{"id":"https://openalex.org/W7084056498","doi":"https://doi.org/10.1109/infocomwkshps65812.2025.11152832","title":"Zero Trust Architecture for Securing Edge AI and Federated Learning in Edge Computing","display_name":"Zero Trust Architecture for Securing Edge AI and Federated Learning in Edge Computing","publication_year":2025,"publication_date":"2025-05-19","ids":{"openalex":"https://openalex.org/W7084056498","doi":"https://doi.org/10.1109/infocomwkshps65812.2025.11152832"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps65812.2025.11152832","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps65812.2025.11152832","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2025 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shengjie Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shengjie Xu","raw_affiliation_strings":["University of Arizona,Intelligence, and Information Operations, College of Applied Science and Technology,Department of Cyber,Tucson,Arizona,USA,85721"],"affiliations":[{"raw_affiliation_string":"University of Arizona,Intelligence, and Information Operations, College of Applied Science and Technology,Department of Cyber,Tucson,Arizona,USA,85721","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yi Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]},{"id":"https://openalex.org/I122266389","display_name":"University of Nebraska at Omaha","ror":"https://ror.org/04yrkc140","country_code":"US","type":"education","lineage":["https://openalex.org/I122266389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yi Qian","raw_affiliation_strings":["University of Nebraska-Lincoln,College of Engineering,Department of Electrical and Computer Engineering,Omaha,Nebraska,USA,68182"],"affiliations":[{"raw_affiliation_string":"University of Nebraska-Lincoln,College of Engineering,Department of Electrical and Computer Engineering,Omaha,Nebraska,USA,68182","institution_ids":["https://openalex.org/I114395901","https://openalex.org/I122266389"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":1.7128,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.86521461,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T14323","display_name":"Agriculture, Water, and Health","score":0.11890000104904175,"subfield":{"id":"https://openalex.org/subfields/2312","display_name":"Water Science and Technology"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14323","display_name":"Agriculture, Water, and Health","score":0.11890000104904175,"subfield":{"id":"https://openalex.org/subfields/2312","display_name":"Water Science and Technology"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14010","display_name":"Food Industry and Aquatic Biology","score":0.013100000098347664,"subfield":{"id":"https://openalex.org/subfields/1106","display_name":"Food Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T14405","display_name":"Fisheries and Aquaculture Studies","score":0.012400000356137753,"subfield":{"id":"https://openalex.org/subfields/1100","display_name":"General Agricultural and Biological Sciences"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6428999900817871},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.628000020980835},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6148999929428101},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5601999759674072},{"id":"https://openalex.org/keywords/foundation","display_name":"Foundation (evidence)","score":0.555400013923645},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5534999966621399},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.48010000586509705},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4002000093460083}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.744700014591217},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6428999900817871},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.628000020980835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6152999997138977},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6148999929428101},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5601999759674072},{"id":"https://openalex.org/C2780966255","wikidata":"https://www.wikidata.org/wiki/Q5474306","display_name":"Foundation (evidence)","level":2,"score":0.555400013923645},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5534999966621399},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.48010000586509705},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4002000093460083},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.3869999945163727},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3544999957084656},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28839999437332153},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2809999883174896},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.28060001134872437},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C2780934415","wikidata":"https://www.wikidata.org/wiki/Q20997131","display_name":"Border Security","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25929999351501465},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps65812.2025.11152832","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps65812.2025.11152832","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2025 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4312167167663574,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2969804742","https://openalex.org/W2976189582","https://openalex.org/W4388191438"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"security":[1,23,91],"vulnerabilities":[2],"in":[3,7,85],"AI":[4,9,54,87],"systems,":[5,32],"particularly":[6],"Edge":[8,53],"and":[10,55,62],"federated":[11,56],"learning":[12],"environments,":[13],"have":[14],"highlighted":[15],"the":[16,34,63,68,73,80,90],"need":[17],"for":[18,27,52,75],"robust":[19],"defense":[20],"mechanisms.":[21],"Traditional":[22],"models":[24],"are":[25],"inadequate":[26],"protecting":[28],"these":[29],"complex,":[30],"distributed":[31],"motivating":[33],"exploration":[35],"of":[36,67,82,92],"Zero":[37,48,83],"Trust":[38,49,84],"principles":[39],"as":[40],"a":[41,47],"potential":[42],"solution.":[43],"This":[44,70],"paper":[45],"proposes":[46],"Architecture":[50],"tailored":[51],"learning,":[57],"outlining":[58],"its":[59],"logical":[60],"components":[61],"general":[64],"inner":[65],"workings":[66],"architecture.":[69],"work":[71],"lays":[72],"foundation":[74],"our":[76],"future":[77],"research":[78],"on":[79],"integration":[81],"emerging":[86],"architectures,":[88],"advancing":[89],"edge":[93],"systems.":[94]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
