{"id":"https://openalex.org/W7124426493","doi":"https://doi.org/10.1109/jiot.2026.3654762","title":"FedShard: A Sharding-Based Federated Learning Framework With Layered Incentivization for IoT","display_name":"FedShard: A Sharding-Based Federated Learning Framework With Layered Incentivization for IoT","publication_year":2026,"publication_date":"2026-01-15","ids":{"openalex":"https://openalex.org/W7124426493","doi":"https://doi.org/10.1109/jiot.2026.3654762"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2026.3654762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3654762","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043393347","display_name":"Juncheng Ma","orcid":"https://orcid.org/0000-0001-5750-9295"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juncheng Ma","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100358225","display_name":"Xiaojing Liu","orcid":"https://orcid.org/0000-0002-9712-2324"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiulong Liu","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101573590","display_name":"Changzhi Li","orcid":"https://orcid.org/0009-0004-4233-3329"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changzhi Li","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123189763","display_name":"Hao Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Xu","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123243390","display_name":"Keqiu Li","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keqiu Li","raw_affiliation_strings":["College of Intelligence and Computing, Tianjin University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043393347"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13977231,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"7","first_page":"13486","last_page":"13499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.003100000089034438,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.0024999999441206455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7688999772071838},{"id":"https://openalex.org/keywords/generalizability-theory","display_name":"Generalizability theory","score":0.5633000135421753},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.4846000075340271},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.4456999897956848},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4433000087738037},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4431999921798706},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42800000309944153},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4140999913215637}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8639000058174133},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7688999772071838},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.5633000135421753},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5145999789237976},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.4846000075340271},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.4456999897956848},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4433000087738037},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4431999921798706},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42800000309944153},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4140999913215637},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.37560001015663147},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3750999867916107},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.3598000109195709},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.34790000319480896},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.31769999861717224},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.31450000405311584},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31189998984336853},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3093999922275543},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3066999912261963},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3005000054836273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29739999771118164},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2797999978065491},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C204030448","wikidata":"https://www.wikidata.org/wiki/Q101017","display_name":"Distillation","level":2,"score":0.2630000114440918}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2026.3654762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2026.3654762","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"blockchain-based":[1],"federated":[2],"learning":[3],"framework":[4,71,156],"has":[5],"garnered":[6],"widespread":[7],"attention":[8],"to":[9,95,123,151,157,159,182],"ensure":[10,96],"data":[11],"privacy":[12,81,129],"and":[13,22,39,45,56,79,118,121,128,168,186,199,217],"trustworthy":[14],"computing":[15],"in":[16,51,103,130,215,221],"IoT":[17,31],"devices.":[18],"Improving":[19],"the":[20,27,60,100,104,125,155,165,206],"accuracy":[21,216],"scalability":[23],"are":[24],"paramount":[25],"for":[26],"increasing":[28],"demands":[29],"of":[30,53],"tasks.":[32],"However,":[33],"existing":[34],"solutions,":[35],"such":[36],"as":[37],"SIFL":[38],"ChainFL,":[40,200],"utilize":[41],"traditional":[42],"single-chain":[43],"architecture":[44],"fixed":[46],"models,":[47],"which":[48],"exhibit":[49],"limitations":[50],"terms":[52],"model":[54],"generalizability":[55,167],"scalability.":[57],"To":[58,163],"overcome":[59],"above":[61],"problems,":[62],"this":[63],"paper":[64],"proposes":[65],"<italic":[66,86,172,193],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[67,87,173,194],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">FedShard</i>,":[68,88],"an":[69],"FL":[70],"that":[72,114,139,202],"integrates":[73],"a":[74,80,109,135,147,176,211,218],"layered":[75,110],"dual-track":[76,111],"incentive":[77,112],"mechanism":[78,113],"knowledge":[82,136],"distillation":[83,137],"module.When":[84],"implementing":[85],"we":[89,107,133,145,170],"address":[90],"two":[91],"technical":[92],"challenges:":[93],"(1)":[94],"efficient":[97],"training":[98],"among":[99],"numerous":[101],"clients":[102],"sharding":[105],"architecture,":[106],"propose":[108,146],"provides":[115],"both":[116,184],"long-":[117],"short-term":[119],"rewards;":[120],"(2)":[122],"enhance":[124],"framework\u2019s":[126,166],"convergence":[127],"sharding-based":[131],"FL,":[132],"design":[134],"module":[138],"incorporates":[140],"local":[141],"differential":[142],"privacy.":[143],"Furthermore,":[144],"bucket-based":[148],"hash":[149],"ring":[150],"manage":[152],"clients,":[153],"enabling":[154],"adapt":[158],"dynamic":[160],"network":[161],"environments.":[162],"validate":[164],"scalability,":[169],"implement":[171],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">FedShard</i>":[174,195],"on":[175],"48-core":[177],"high-performance":[178],"server":[179],"using":[180],"Fabric":[181],"conduct":[183],"on-chain":[185],"off-chain":[187],"experiments.":[188],"Our":[189],"comprehensive":[190],"experiments,":[191],"comparing":[192],"with":[196],"SIFL,":[197],"PEFL,":[198],"reveal":[201],"our":[203],"solution":[204],"outperforms":[205],"state-of-the-art":[207],"methods":[208],"by":[209],"achieving":[210],"notable":[212],"29%":[213],"increase":[214],"22%":[219],"improvement":[220],"throughput.":[222]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2026-01-17T00:00:00"}
