{"id":"https://openalex.org/W7105599765","doi":"https://doi.org/10.1109/jiot.2025.3632564","title":"POST: Pruning Oriented Security for Inversion Attack in Edge-Based Internet of Things","display_name":"POST: Pruning Oriented Security for Inversion Attack in Edge-Based Internet of Things","publication_year":2025,"publication_date":"2025-11-13","ids":{"openalex":"https://openalex.org/W7105599765","doi":"https://doi.org/10.1109/jiot.2025.3632564"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3632564","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3632564","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jiot.2025.3632564","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sunder Ali Khowaja","orcid":null},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Sunder Ali Khowaja","raw_affiliation_strings":["School of Computing, Dublin City University, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computing, Dublin City University, Dublin, Ireland","institution_ids":["https://openalex.org/I42934936"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Abi Waqas","orcid":"https://orcid.org/0000-0001-6019-4212"},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Abi Waqas","raw_affiliation_strings":["Tyndall National Institute, University College Cork, Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"Tyndall National Institute, University College Cork, Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mohammad Tabrez Quasim","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136004","display_name":"University of Bisha","ror":"https://ror.org/040548g92","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210136004"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad Tabrez Quasim","raw_affiliation_strings":["Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia","institution_ids":["https://openalex.org/I4210136004"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kapal Dev","orcid":"https://orcid.org/0000-0003-1262-8594"},"institutions":[{"id":"https://openalex.org/I4210100923","display_name":"Munster Technological University","ror":"https://ror.org/013xpqh61","country_code":"IE","type":"facility","lineage":["https://openalex.org/I4210100923"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Kapal Dev","raw_affiliation_strings":["ADAPT Centre, Department of Computer Science and Munster Technological University, Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"ADAPT Centre, Department of Computer Science and Munster Technological University, Cork, Ireland","institution_ids":["https://openalex.org/I4210100923"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I42934936"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.76766721,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"3","first_page":"4411","last_page":"4420"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8503999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8503999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.03189999982714653,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.027400000020861626,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6721000075340271},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5152000188827515},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4871000051498413},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4260999858379364},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4147999882698059},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.41019999980926514},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4081000089645386},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3991999924182892},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.38580000400543213}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8740000128746033},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6721000075340271},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5152000188827515},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4871000051498413},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47859999537467957},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47119998931884766},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42980000376701355},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4260999858379364},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4147999882698059},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.41019999980926514},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4081000089645386},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3991999924182892},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C1893757","wikidata":"https://www.wikidata.org/wiki/Q3653001","display_name":"Inversion (geology)","level":3,"score":0.3790000081062317},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.35089999437332153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3407999873161316},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.335999995470047},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.32739999890327454},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31470000743865967},{"id":"https://openalex.org/C2776135515","wikidata":"https://www.wikidata.org/wiki/Q17143721","display_name":"Regularization (linguistics)","level":2,"score":0.30790001153945923},{"id":"https://openalex.org/C2781041963","wikidata":"https://www.wikidata.org/wiki/Q18348618","display_name":"Computation offloading","level":4,"score":0.3037000000476837},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.2840999960899353},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.2768000066280365},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.2732999920845032},{"id":"https://openalex.org/C158156997","wikidata":"https://www.wikidata.org/wiki/Q1416645","display_name":"Models of communication","level":2,"score":0.26919999718666077},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.26249998807907104},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3632564","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3632564","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jiot.2025.3632564","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3632564","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G188436057","display_name":null,"funder_award_id":"847652","funder_id":"https://openalex.org/F4320320217","funder_display_name":"Marie Curie"}],"funders":[{"id":"https://openalex.org/F4320319621","display_name":"University of Bisha","ror":"https://ror.org/040548g92"},{"id":"https://openalex.org/F4320320217","display_name":"Marie Curie","ror":"https://ror.org/02aqv1x10"},{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2100556411","https://openalex.org/W2624989916","https://openalex.org/W2924515500","https://openalex.org/W2945335799","https://openalex.org/W2950143435","https://openalex.org/W2953354017","https://openalex.org/W2953759675","https://openalex.org/W2963209930","https://openalex.org/W2964905537","https://openalex.org/W2997378229","https://openalex.org/W3018102029","https://openalex.org/W3035616549","https://openalex.org/W3084432478","https://openalex.org/W3108146280","https://openalex.org/W3135057764","https://openalex.org/W3135345339","https://openalex.org/W3153022867","https://openalex.org/W3180884825","https://openalex.org/W4206354626","https://openalex.org/W4210494403","https://openalex.org/W4224277635","https://openalex.org/W4313066449","https://openalex.org/W4313154644","https://openalex.org/W4378697396","https://openalex.org/W4387870193","https://openalex.org/W4392663354","https://openalex.org/W4394597694","https://openalex.org/W4394674411","https://openalex.org/W4396878072","https://openalex.org/W4400276351","https://openalex.org/W4403277839"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,33,50,61,75,109,131,142,152,157,161,164,172,177,181,188,197,200,206,222,225,235],"recent":[2],"emergence":[3],"of":[4,52,55,144,149,180,199,202,224,230],"artificial":[5],"intelligence":[6],"(AI),":[7],"edge":[8],"users":[9],"in":[10,32,60,116,151,171,205,217,228],"industries":[11,35],"and":[12,23,74,89,92,122,133,168,190,240],"manufacturing":[13,34,62],"have":[14,65],"been":[15],"extensively":[16],"using":[17,145],"AI-based":[18],"services,":[19],"which":[20,155],"pose":[21],"privacy":[22,135,201,232],"security":[24,102],"risks":[25],"to":[26,82,95,175,194,220],"data.":[27],"Distributed":[28],"learning":[29,68,73,77],"approaches":[30,42],"deployed":[31],"help":[36],"reduce":[37,176],"data":[38,132],"risks.":[39],"However,":[40],"traditional":[41],"cannot":[43],"handle":[44],"deep":[45],"models":[46],"as":[47,49],"well":[48],"scalability":[51],"edge-based":[53],"internet":[54],"things":[56],"(E-IoT)":[57],"devices,":[58,127,154],"especially":[59],"sector.":[63],"Studies":[64],"proposed":[66],"SplitFed":[67],"(SFL)":[69],"by":[70],"combining":[71],"split":[72],"federated":[76],"paradigm,":[78],"but":[79,128],"they":[80],"fail":[81],"achieve":[83],"an":[84],"optimal":[85],"trade-off":[86,237],"between":[87,120],"communication":[88,121,167,239],"computational":[90],"limitations":[91],"are":[93],"vulnerable":[94],"inversion":[96,137],"attacks.":[97,138],"We":[98,209],"present":[99],"a":[100,118,146],"pruning-oriented":[101],"(POST)":[103],"method":[104,186,227],"that":[105,112],"is":[106],"designed":[107],"around":[108],"SFL":[110,207],"paradigm":[111],"not":[113],"only":[114],"helps":[115],"achieving":[117],"balance":[119],"computation":[123,169,241],"load":[124],"for":[125,238],"E-IoT":[126,153],"also":[129],"preserves":[130],"model":[134],"against":[136],"The":[139,183],"POST":[140,165,226],"leverages":[141],"concept":[143],"higher":[147],"number":[148],"layers":[150],"restrains":[156],"attacker":[158],"from":[159],"reconstructing":[160],"outputs.":[162],"Furthermore,":[163],"adds":[166],"constraints":[170],"optimization":[173],"function":[174],"overall":[178],"cost":[179],"method.":[182],"novel":[184],"pruning":[185],"adopts":[187],"regularization":[189],"adversarial":[191],"training":[192],"approach":[193],"further":[195],"improve":[196],"preservation":[198],"intermediate":[203],"features":[204],"paradigm.":[208],"conduct":[210],"our":[211],"experiments":[212],"on":[213],"publicly":[214],"available":[215],"datasets":[216],"real-world":[218],"settings":[219],"illustrate":[221],"efficacy":[223],"terms":[229],"preserving":[231],"while":[233],"ensuring":[234],"best":[236],"load.":[242]},"counts_by_year":[],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-11-13T00:00:00"}
