Concurrency Comput.: Pract. Exper., 2021, vol. 33, no. 20, pp. 6367\u20136379. https:\/\/doi.org\/10.1002\/cpe.6367","journal-title":"Concurrency Comput.: Pract. Exper."},{"key":"7827_CR11","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/tpds.2020.3042392","volume":"32","author":"W. Li","year":"2020","unstructured":"Li, W., Feng, Ch., Zhang, L., Xu, H., Cao, B., and Imran, M.A., A scalable multi-layer PBFT consensus for blockchain, IEEE Trans. Parallel Distrib. Syst., 2020, vol. 32, no. 5, pp. 1146\u20131160. https:\/\/doi.org\/10.1109\/tpds.2020.3042392","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7827_CR12","doi-asserted-by":"publisher","first-page":"4590","DOI":"10.1109\/jiot.2020.3028417","volume":"8","author":"X. Zuo","year":"2020","unstructured":"Zuo, X., Li, L., Luo, Sh., Peng, H., Yang, Yi., and Gong, L., Privacy-preserving verifiable graph intersection scheme with cryptographic accumulators in social networks, IEEE Internet Things J., 2020, vol. 8, no. 6, pp.\u00a04590\u20134603. https:\/\/doi.org\/10.1109\/jiot.2020.3028417","journal-title":"IEEE Internet Things J."},{"key":"7827_CR13","doi-asserted-by":"publisher","first-page":"772","DOI":"10.3390\/s21030772","volume":"21","author":"H. Honar Pajooh","year":"2021","unstructured":"Honar Pajooh, H., Rashid, M., Alam, F., and Demidenko, S., Multi-layer blockchain-based security architecture for Internet of Things, Sensors, 2021, vol. 21, no. 3, p. 772. https:\/\/doi.org\/10.3390\/s21030772","journal-title":"Sensors"},{"key":"7827_CR14","doi-asserted-by":"publisher","first-page":"5826","DOI":"10.1109\/TVT.2020.2968094","volume":"69","author":"K. Fan","year":"2020","unstructured":"Fan, K., Pan, Q., Zhang, K., Bai, Yu., Sun, Sh., Li, H., and Yang, Yi., A secure and verifiable data sharing scheme based on blockchain in vehicular social networks, IEEE Trans. Veh. Technol., 2020, vol. 69, no. 6, pp.\u00a05826\u20135835. https:\/\/doi.org\/10.1109\/TVT.2020.2968094","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7827_CR15","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/s11276-020-02470-5","volume":"27","author":"M.M. Dhanvijay","year":"2021","unstructured":"Dhanvijay, M.M. and Patil, Sh.C., Optimized mobility management protocol for the IoT based WBAN with an enhanced security, Wireless Networks, 2021, vol. 27, no. 1, pp. 537\u2013555. https:\/\/doi.org\/10.1007\/s11276-020-02470-5","journal-title":"Wireless Networks"},{"key":"7827_CR16","doi-asserted-by":"publisher","first-page":"3594","DOI":"10.1109\/tsg.2021.3058996","volume":"12","author":"Yu. Gao","year":"2021","unstructured":"Gao, Yu., Wang, W., and Yu, N., Consensus multi-agent reinforcement learning for volt-VAR control in power distribution networks, IEEE Trans. Smart Grid, 2021, vol. 12, no. 4, pp. 3594\u20133604. https:\/\/doi.org\/10.1109\/tsg.2021.3058996","journal-title":"IEEE Trans. Smart Grid"},{"key":"7827_CR17","doi-asserted-by":"publisher","first-page":"3152","DOI":"10.1109\/tcsi.2020.2986953","volume":"67","author":"G. Wen","year":"2020","unstructured":"Wen, G., Wang, P., Huang, T., Lu, J., and Zhang, F., Distributed consensus of layered multi-agent systems subject to attacks on edges, IEEE Trans. Circuits Syst. I: Regular Pap., 2020, vol. 67, no. 9, pp. 3152\u20133162. https:\/\/doi.org\/10.1109\/tcsi.2020.2986953","journal-title":"IEEE Trans. Circuits Syst. I: Regular Pap."},{"key":"7827_CR18","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1111\/cobi.13708","volume":"35","author":"E. Di Minin","year":"2021","unstructured":"Di Minin, E., Fink, Ch., Hausmann, A., Kremer, J., and Kulkarni, R., How to address data privacy concerns when using social media data in conservation science, Conserv. Biol., 2021, vol. 35, no. 2, pp. 437\u2013446. https:\/\/doi.org\/10.1111\/cobi.13708","journal-title":"Conserv. Biol."},{"key":"7827_CR19","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/jsyst.2020.2963840","volume":"15","author":"P.P. Ray","year":"2020","unstructured":"Ray, P.P., Dash, D., Salah, Kh., and Kumar, N., Blockchain for IoT-based healthcare: Background, consensus, platforms, and use cases, IEEE Syst. J., 2020, vol. 15, no. 1, pp. 85\u201394. https:\/\/doi.org\/10.1109\/jsyst.2020.2963840","journal-title":"IEEE Syst. J."},{"key":"7827_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.47852\/bonviewaia2202290","volume":"1","author":"M. Gheisari","year":"2023","unstructured":"Gheisari, M., Hamidpour, H., Liu, Ya., Saedi, P., Raza, A., Jalili, A., Rokhsati, H., and Amin, R., Data mining techniques for web mining: A survey, Artificial Intelligence and Applications, 2023, vol. 1, no. 1, pp. 3\u201310. https:\/\/doi.org\/10.47852\/bonviewaia2202290","journal-title":"Artificial Intelligence and Applications"},{"key":"7827_CR21","doi-asserted-by":"publisher","first-page":"215","DOI":"10.47852\/bonviewaaes32021480","volume":"2","author":"S.N.G. Aryavalli","year":"2023","unstructured":"Aryavalli, S.N.G. and Kumar, G.H., Futuristic vigilance: Empowering chipko movement with cyber-savvy IoT to safeguard forests, Archives of Advanced Engineering Science, 2023, vol. 2, no. 4, pp. 215\u2013223. https:\/\/doi.org\/10.47852\/bonviewaaes32021480","journal-title":"Archives of Advanced Engineering Science"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700166.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700166","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700166.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:34Z","timestamp":1773612214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["7827"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700166","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"2 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}