{"id":"https://openalex.org/W7123352357","doi":"https://doi.org/10.1109/mwc.2025.3631608","title":"Federated Augmentation-Enabled Low-Altitude Economy Networks: Challenges, Methodologies, and Applications","display_name":"Federated Augmentation-Enabled Low-Altitude Economy Networks: Challenges, Methodologies, and Applications","publication_year":2026,"publication_date":"2026-01-12","ids":{"openalex":"https://openalex.org/W7123352357","doi":"https://doi.org/10.1109/mwc.2025.3631608"},"language":null,"primary_location":{"id":"doi:10.1109/mwc.2025.3631608","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.2025.3631608","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092472027","display_name":"Moxuan Fu","orcid":"https://orcid.org/0009-0009-4479-5259"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Moxuan Fu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060574788","display_name":"Chenfei Hu","orcid":"https://orcid.org/0000-0002-8285-9374"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenfei Hu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"You Li","orcid":"https://orcid.org/0009-0003-5069-1612"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"You Li","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100380072","display_name":"Chuan Zhang","orcid":"https://orcid.org/0000-0001-7684-8540"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan Zhang","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122884829","display_name":"Liehuang Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5092472027"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06457981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"33","issue":"1","first_page":"73","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.5026999711990356,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.5026999711990356,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.20080000162124634,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.0746999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5694000124931335},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5339000225067139},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5195000171661377},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.48559999465942383},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4814000129699707},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.45329999923706055},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4487000107765198},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4392000138759613},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.43130001425743103}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.871399998664856},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5694000124931335},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5339000225067139},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5195000171661377},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.48559999465942383},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4814000129699707},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.45329999923706055},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4487000107765198},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4392000138759613},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.43130001425743103},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.42010000348091125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4077000021934509},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.39340001344680786},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3919999897480011},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.391400009393692},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3873000144958496},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3788999915122986},{"id":"https://openalex.org/C109747225","wikidata":"https://www.wikidata.org/wiki/Q815758","display_name":"Scarcity","level":2,"score":0.3668000102043152},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33649998903274536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3237999975681305},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.31470000743865967},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3003999888896942},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C2778710394","wikidata":"https://www.wikidata.org/wiki/Q4179813","display_name":"Live migration","level":4,"score":0.2703999876976013},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.25380000472068787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mwc.2025.3631608","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.2025.3631608","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/2","display_name":"Zero hunger","score":0.7156341075897217}],"awards":[{"id":"https://openalex.org/G2824501727","display_name":null,"funder_award_id":"62472032","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5850552267","display_name":null,"funder_award_id":"2021CXGC010106","funder_id":"https://openalex.org/F4320333596","funder_display_name":"Key Technology Research and Development Program of Shandong"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320333596","display_name":"Key Technology Research and Development Program of Shandong","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2515866431","https://openalex.org/W2761138375","https://openalex.org/W4396712924","https://openalex.org/W4402780394","https://openalex.org/W4405181436","https://openalex.org/W4405182692","https://openalex.org/W4410358938","https://openalex.org/W4414404751"],"related_works":[],"abstract_inverted_index":{"Low-Altitude":[0],"Economy":[1],"(LAE)":[2],"networks,":[3],"driven":[4],"by":[5,99],"UAVs,":[6],"smart":[7],"drones,":[8],"and":[9,18,54,62,80,129,137,173],"aerial-ground":[10],"collaborative":[11],"platforms,":[12],"transform":[13],"applications":[14],"like":[15,58],"surveillance,":[16],"inspection,":[17],"precision":[19],"agriculture.":[20],"In":[21],"these":[22,97],"systems,":[23],"data":[24,34,52,75,135],"are":[25],"inherently":[26],"distributed":[27,42],"across":[28,84],"numerous":[29],"edge":[30,87],"devices,":[31],"making":[32],"centralized":[33,51],"aggregation":[35],"impractical.":[36],"Federated":[37,101],"Learning":[38],"(FL)":[39],"delivers":[40],"a":[41,105],"machine":[43],"learning":[44,175],"paradigm,":[45],"enabling":[46],"on-device":[47],"model":[48,161],"updates":[49],"without":[50,159],"collection":[53],"powering":[55],"critical":[56],"functions":[57],"aerial":[59],"image":[60,144],"classification":[61,145],"anomaly":[63],"detection.":[64],"However,":[65],"FL":[66,115],"still":[67],"faces":[68],"severe":[69],"challenges":[70,98],"in":[71,176],"LAE":[72,111],"environments,":[73],"including":[74],"imbalance,":[76],"extreme":[77],"feature":[78,124,139],"diversity,":[79],"weak":[81],"generalization":[82],"capabilities":[83],"highly":[85],"heterogeneous":[86],"nodes.":[88],"The":[89],"objective":[90],"of":[91],"this":[92],"work":[93],"is":[94],"to":[95,110,169],"address":[96],"introducing":[100],"Augmentation":[102],"(FA)":[103],"as":[104],"novel":[106],"framework":[107],"specifically":[108],"adapted":[109],"networks.":[112],"Unlike":[113],"conventional":[114],"methods,":[116],"our":[117],"approach":[118],"enriches":[119],"local":[120],"training":[121],"with":[122],"synthetic":[123],"generation":[125],"while":[126],"preserving":[127],"privacy":[128,157],"communication":[130],"efficiency,":[131],"thereby":[132],"tackling":[133],"both":[134],"scarcity":[136],"non-IID":[138],"skew.":[140],"We":[141],"present":[142],"an":[143],"case":[146],"study":[147],"demonstrating":[148],"how":[149],"SDP":[150],"integration":[151],"into":[152],"the":[153],"FA":[154],"pipeline":[155],"enhances":[156],"protection":[158],"compromising":[160],"utility.":[162],"Finally,":[163],"we":[164],"outline":[165],"key":[166],"research":[167],"directions":[168],"advance":[170],"efficient,":[171],"adaptive,":[172],"privacy-aware":[174],"future":[177],"low-altitude":[178],"systems.":[179]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-14T00:00:00"}
