{"id":"https://openalex.org/W7141301421","doi":"https://doi.org/10.1007/s44443-026-00510-2","title":"Review on federated optimization in multi-tier architectures","display_name":"Review on federated optimization in multi-tier architectures","publication_year":2026,"publication_date":"2026-03-27","ids":{"openalex":"https://openalex.org/W7141301421","doi":"https://doi.org/10.1007/s44443-026-00510-2"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-026-00510-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00510-2","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-026-00510-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046028417","display_name":"Dinah Waref","orcid":null},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Dinah Waref","raw_affiliation_strings":["Media Engineering and Technology, German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Media Engineering and Technology, German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030300312","display_name":"Yomna Alayary","orcid":null},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Yomna Alayary","raw_affiliation_strings":["Media Engineering and Technology, German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Media Engineering and Technology, German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130725915","display_name":"Mohamed A. Abd El Ghany","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technische Universit\u00e4t Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]},{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["DE","EG"],"is_corresponding":false,"raw_author_name":"Mohamed A. Abd El Ghany","raw_affiliation_strings":["Information Engineering and Technology, German University in Cairo, Cairo, Egypt","Integrated Electronic Systems Lab, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Information Engineering and Technology, German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]},{"raw_affiliation_string":"Integrated Electronic Systems Lab, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104242443","display_name":"Mohammed A-M. Salem","orcid":null},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Mohammed A.-M. Salem","raw_affiliation_strings":["Media Engineering and Technology, German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Media Engineering and Technology, German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046028417"],"corresponding_institution_ids":["https://openalex.org/I96823368"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.81838205,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6308000087738037,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6308000087738037,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.11079999804496765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.03909999877214432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6819000244140625},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.6680999994277954},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6155999898910522},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5766000151634216},{"id":"https://openalex.org/keywords/cornerstone","display_name":"Cornerstone","score":0.4632999897003174},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4131999909877777},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.396699994802475},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.37779998779296875}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7581999897956848},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6819000244140625},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.6680999994277954},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6155999898910522},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5766000151634216},{"id":"https://openalex.org/C2780616401","wikidata":"https://www.wikidata.org/wiki/Q1133673","display_name":"Cornerstone","level":2,"score":0.4632999897003174},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4131999909877777},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39899998903274536},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.396699994802475},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.37779998779296875},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.34389999508857727},{"id":"https://openalex.org/C53619493","wikidata":"https://www.wikidata.org/wiki/Q4787093","display_name":"Architecture framework","level":3,"score":0.3077000081539154},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30079999566078186},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2897999882698059},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2703999876976013},{"id":"https://openalex.org/C3017813396","wikidata":"https://www.wikidata.org/wiki/Q17078173","display_name":"Resource constraints","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.26460000872612},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.25540000200271606}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-026-00510-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00510-2","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:323d9bf1636842ec8dbdd9a5e959cb3c","is_oa":true,"landing_page_url":"https://doaj.org/article/323d9bf1636842ec8dbdd9a5e959cb3c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 