iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/TCNS.2023.3298198
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:11:42Z","timestamp":1719360702944},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973078","62173175"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"333 Engineering"},{"name":"Foundation of Jiangsu Province","award":["BRA2019260"]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2021M702913","2023T160585"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tcns.2023.3298198","type":"journal-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:53:26Z","timestamp":1690221206000},"page":"696-704","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Bipartite Consensus on Signed Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6115-5282","authenticated-orcid":false,"given":"Jing","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4423-6034","authenticated-orcid":false,"given":"Jianquan","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Mathematics, Southeast University, Nanjing, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7560-5467","authenticated-orcid":false,"given":"Xiangyong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Automation and Electrical Engineering, Linyi University, Linyi, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7196-5753","authenticated-orcid":false,"given":"Jie","family":"Zhong","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Zhejiang Normal University, Jinhua, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.72.036121"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3068365"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199564439.001.0001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3065650"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2985860"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(82)90033-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2224251"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3038662"},{"key":"ref9","volume-title":"The Theoy of Political Coalitions","author":"Riker","year":"1962"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2937759"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3034531"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2939929"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1201\/b17668"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref18","volume-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry","year":"2009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2968876"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2890887"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2842221"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381978"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109283"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.03.016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.10.019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2564339"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2013.6669251"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919746"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2918709"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814608"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1608"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3219929"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2902731"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3081372"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2939680"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109253"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2528539"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0038135"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2424225"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2850765"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2938419"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433217"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6509490\/10564798\/10192070.pdf?arnumber=10192070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:50:19Z","timestamp":1719348619000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10192070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":42,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2023.3298198","relation":{},"ISSN":["2325-5870","2372-2533"],"issn-type":[{"value":"2325-5870","type":"electronic"},{"value":"2372-2533","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}