{"id":"https://openalex.org/W4361770824","doi":"https://doi.org/10.1109/jiot.2023.3262546","title":"Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT","display_name":"Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT","publication_year":2023,"publication_date":"2023-03-28","ids":{"openalex":"https://openalex.org/W4361770824","doi":"https://doi.org/10.1109/jiot.2023.3262546"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3262546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3262546","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090060787","display_name":"Xinru Yan","orcid":"https://orcid.org/0000-0002-3595-7422"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinru Yan","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yinbin Miao","orcid":"https://orcid.org/0000-0003-3260-4530"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100626958","display_name":"Xinghua Li","orcid":"https://orcid.org/0000-0002-5583-4155"},"institutions":[{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"government","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinghua Li","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","Engineering Research Center of Big Data Security, Ministry of Education, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Engineering Research Center of Big Data Security, Ministry of Education, Xi'an, China","institution_ids":["https://openalex.org/I1327237609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100693146","display_name":"Xiangdong Meng","orcid":"https://orcid.org/0000-0002-6349-6205"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangdong Meng","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Bras Basah, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Bras Basah, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5090060787"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":10.1873,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.98696103,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"10","issue":"15","first_page":"13281","last_page":"13291"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.898022472858429},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.7993017435073853},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6029032468795776},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5937219858169556},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.5894149541854858},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.550821840763092},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5315050482749939},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.512850284576416},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5097343325614929},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5011332035064697},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4809629023075104},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46034955978393555},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3929522633552551},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3674864172935486},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.30554836988449097},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18821817636489868},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.1711650788784027}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.898022472858429},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.7993017435073853},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6029032468795776},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5937219858169556},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.5894149541854858},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.550821840763092},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5315050482749939},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.512850284576416},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5097343325614929},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5011332035064697},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4809629023075104},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46034955978393555},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3929522633552551},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3674864172935486},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.30554836988449097},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18821817636489868},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.1711650788784027},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2023.3262546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3262546","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-9191","is_oa":false,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/8188","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/JIOT.2023.3262546","raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1819083007","display_name":null,"funder_award_id":"62125205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4390492556","display_name":null,"funder_award_id":"2022T150507","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G564380355","display_name":null,"funder_award_id":"62072361","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6921191723","display_name":null,"funder_award_id":"2022GY-019","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W2109426455","https://openalex.org/W2112796928","https://openalex.org/W2535838896","https://openalex.org/W2626580042","https://openalex.org/W2701059868","https://openalex.org/W2750384547","https://openalex.org/W2886444620","https://openalex.org/W2912213068","https://openalex.org/W2913353093","https://openalex.org/W2913435035","https://openalex.org/W2921434559","https://openalex.org/W2944926814","https://openalex.org/W2972714212","https://openalex.org/W2974429275","https://openalex.org/W2983640973","https://openalex.org/W3004375621","https://openalex.org/W3006655855","https://openalex.org/W3009627224","https://openalex.org/W3038022836","https://openalex.org/W3042336089","https://openalex.org/W3043303805","https://openalex.org/W3084128899","https://openalex.org/W3087287021","https://openalex.org/W3096609273","https://openalex.org/W3140753276","https://openalex.org/W3156173029","https://openalex.org/W3160260334","https://openalex.org/W3174463766","https://openalex.org/W3181414820","https://openalex.org/W4205228770","https://openalex.org/W4250689432","https://openalex.org/W4290996316","https://openalex.org/W4297687186","https://openalex.org/W4318619660","https://openalex.org/W6639246211","https://openalex.org/W6728757088","https://openalex.org/W6739554518","https://openalex.org/W6743688258","https://openalex.org/W6754708698","https://openalex.org/W6758696238","https://openalex.org/W6759238902","https://openalex.org/W6760214840","https://openalex.org/W6762990939","https://openalex.org/W6780438843"],"related_works":["https://openalex.org/W2145120192","https://openalex.org/W3210293592","https://openalex.org/W4285814369","https://openalex.org/W4312762663","https://openalex.org/W4385749934","https://openalex.org/W3201612435","https://openalex.org/W3129381981","https://openalex.org/W3112310000","https://openalex.org/W4376881384","https://openalex.org/W4390607445"],"abstract_inverted_index":{"To":[0,65],"solve":[1,66],"the":[2,7,124,141,144],"data":[3],"island":[4],"issue":[5],"in":[6,24,61,104],"distributed":[8],"Internet":[9],"of":[10,40,58,88,143],"Things":[11],"(IoT)":[12],"without":[13],"privacy":[14,111],"leakage,":[15],"privacy-preserving":[16,72],"federated":[17,74],"learning":[18,75],"(PPFL)":[19],"has":[20],"been":[21],"extensively":[22],"explored":[23],"both":[25],"academic":[26],"and":[27,42,53,90,108,119,129,131],"industrial":[28],"fields.":[29],"However,":[30],"existing":[31],"PPFL":[32],"solutions":[33],"still":[34],"suffer":[35],"from":[36],"a":[37,49,56,71,99],"single":[38,86],"point":[39],"failure":[41,89],"incur":[43],"untrusted":[44],"aggregation":[45,92,97],"results":[46],"caused":[47],"by":[48,77],"malicious":[50],"central":[51],"server,":[52],"even":[54],"cause":[55],"loss":[57],"model":[59,96],"accuracy":[60,142],"an":[62,105],"asynchronous":[63,73,106],"setting.":[64],"these":[67],"issues,":[68],"we":[69,81],"propose":[70],"scheme":[76,126,137],"using":[78],"blockchain.":[79],"Specifically,":[80],"use":[82],"blockchain":[83],"to":[84,112],"address":[85],"points":[87],"untrustworthy":[91],"results,":[93],"implement":[94],"reliable":[95],"utilizing":[98],"practical":[100],"byzantine":[101],"fault-tolerant":[102],"protocol":[103],"setting,":[107],"leverage":[109],"differential":[110],"improve":[113],"system":[114,145],"robustness.":[115],"Formal":[116],"security":[117],"analysis":[118,121],"convergence":[120],"demonstrate":[122,134],"that":[123,135],"proposed":[125],"is":[127],"secure":[128],"robust,":[130],"extensive":[132],"experiments":[133],"our":[136],"can":[138],"effectively":[139],"ensure":[140],"when":[146],"compared":[147],"with":[148],"state-of-the-art":[149],"schemes.":[150]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
