{"id":"https://openalex.org/W3016560828","doi":"https://doi.org/10.1109/jiot.2020.2987958","title":"Privacy-Preserving Federated Learning in Fog Computing","display_name":"Privacy-Preserving Federated Learning in Fog Computing","publication_year":2020,"publication_date":"2020-04-14","ids":{"openalex":"https://openalex.org/W3016560828","doi":"https://doi.org/10.1109/jiot.2020.2987958","mag":"3016560828"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.2987958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2987958","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016021356","display_name":"Chunyi Zhou","orcid":"https://orcid.org/0000-0003-0081-0946"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunyi Zhou","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]},{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Software, University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004495998","display_name":"Wei Yang","orcid":"https://orcid.org/0000-0001-7546-4465"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401884","display_name":"Yuqing Zhang","orcid":"https://orcid.org/0000-0001-8306-7195"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210108629","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016021356"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":21.9189,"has_fulltext":false,"cited_by_count":240,"citation_normalized_percentile":{"value":0.99574709,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"7","issue":"11","first_page":"10782","last_page":"10793"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8914362788200378},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6292839050292969},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5351102948188782},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5152778625488281},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4798945188522339},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4667663276195526},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.45501625537872314},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.44477930665016174},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.36425113677978516},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2958623170852661},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.1386624574661255},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11481583118438721}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8914362788200378},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6292839050292969},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5351102948188782},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5152778625488281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4798945188522339},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4667663276195526},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.45501625537872314},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.44477930665016174},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.36425113677978516},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2958623170852661},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.1386624574661255},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11481583118438721},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2020.2987958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2987958","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/147582","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/147582","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2011081604","display_name":null,"funder_award_id":"U1836210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G264155573","display_name":null,"funder_award_id":"30920021129","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3807962687","display_name":null,"funder_award_id":"61572255","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8425681394","display_name":null,"funder_award_id":"61802186","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8479330993","display_name":null,"funder_award_id":"61941116","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2031738616","https://openalex.org/W2051267297","https://openalex.org/W2053637704","https://openalex.org/W2104170724","https://openalex.org/W2147667726","https://openalex.org/W2283463896","https://openalex.org/W2473418344","https://openalex.org/W2489023468","https://openalex.org/W2589526368","https://openalex.org/W2591882872","https://openalex.org/W2701059868","https://openalex.org/W2752243939","https://openalex.org/W2767079719","https://openalex.org/W2770587725","https://openalex.org/W2781091734","https://openalex.org/W2783357829","https://openalex.org/W2790448487","https://openalex.org/W2791965076","https://openalex.org/W2793546227","https://openalex.org/W2794222060","https://openalex.org/W2886682270","https://openalex.org/W2889467566","https://openalex.org/W2891406774","https://openalex.org/W2911915417","https://openalex.org/W2912213068","https://openalex.org/W2919337578","https://openalex.org/W2939009479","https://openalex.org/W2946156608","https://openalex.org/W2963456518","https://openalex.org/W2963540401","https://openalex.org/W2970598121","https://openalex.org/W2990183786","https://openalex.org/W4300427714","https://openalex.org/W6738383168"],"related_works":["https://openalex.org/W4386820853","https://openalex.org/W4390887375","https://openalex.org/W2094069016","https://openalex.org/W4212859770","https://openalex.org/W1484081998","https://openalex.org/W3036675567","https://openalex.org/W2955273252","https://openalex.org/W2518050971","https://openalex.org/W1507098372","https://openalex.org/W2092515448"],"abstract_inverted_index":{"Federated":[0],"learning":[1,34,71,94],"can":[2,166],"combine":[3],"a":[4,68,78],"large":[5,119],"number":[6],"of":[7,32,41,47,61,115,121,142,156],"scattered":[8],"user":[9,26],"groups":[10],"and":[11,43,91,107,117,138,144,173],"train":[12],"models":[13],"collaboratively":[14],"without":[15],"uploading":[16],"data":[17,48,90,116,128,136,171,192],"sets,":[18],"so":[19],"as":[20,77],"to":[21,58,85,129,134],"avoid":[22],"the":[23,30,37,44,59,93,103,112,118,140,153,190],"server":[24],"collecting":[25],"sensitive":[27],"data.":[28],"However,":[29],"model":[31,108,149,157,174],"federated":[33,70],"will":[35,56],"expose":[36],"training":[38,105],"set":[39,193],"information":[40],"users,":[42],"uneven":[45,113],"amount":[46],"owned":[49],"by":[50,111,182],"users":[51],"in":[52,73,96,201],"multiple":[53,183],"users'":[54],"scenarios":[55],"lead":[57],"inefficiency":[60],"training.":[62],"In":[63,159],"this":[64],"article,":[65],"we":[66,161],"propose":[67],"privacy-preserving":[69],"scheme":[72,165,197],"fog":[74,81],"computing.":[75],"Acting":[76],"participant,":[79],"each":[80],"node":[82],"is":[83,198],"enabled":[84],"collect":[86],"Internet-of-Things":[87],"(IoT)":[88],"device":[89,127],"complete":[92],"task":[95],"our":[97,164,196],"scheme.":[98],"Such":[99],"design":[100],"effectively":[101],"improves":[102],"low":[104],"efficiency":[106],"accuracy":[109],"caused":[110],"distribution":[114],"gap":[120],"computing":[122],"power.":[123],"We":[124],"enable":[125],"IoT":[126],"satisfy":[130],"\u03b5":[131],"-differential":[132],"privacy":[133],"resist":[135,178],"attacks":[137,180],"leverage":[139],"combination":[141],"blinding":[143],"Paillier":[145],"homomorphic":[146],"encryption":[147],"against":[148],"attacks,":[150],"which":[151],"realize":[152],"security":[154,172,175],"aggregation":[155],"parameters.":[158],"addition,":[160],"formally":[162],"verified":[163],"not":[167],"only":[168],"guarantee":[169],"both":[170],"but":[176],"completely":[177],"collusion":[179],"launched":[181],"malicious":[184],"entities.":[185],"Our":[186],"experiments":[187],"based":[188],"on":[189],"Fashion-MNIST":[191],"prove":[194],"that":[195],"highly":[199],"efficient":[200],"practice.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":40},{"year":2024,"cited_by_count":36},{"year":2023,"cited_by_count":53},{"year":2022,"cited_by_count":67},{"year":2021,"cited_by_count":32},{"year":2020,"cited_by_count":10}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
