{"id":"https://openalex.org/W4409014317","doi":"https://doi.org/10.1109/jiot.2025.3555646","title":"Efficient and Secure Federated Knowledge Transfer Under Non-IID Settings in IoT","display_name":"Efficient and Secure Federated Knowledge Transfer Under Non-IID Settings in IoT","publication_year":2025,"publication_date":"2025-03-31","ids":{"openalex":"https://openalex.org/W4409014317","doi":"https://doi.org/10.1109/jiot.2025.3555646"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3555646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3555646","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100626218","display_name":"Shuying Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuying Liu","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081473987","display_name":"Rongpeng Xie","orcid":"https://orcid.org/0000-0001-5506-0367"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongpeng Xie","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102885964","display_name":"Yinbin Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009188924","display_name":"Jinye Peng","orcid":"https://orcid.org/0000-0002-6725-1387"},"institutions":[{"id":"https://openalex.org/I37802460","display_name":"Northwest University","ror":"https://ror.org/00z3td547","country_code":"CN","type":"education","lineage":["https://openalex.org/I37802460"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinye Peng","raw_affiliation_strings":["School of Information Science and Technology, Northwest University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Northwest University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I37802460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011960721","display_name":"Tao Leng","orcid":"https://orcid.org/0009-0002-2705-3826"},"institutions":[{"id":"https://openalex.org/I4210147983","display_name":"Guangdong Police College","ror":"https://ror.org/05krxyw16","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Leng","raw_affiliation_strings":["Intelligent Policing Key Laboratory of Sichuan Province, Sichuan Police College, Luzhou, China"],"affiliations":[{"raw_affiliation_string":"Intelligent Policing Key Laboratory of Sichuan Province, Sichuan Police College, Luzhou, China","institution_ids":["https://openalex.org/I4210147983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100626218"],"corresponding_institution_ids":["https://openalex.org/I37802460"],"apc_list":null,"apc_paid":null,"fwci":2.4849,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.888599,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"13","first_page":"24644","last_page":"24655"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8399803638458252},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4599217176437378},{"id":"https://openalex.org/keywords/knowledge-transfer","display_name":"Knowledge transfer","score":0.45004141330718994},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37792980670928955},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36160314083099365},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.2229001522064209}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8399803638458252},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4599217176437378},{"id":"https://openalex.org/C2776960227","wikidata":"https://www.wikidata.org/wiki/Q2586354","display_name":"Knowledge transfer","level":2,"score":0.45004141330718994},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37792980670928955},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36160314083099365},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2229001522064209}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3555646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3555646","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1798609567","https://openalex.org/W2132172731","https://openalex.org/W2177209050","https://openalex.org/W2701059868","https://openalex.org/W2767079719","https://openalex.org/W2768174108","https://openalex.org/W2781091734","https://openalex.org/W2943847483","https://openalex.org/W2963318081","https://openalex.org/W2989289980","https://openalex.org/W3008990186","https://openalex.org/W3038122394","https://openalex.org/W3047304572","https://openalex.org/W3092485153","https://openalex.org/W3094542121","https://openalex.org/W3138090943","https://openalex.org/W3182125009","https://openalex.org/W3196371845","https://openalex.org/W3209752568","https://openalex.org/W3213321731","https://openalex.org/W4287332481","https://openalex.org/W4386264650","https://openalex.org/W4390904993","https://openalex.org/W4390906206","https://openalex.org/W4391806964","https://openalex.org/W6728757088","https://openalex.org/W6752029299","https://openalex.org/W6759238902","https://openalex.org/W6763780468","https://openalex.org/W6764838729","https://openalex.org/W6771652451","https://openalex.org/W6773817997","https://openalex.org/W6795843344"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"In":[0,75],"the":[1,18,24,29,32,90,100],"era":[2],"of":[3,5,34,92],"Internet":[4],"Things":[6],"(IoT)":[7],"and":[8,37,39,119,132],"federated":[9],"learning":[10],"(FL),":[11],"where":[12],"distributed":[13,41],"training":[14],"models":[15],"are":[16],"essential,":[17],"FL":[19],"paradigm":[20],"has":[21],"come":[22],"into":[23],"spotlight":[25],"for":[26],"researchers.":[27],"However,":[28],"inconsistency":[30],"in":[31,48,73,129],"sources":[33],"client":[35],"data":[36,57,93,102],"non-independent":[38],"identically":[40],"(Non-IID)":[42],"heterogeneous":[43],"characteristics":[44],"lead":[45],"to":[46,55,138],"loss":[47],"model":[49,107,134],"accuracy.":[50,108],"Existing":[51],"method":[52],"which":[53],"attempts":[54],"homogenize":[56],"distribution":[58],"among":[59],"clients":[60,72],"based":[61],"on":[62,71],"generative":[63],"adversarial":[64],"networks":[65],"(GANs)":[66],"incurs":[67],"high":[68],"computation":[69],"overheads":[70],"IoT.":[74],"this":[76],"article,":[77],"we":[78],"propose":[79],"a":[80,126],"lightweight":[81],"feature":[82],"prototype":[83],"knowledge":[84],"transfer":[85],"(FPKT)":[86],"mechanism.":[87],"By":[88],"capturing":[89],"essence":[91],"categories,":[94],"FPKT":[95,113],"generates":[96],"pseudo-features":[97],"without":[98],"requiring":[99],"original":[101],"features,":[103],"thereby":[104],"efficiently":[105],"enhancing":[106],"We":[109],"formally":[110],"prove":[111],"that":[112,122],"resists":[114],"chosen":[115],"plaintext":[116],"attack":[117],"(CPA)":[118],"experiments":[120],"demonstrate":[121],"our":[123],"scheme":[124],"achieves":[125],"hundredfold":[127],"increase":[128],"computational":[130],"efficiency":[131],"improves":[133],"accuracy":[135],"by":[136],"up":[137],"40%.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
