{"id":"https://openalex.org/W4409474257","doi":"https://doi.org/10.1109/jsac.2025.3560012","title":"Decentralized Federated Graph Learning With Lightweight Zero Trust Architecture for Next-Generation Networking Security","display_name":"Decentralized Federated Graph Learning With Lightweight Zero Trust Architecture for Next-Generation Networking Security","publication_year":2025,"publication_date":"2025-04-15","ids":{"openalex":"https://openalex.org/W4409474257","doi":"https://doi.org/10.1109/jsac.2025.3560012"},"language":"en","primary_location":{"id":"doi:10.1109/jsac.2025.3560012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2025.3560012","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055675863","display_name":"Xiaokang Zhou","orcid":"https://orcid.org/0000-0003-3488-4679"},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Xiaokang Zhou","raw_affiliation_strings":["Faculty of Business Data Science, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Business Data Science, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073441538","display_name":"Wei Liang","orcid":"https://orcid.org/0000-0002-0689-256X"},"institutions":[{"id":"https://openalex.org/I49934816","display_name":"Hunan University of Technology","ror":"https://ror.org/04j3vr751","country_code":"CN","type":"education","lineage":["https://openalex.org/I49934816"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Liang","raw_affiliation_strings":["School of Computer Science, Hunan University of Technology and Business, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Hunan University of Technology and Business, Changsha, China","institution_ids":["https://openalex.org/I49934816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091532881","display_name":"Kevin I\u2010Kai Wang","orcid":"https://orcid.org/0000-0001-8450-2558"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Kevin I-Kai Wang","raw_affiliation_strings":["Department of Electrical, Computer, and Software Engineering, The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Electrical, Computer, and Software Engineering, The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013297716","display_name":"Katsutoshi Yada","orcid":"https://orcid.org/0000-0003-4094-5327"},"institutions":[{"id":"https://openalex.org/I56624758","display_name":"Kansai University","ror":"https://ror.org/03xg1f311","country_code":"JP","type":"education","lineage":["https://openalex.org/I56624758"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Katsutoshi Yada","raw_affiliation_strings":["Faculty of Business Data Science, Kansai University, Osaka, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Business Data Science, Kansai University, Osaka, Japan","institution_ids":["https://openalex.org/I56624758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049154222","display_name":"Laurence T. Yang","orcid":"https://orcid.org/0000-0002-7986-4244"},"institutions":[{"id":"https://openalex.org/I197191942","display_name":"St. Francis Xavier University","ror":"https://ror.org/01wcaxs37","country_code":"CA","type":"education","lineage":["https://openalex.org/I197191942"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Laurence T. Yang","raw_affiliation_strings":["Department of Computer Science, St. Francis Xavier University,, Antigonish, NS, Canada","Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, St. Francis Xavier University,, Antigonish, NS, Canada","institution_ids":["https://openalex.org/I197191942"]},{"raw_affiliation_string":"Department of Computer Science, St. Francis Xavier University, Antigonish, NS, Canada","institution_ids":["https://openalex.org/I197191942"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357293","display_name":"Jianhua Ma","orcid":"https://orcid.org/0000-0003-4497-0407"},"institutions":[{"id":"https://openalex.org/I204291657","display_name":"Hosei University","ror":"https://ror.org/00bx6dj65","country_code":"JP","type":"education","lineage":["https://openalex.org/I204291657"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jianhua Ma","raw_affiliation_strings":["Faculty of Computer and Information Sciences, Hosei University, Chiyoda-ku, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer and Information Sciences, Hosei University, Chiyoda-ku, Japan","institution_ids":["https://openalex.org/I204291657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061363755","display_name":"Qun Jin","orcid":"https://orcid.org/0000-0002-1325-4275"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Qun Jin","raw_affiliation_strings":["Faculty of Human Sciences, Waseda University, Tokorozawa, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Human Sciences, Waseda University, Tokorozawa, Japan","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5055675863"],"corresponding_institution_ids":["https://openalex.org/I56624758"],"apc_list":null,"apc_paid":null,"fwci":73.0619,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.99912557,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"43","issue":"6","first_page":"1908","last_page":"1922"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.874099612236023},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5413799285888672},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4758743345737457},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4657873213291168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3794347643852234},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35823050141334534},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2397671639919281}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.874099612236023},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5413799285888672},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4758743345737457},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4657873213291168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3794347