{"id":"https://openalex.org/W4408126023","doi":"https://doi.org/10.1109/jiot.2025.3547595","title":"Machine Learning for Trust in Internet of Vehicles and Privacy in Distributed Edge Networks","display_name":"Machine Learning for Trust in Internet of Vehicles and Privacy in Distributed Edge Networks","publication_year":2025,"publication_date":"2025-03-03","ids":{"openalex":"https://openalex.org/W4408126023","doi":"https://doi.org/10.1109/jiot.2025.3547595"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3547595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3547595","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068099757","display_name":"Ikram Ud Din","orcid":null},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Ikram Ud Din","raw_affiliation_strings":["Department of Information Technology, The University of Haripur, Haripur, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-8896-547X","affiliations":[{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023956540","display_name":"Kamran Khan","orcid":"https://orcid.org/0000-0002-2517-3018"},"institutions":[{"id":"https://openalex.org/I2801349156","display_name":"University of Haripur","ror":"https://ror.org/05vtb1235","country_code":"PK","type":"education","lineage":["https://openalex.org/I2801349156"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Kamran Habib Khan","raw_affiliation_strings":["Department of Information Technology, The University of Haripur, Haripur, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Technology, The University of Haripur, Haripur, Pakistan","institution_ids":["https://openalex.org/I2801349156"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089600920","display_name":"Ahmad Almogren","orcid":"https://orcid.org/0000-0002-8253-9709"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahmad Almogren","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia","Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-8253-9709","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Chair of Cyber Security, Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE","Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-8972-8094","affiliations":[{"raw_affiliation_string":"Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210113480"]},{"raw_affiliation_string":"Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210113480"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068099757"],"corresponding_institution_ids":["https://openalex.org/I2801349156"],"apc_list":null,"apc_paid":null,"fwci":4.3465,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.93284854,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"12","issue":"12","first_page":"21488","last_page":"21495"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9632999897003174,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9557999968528748,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7664899826049805},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5560895204544067},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5557776093482971},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5200245380401611},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4542754590511322},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43775826692581177},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.423069030046463},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39756080508232117},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2853884994983673},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17197537422180176}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7664899826049805},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5560895204544067},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5557776093482971},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5200245380401611},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4542754590511322},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43775826692581177},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.423069030046463},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39756080508232117},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2853884994983673},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17197537422180176}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3547595","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3547595","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2990718401","https://openalex.org/W3007253316","https://openalex.org/W3174136208","https://openalex.org/W3204658318","https://openalex.org/W3210624065","https://openalex.org/W3210879719","https://openalex.org/W4318586148","https://openalex.org/W4319996447","https://openalex.org/W4377000479","https://openalex.org/W4377079888","https://openalex.org/W4385062300","https://openalex.org/W4389459156","https://openalex.org/W4390603597","https://openalex.org/W4391216229","https://openalex.org/W4391621069","https://openalex.org/W4392567270","https://openalex.org/W4392877636","https://openalex.org/W4393065904","https://openalex.org/W4394627383","https://openalex.org/W4394938932"],"related_works":["https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W3023564924","https://openalex.org/W2942586735","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613"],"abstract_inverted_index":{"As":[0],"the":[1,9,51,58,65,72,207,217,239],"Internet":[2],"of":[3,15,36,228,241],"Vehicles":[4],"(IoV)":[5],"continues":[6],"to":[7,39,85,92,117,120,142,145,193,211,238],"evolve,":[8],"imperative":[10],"for":[11,219],"advanced":[12],"algorithms":[13,37,182,230],"capable":[14],"managing":[16],"increased":[17],"network":[18,158],"demands,":[19],"ensuring":[20],"data":[21,185],"security,":[22],"and":[23,71,101,127,150,152,156,175,200,222],"boosting":[24],"overall":[25],"system":[26,42,53],"efficiency":[27,133],"becomes":[28],"crucial.":[29],"This":[30],"article":[31],"introduces":[32],"a":[33,82],"novel":[34],"suite":[35],"designed":[38],"enhance":[40],"IoV":[41,224,233],"performance":[43],"across":[44],"multiple":[45],"metrics.":[46],"Our":[47],"comprehensive":[48],"simulations":[49],"contrast":[50],"proposed":[52,208],"with":[54,110],"three":[55],"contemporary":[56],"approaches":[57],"two-layer":[59],"computing":[60],"resource":[61,131],"management":[62,75],"(TCRM)":[63],"model,":[64],"federated":[66],"edge":[67],"learning":[68],"(FEL)":[69],"approach,":[70],"blockchain-based":[73],"trust-value":[74],"(BTVM)":[76],"approach.":[77],"We":[78],"demonstrate":[79],"significant":[80],"improvements:":[81],"latency":[83],"reduction":[84],"as":[86,88],"low":[87],"90":[89],"ms,":[90,165],"compared":[91,119,144,192],"118":[93],"ms":[94,98,103,168,172,177],"in":[95,99,104,107,122,125,129,148,154,169,173,178,195,198,202],"TCRM,":[96,123,170,196],"125":[97],"FEL,":[100,126,151,174,199],"120":[102],"BTVM;":[105,130,155],"reliability":[106],"packet":[108],"delivery":[109],"an":[111,114],"enhancement":[112],"from":[113],"initial":[115],"98%":[116],"99.9%,":[118],"98.5%":[121],"97.8%":[124],"99.5%":[128,201],"utilization":[132],"that":[134],"surpasses":[135],"baseline":[136],"models":[137],"by":[138],"maintaining":[139],"rates":[140],"up":[141],"85%,":[143],"their":[146],"60\u201365%":[147],"TCRM":[149],"75%":[153],"swift":[157],"response":[159],"times":[160],"peaking":[161],"at":[162],"just":[163],"50":[164,176],"against":[166],"60":[167],"65":[171],"BTVM.":[179,203],"Additionally,":[180],"our":[181],"maintain":[183],"robust":[184],"security":[186],"levels,":[187],"consistently":[188],"achieving":[189],"100%":[190],"effectiveness,":[191],"99.2%":[194],"98.9%":[197],"These":[204],"results":[205],"underscore":[206],"system\u2019s":[209],"potential":[210],"significantly":[212],"outperform":[213],"existing":[214],"solutions,":[215],"paving":[216],"way":[218],"more":[220],"resilient":[221],"efficient":[223],"architectures.":[225],"The":[226],"integration":[227],"these":[229],"into":[231],"real-world":[232],"applications":[234],"can":[235],"substantially":[236],"contribute":[237],"advancement":[240],"intelligent":[242],"transportation":[243],"systems.":[244]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