3 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-026-00510-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00510-2","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320324575","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W2114623221","https://openalex.org/W2416799949","https://openalex.org/W2568772110","https://openalex.org/W2624989916","https://openalex.org/W2767079719","https://openalex.org/W2950321888","https://openalex.org/W2972882814","https://openalex.org/W2995022099","https://openalex.org/W3045638580","https://openalex.org/W3047304572","https://openalex.org/W3109695251","https://openalex.org/W3138597937","https://openalex.org/W3164036272","https://openalex.org/W3178661111","https://openalex.org/W3182158470","https://openalex.org/W3205598877","https://openalex.org/W4205228770","https://openalex.org/W4210758839","https://openalex.org/W4225926344","https://openalex.org/W4226181429","https://openalex.org/W4297684215","https://openalex.org/W4378373518","https://openalex.org/W4384822670","https://openalex.org/W4385572321","https://openalex.org/W4386066601","https://openalex.org/W4386083155","https://openalex.org/W4386099004","https://openalex.org/W4386223029","https://openalex.org/W4386608426","https://openalex.org/W4387822993","https://openalex.org/W4388061054","https://openalex.org/W4389454722","https://openalex.org/W4390097772","https://openalex.org/W4392910504","https://openalex.org/W4395017388","https://openalex.org/W4401326396","https://openalex.org/W4401891541","https://openalex.org/W4402702992","https://openalex.org/W4402716118","https://openalex.org/W4402834214","https://openalex.org/W4403069563","https://openalex.org/W4403792029","https://openalex.org/W4405024129","https://openalex.org/W4405094165","https://openalex.org/W4405182551","https://openalex.org/W4405909353","https://openalex.org/W4406461230","https://openalex.org/W4406932573","https://openalex.org/W4407372774","https://openalex.org/W4407797655","https://openalex.org/W4408355032","https://openalex.org/W4408441545","https://openalex.org/W4408892806","https://openalex.org/W4408998396","https://openalex.org/W4410027536","https://openalex.org/W4410393759","https://openalex.org/W4410737883","https://openalex.org/W4411987607","https://openalex.org/W4412150104","https://openalex.org/W4412971785","https://openalex.org/W4413967224","https://openalex.org/W4414481243"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Federated":[1],"Learning":[2],"(FL)":[3],"enables":[4],"collaborative":[5],"model":[6],"training":[7],"without":[8],"exposing":[9],"sensitive":[10],"data,":[11],"making":[12],"it":[13],"a":[14,123],"cornerstone":[15],"for":[16,105,164],"privacy-aware":[17],"AI.":[18],"However,":[19],"bringing":[20],"FL":[21,169],"from":[22],"theory":[23],"to":[24,77,134],"practice":[25],"in":[26,57,136],"multi-tier":[27],"architectures":[28],"that":[29,53],"contain":[30],"hierarchical":[31,58],"edge-fog-cloud":[32],"systems":[33,95],"remains":[34],"difficult,":[35],"challenged":[36],"by":[37],"security":[38],"vulnerabilities,":[39],"resource":[40],"constraints,":[41],"and":[42,49,74,89,93,102,119,121,128,141,151,167],"system":[43],"heterogeneity.":[44],"This":[45],"paper":[46,155],"reviews":[47],"secure":[48],"adaptive":[50,81],"optimization":[51],"techniques":[52],"address":[54],"these":[55],"challenges":[56,127],"environments.":[59],"We":[60],"focus":[61],"on":[62],"three":[63],"main":[64],"areas:":[65],"(1)":[66],"security-enhanced":[67],"FL,":[68,137],"covering":[69],"threat":[70],"models,":[71],"adversarial":[72],"attacks,":[73],"defenses":[75],"tailored":[76],"layered":[78],"architectures;":[79],"(2)":[80],"optimization,":[82],"including":[83,138],"dynamic":[84],"client":[85],"selection,":[86],"resource-aware":[87],"aggregation,":[88],"context-sensitive":[90],"privacy":[91],"management;":[92],"(3)":[94],"integration,":[96],"examining":[97],"architectural":[98],"designs,":[99],"communication":[100],"protocols,":[101],"orchestration":[103],"methods":[104],"scalable":[106],"deployment.":[107],"By":[108],"synthesizing":[109],"recent":[110],"work,":[111],"the":[112,162],"survey":[113],"highlights":[114],"trade-offs":[115],"between":[116],"privacy,":[117],"performance,":[118],"scalability,":[120],"proposes":[122],"taxonomy":[124],"of":[125],"current":[126],"solutions.":[129],"It":[130],"also":[131],"evaluates":[132],"approaches":[133],"trustworthiness":[135],"fairness,":[139],"accountability,":[140],"robustness,":[142],"while":[143],"considering":[144],"practical":[145],"issues":[146],"such":[147],"as":[148],"regulation,":[149],"benchmarking,":[150],"deployment":[152],"constraints.":[153],"The":[154],"concludes":[156],"with":[157],"open":[158],"research":[159],"directions,":[160],"emphasizing":[161],"need":[163],"secure,":[165],"adaptive,":[166],"production-ready":[168],"systems.":[170]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-03-28T00:00:00"}