643852234},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35823050141334534},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2397671639919281},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsac.2025.3560012","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsac.2025.3560012","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1864093853","display_name":null,"funder_award_id":"23K11064","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4184348433","display_name":null,"funder_award_id":"2023YFC3305403","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2952298682","https://openalex.org/W3169375224","https://openalex.org/W3186051974","https://openalex.org/W3192510920","https://openalex.org/W3206780742","https://openalex.org/W3209696639","https://openalex.org/W3210386267","https://openalex.org/W3213120752","https://openalex.org/W4226070699","https://openalex.org/W4226256448","https://openalex.org/W4285205927","https://openalex.org/W4297964528","https://openalex.org/W4312327561","https://openalex.org/W4313270767","https://openalex.org/W4319990513","https://openalex.org/W4321780144","https://openalex.org/W4362496414","https://openalex.org/W4366250585","https://openalex.org/W4377971361","https://openalex.org/W4385627126","https://openalex.org/W4385627161","https://openalex.org/W4386590864","https://openalex.org/W4387303325","https://openalex.org/W4387757647","https://openalex.org/W4388469770","https://openalex.org/W4388505123","https://openalex.org/W4389076254","https://openalex.org/W4389298228","https://openalex.org/W4390604115","https://openalex.org/W4390659346","https://openalex.org/W4390692122","https://openalex.org/W4391128486","https://openalex.org/W4392159286","https://openalex.org/W4392939845","https://openalex.org/W4396506525","https://openalex.org/W4400447706","https://openalex.org/W6759238902","https://openalex.org/W6767074001","https://openalex.org/W6810081322"],"related_works":["https://openalex.org/W2588198209","https://openalex.org/W1909006023","https://openalex.org/W4205824991","https://openalex.org/W2111375262","https://openalex.org/W3200723557","https://openalex.org/W2317728013","https://openalex.org/W4252076617","https://openalex.org/W1991205173","https://openalex.org/W4312713546","https://openalex.org/W2362195430"],"abstract_inverted_index":{"The":[0],"rapid":[1],"development":[2],"and":[3,12,20,39,47,81,117,126,143,155,175,180,196,225,233,241,258,261],"usage":[4],"of":[5,74,248,254],"digital":[6],"technologies":[7],"in":[8,120,129,204,228,252,274],"modern":[9,275],"intelligent":[10],"systems":[11,128],"applications":[13],"bring":[14],"critical":[15],"challenges":[16],"on":[17,183,237],"data":[18,28,40,78],"security":[19,67,108,150,177,273],"privacy.":[21],"It":[22],"is":[23,169,193,218],"essential":[24],"to":[25,30,42,57,71,105,147,171,198,220],"allow":[26],"cross-organizational":[27],"sharing":[29],"achieve":[31],"smart":[32],"service":[33],"provisioning,":[34],"while":[35,114,211],"preventing":[36],"unauthorized":[37],"access":[38],"leak":[41],"ensure":[43,72],"end":[44],"users\u2019":[45],"efficient":[46],"secure":[48],"collaborations.":[49],"Federated":[50,92],"Learning":[51,94,166],"(FL)":[52],"offers":[53],"a":[54,90,134,158,208,212,229],"promising":[55],"pathway":[56],"enable":[58,172],"innovative":[59],"collaboration":[60],"across":[61],"multiple":[62],"organizations.":[63],"However,":[64],"more":[65],"stringent":[66],"policies":[68],"are":[69],"needed":[70],"authenticity":[73],"participating":[75],"entities,":[76],"safeguard":[77],"during":[79],"communication,":[80],"prevent":[82],"malicious":[83],"activities.":[84],"In":[85],"this":[86],"paper,":[87],"we":[88],"propose":[89],"Decentralized":[91],"Graph":[93,188],"(FGL)":[95],"with":[96,109,133,207,265],"Lightweight":[97],"Zero":[98],"Trust":[99],"Architecture":[100],"(ZTA)":[101],"model,":[102],"named":[103],"DFGL-LZTA,":[104],"provide":[106],"context-aware":[107],"dynamic":[110,201],"defense":[111],"policy":[112,178],"update,":[113],"maintaining":[115],"computational":[116,257],"communication":[118,223,259],"efficiency":[119,224],"resource-constrained":[121],"environments,":[122],"for":[123,270],"highly":[124],"distributed":[125,276],"heterogeneous":[127],"next-generation":[130,271],"networking.":[131],"Specifically,":[132],"re-designed":[135],"lightweight":[136],"ZTA,":[137],"which":[138],"leverages":[139],"adaptive":[140,176],"privacy":[141],"preservation":[142],"reputation-based":[144],"aggregation":[145,216],"together":[146],"tackle":[148],"multi-level":[149],"threats":[151],"(e.g.,":[152],"data-level,":[153],"model-level,":[154],"identity-level":[156],"attacks),":[157],"Proximal":[159],"Policy":[160],"Optimization":[161],"(PPO)":[162],"based":[163,182,236],"Deep":[164],"Reinforcement":[165],"(DRL)":[167],"agent":[168],"introduced":[170],"the":[173,200,222,246],"real-time":[174],"update":[179],"optimization":[181],"contextual":[184],"features.":[185],"A":[186],"hierarchical":[187],"Attention":[189],"Network":[190],"(GAT)":[191],"mechanism":[192],"then":[194],"improved":[195],"applied":[197],"facilitate":[199],"subgraph":[202],"learning":[203,277],"local":[205],"training":[206,255],"layer-wise":[209],"architecture,":[210],"so-called":[213],"sparse":[214],"global":[215],"scheme":[217],"developed":[219],"balance":[221],"model":[226,251,262],"robustness":[227],"P2P":[230],"manner.":[231],"Experiments":[232],"evaluations":[234],"conducted":[235],"two":[238],"open-source":[239],"datasets":[240],"one":[242],"synthetic":[243],"dataset":[244],"demonstrate":[245],"usefulness":[247],"our":[249],"proposed":[250],"terms":[253],"performance,":[256],"efficiency,":[260],"accuracy,":[263],"compared":[264],"other":[266],"four":[267],"state-of-the-art":[268],"methods":[269],"networking":[272],"systems.":[278]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":27}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
