[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
A brief survey on encrypted control: From the first to the second generation and beyond
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
Encrypted control for networked systems: An illustrative introduction and current challenges
Cloud computing and distributed computing are becoming ubiquitous in many modern
control areas such as smart grids, building automation, robot swarms, and intelligent …
control areas such as smart grids, building automation, robot swarms, and intelligent …
Privacy-preserving average consensus via state decomposition
Y Wang - IEEE Transactions on Automatic Control, 2019 - ieeexplore.ieee.org
Average consensus underpins key functionalities of distributed systems ranging from
distributed information fusion, decision-making, distributed optimization, to load balancing …
distributed information fusion, decision-making, distributed optimization, to load balancing …
Secure and privacy-preserving consensus
M Ruan, H Gao, Y Wang - IEEE Transactions on Automatic …, 2019 - ieeexplore.ieee.org
Consensus is fundamental for distributed systems since it underpins key functionalities of
such systems ranging from distributed information fusion, decision making, to decentralized …
such systems ranging from distributed information fusion, decision making, to decentralized …
Privacy preserving distributed optimization using homomorphic encryption
Y Lu, M Zhu - Automatica, 2018 - Elsevier
This paper studies how a system operator and a set of agents securely execute a distributed
projected gradient-based algorithm. In particular, each participant holds a set of problem …
projected gradient-based algorithm. In particular, each participant holds a set of problem …
ADMM based privacy-preserving decentralized optimization
Privacy preservation is addressed for decentralized optimization, where N agents
cooperatively minimize the sum of N convex functions private to these individual agents. In …
cooperatively minimize the sum of N convex functions private to these individual agents. In …
Toward a secure drone system: Flying with real-time homomorphic authenticated encryption
Controlling or accessing remotely has become a prevalent form of operating numerous
types of platforms and infrastructure. An exploding number of vehicles such as drones or …
types of platforms and infrastructure. An exploding number of vehicles such as drones or …
Towards encrypted MPC for linear constrained systems
We present an encrypted model predictive control (MPC) scheme for linear constrained
systems. More precisely, we show that homomorphic encryption can be used to realize a …
systems. More precisely, we show that homomorphic encryption can be used to realize a …
Quantization enabled privacy protection in decentralized stochastic optimization
By enabling multiple agents to cooperatively solve a global optimization problem in the
absence of a central coordinator, decentralized stochastic optimization is gaining increasing …
absence of a central coordinator, decentralized stochastic optimization is gaining increasing …