{"id":"https://openalex.org/W7124876593","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331528","title":"TwinSnake: A ZTN-Orchestrated Architecture for Secure AIoT Model Training with Digital Twins and Bio- Inspired Snake Learning in Smart Cities","display_name":"TwinSnake: A ZTN-Orchestrated Architecture for Secure AIoT Model Training with Digital Twins and Bio- Inspired Snake Learning in Smart Cities","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7124876593","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331528"},"language":null,"primary_location":{"id":"doi:10.1109/cloudcom67567.2025.11331528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005365885","display_name":"Anik Islam","orcid":"https://orcid.org/0000-0002-6725-9805"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Anik Islam","raw_affiliation_strings":["Schulich School of Engineering, University of Calgary,Department of Electrical &#x0026; Software Engineering,Calgary,Canada"],"affiliations":[{"raw_affiliation_string":"Schulich School of Engineering, University of Calgary,Department of Electrical &#x0026; Software Engineering,Calgary,Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123382182","display_name":"Hadis Karimipour","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hadis Karimipour","raw_affiliation_strings":["Schulich School of Engineering, University of Calgary,Department of Electrical &#x0026; Software Engineering,Calgary,Canada"],"affiliations":[{"raw_affiliation_string":"Schulich School of Engineering, University of Calgary,Department of Electrical &#x0026; Software Engineering,Calgary,Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041854978","display_name":"Thippa Reddy Gadekallu","orcid":null},"institutions":[{"id":"https://openalex.org/I1284762954","display_name":"Zhejiang A & F University","ror":"https://ror.org/02vj4rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I1284762954"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Thippa Reddy Gadekallu","raw_affiliation_strings":["College of Mathematics and Computer Science Zhejiang A&#x0026;F University,Hangzhou,China,311300"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science Zhejiang A&#x0026;F University,Hangzhou,China,311300","institution_ids":["https://openalex.org/I1284762954"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005365885"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.72944928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7748000025749207,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.7748000025749207,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.04280000180006027,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.03240000084042549,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6484000086784363},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.552299976348877},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5394999980926514},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5393999814987183},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.4083999991416931},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.38370001316070557},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.3528999984264374},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.34310001134872437},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.32589998841285706}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7620000243186951},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6484000086784363},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.552299976348877},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5394999980926514},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5393999814987183},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42719998955726624},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.4083999991416931},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.38370001316070557},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.3528999984264374},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34380000829696655},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.34310001134872437},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3398999869823456},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.31619998812675476},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.3061999976634979},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29420000314712524},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29319998621940613},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.2775000035762787},{"id":"https://openalex.org/C108734733","wikidata":"https://www.wikidata.org/wiki/Q1172333","display_name":"Data synchronization","level":3,"score":0.27239999175071716},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2694999873638153},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2667999863624573},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.2522999942302704},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudcom67567.2025.11331528","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331528","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2152195021","https://openalex.org/W4396605314","https://openalex.org/W4400314300","https://openalex.org/W4402891976","https://openalex.org/W4403123024","https://openalex.org/W4406311956","https://openalex.org/W4407782592","https://openalex.org/W4407937987","https://openalex.org/W4409249298","https://openalex.org/W4409581186","https://openalex.org/W4411270694","https://openalex.org/W4413318953"],"related_works":[],"abstract_inverted_index":{"Artificial":[0],"Intelligence":[1],"of":[2],"Things":[3],"(AIoT)":[4],"systems":[5],"are":[6,57],"increasingly":[7],"deployed":[8],"in":[9,151,155],"smart":[10,142],"cities":[11],"to":[12,63,88,107],"enable":[13],"automation,":[14],"resource":[15,28],"optimization,":[16],"and":[17,34,40,92,98,101,114,136,157,160],"real-time":[18],"decision-making.":[19],"How-ever,":[20],"large-scale":[21],"deployments":[22],"face":[23],"significant":[24],"challenges,":[25],"in-cluding":[26],"device-level":[27],"limitations,":[29],"communication":[30,93],"over-head,":[31],"synchronization":[32,90],"inefficiencies,":[33],"security":[35],"threats":[36],"such":[37],"as":[38],"data":[39],"model":[41],"poisoning.":[42],"To":[43],"address":[44],"these":[45],"issues,":[46],"a":[47,123,130,141,148],"digi-tal":[48],"twin-assisted":[49],"collaborative":[50],"learning":[51,85],"framework":[52],"is":[53,86,105,120],"proposed.":[54],"Resource-constrained":[55],"devices":[56],"virtualized":[58],"at":[59],"home":[60,143],"edge":[61],"servers":[62],"offload":[64],"computationally":[65],"intensive":[66],"training,":[67],"while":[68,129],"Multi-":[69],"access":[70],"Edge":[71],"Computing":[72],"(MEC)":[73],"nodes":[74],"equipped":[75],"with":[76,96],"Zero-Touch":[77],"Networking":[78],"(ZTN)":[79],"autonomously":[80],"orchestrate":[81],"training":[82],"policies.":[83],"Snake":[84],"adopted":[87],"reduce":[89],"delays":[91],"costs":[94],"compared":[95],"federated":[97],"split":[99],"learning,":[100],"Harris":[102],"Hawks":[103],"Optimization":[104],"applied":[106],"select":[108],"participants":[109],"based":[110],"on":[111,140],"trust,":[112],"resources,":[113],"latency.":[115],"Robustness":[116],"against":[117],"ad-versarial":[118],"updates":[119],"ensured":[121],"through":[122],"trust-weighted":[124],"Adaptive":[125],"Multi-Krum":[126],"aggregation":[127],"mechanism,":[128],"permissioned":[131],"blockchain":[132],"provides":[133],"tamper-proof":[134],"auditability":[135],"accountability.":[137],"Experimental":[138],"results":[139],"intrusion":[144],"detection":[145],"dataset":[146],"demonstrate":[147],"50-65%":[149],"reduction":[150,154],"communication,":[152],"30-45%":[153],"computation":[156],"energy":[158],"consumption,":[159],"Fl-":[161],"scores":[162],"above":[163],"95":[164],"%":[165,169],"even":[166],"under":[167],"40":[168],"adversarial":[170],"participation.":[171]},"counts_by_year":[],"updated_date":"2026-01-22T23:29:09.771500","created_date":"2026-01-21T00:00:00"}
