{"id":"https://openalex.org/W4405717663","doi":"https://doi.org/10.1109/ojcoms.2024.3521329","title":"DEEPFL: A Differential Evolution-Based Framework for Privacy Protection and Poisoning Attack Defense in Maritime Edge Computing","display_name":"DEEPFL: A Differential Evolution-Based Framework for Privacy Protection and Poisoning Attack Defense in Maritime Edge Computing","publication_year":2024,"publication_date":"2024-12-23","ids":{"openalex":"https://openalex.org/W4405717663","doi":"https://doi.org/10.1109/ojcoms.2024.3521329"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2024.3521329","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3521329","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2024.3521329","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090287315","display_name":"Chengzhuo Han","orcid":"https://orcid.org/0009-0006-1500-3716"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chengzhuo Han","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083657836","display_name":"Tingting Yang","orcid":"https://orcid.org/0000-0002-7406-2170"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tingting Yang","raw_affiliation_strings":["Department of Network Intelligence, Peng Cheng Laboratory, Shenzhen, China","Peng Cheng Laboratory, China"],"affiliations":[{"raw_affiliation_string":"Department of Network Intelligence, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Peng Cheng Laboratory, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063326655","display_name":"Zhengqi Cui","orcid":"https://orcid.org/0000-0003-1678-0518"},"institutions":[{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengqi Cui","raw_affiliation_strings":["Navigation College, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Navigation College, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xin Sun","orcid":"https://orcid.org/0000-0001-9809-4436"},"institutions":[{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Sun","raw_affiliation_strings":["Navigation College, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Navigation College, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090287315"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":0.3434,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6459395,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"6","issue":null,"first_page":"3305","last_page":"3319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9606000185012817,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9424999952316284,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7619881629943848},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.6189473271369934},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5491302013397217},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5424942970275879},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5149763226509094},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4797416925430298},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4765123426914215},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.23400110006332397},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15379923582077026},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.07374686002731323}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7619881629943848},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.6189473271369934},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5491302013397217},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5424942970275879},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5149763226509094},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4797416925430298},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4765123426914215},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.23400110006332397},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15379923582077026},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.07374686002731323}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcoms.2024.3521329","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3521329","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6c788697c7d145f5857bac2f87e631c6","is_oa":true,"landing_page_url":"https://doaj.org/article/6c788697c7d145f5857bac2f87e631c6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 6, Pp 3305-3319 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2024.3521329","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2024.3521329","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7895616785","display_name":null,"funder_award_id":"2020-ICIQ-ZD-020-05","funder_id":"https://openalex.org/F4320325551","funder_display_name":"National Defense Pre-Research Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320325551","display_name":"National Defense Pre-Research Foundation of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W3013124972","https://openalex.org/W3028940968","https://openalex.org/W3048554691","https://openalex.org/W3091870957","https://openalex.org/W3196371845","https://openalex.org/W3211054674","https://openalex.org/W4205833229","https://openalex.org/W4210960727","https://openalex.org/W4220779061","https://openalex.org/W4225563647","https://openalex.org/W4229029907","https://openalex.org/W4287332481","https://openalex.org/W4303672058","https://openalex.org/W4313855360","https://openalex.org/W4316660714","https://openalex.org/W4317795078","https://openalex.org/W4382203046","https://openalex.org/W4383112472","https://openalex.org/W4392551035","https://openalex.org/W4399660764","https://openalex.org/W4399850755","https://openalex.org/W4400076000","https://openalex.org/W4404056771","https://openalex.org/W6795843344"],"related_works":["https://openalex.org/W3010781909","https://openalex.org/W4200233390","https://openalex.org/W4315705624","https://openalex.org/W3116386889","https://openalex.org/W4324372666","https://openalex.org/W4313218046","https://openalex.org/W2605443953","https://openalex.org/W4225706866","https://openalex.org/W2943138144","https://openalex.org/W2914646191"],"abstract_inverted_index":{"Federated":[0,147],"learning":[1,16,94,98,111,127],"(FL)":[2],"is":[3,132],"crucial":[4],"in":[5,125,188,230],"edge":[6,25,72,129,189,232],"computing":[7,130,233],"for":[8],"next-generation":[9],"wireless":[10,70],"networks":[11,26,131],"because":[12],"it":[13],"enables":[14],"collaborative":[15],"among":[17],"devices":[18,51,162],"while":[19],"protecting":[20],"data":[21,54,186],"privacy.":[22],"However,":[23],"marine":[24,231],"encounter":[27],"complex":[28],"issues,":[29],"including":[30],"frequent":[31],"network":[32,36],"disruptions,":[33],"highly":[34],"dynamic":[35,67],"topologies,":[37],"and":[38,52,66,85,106,113,120,136,163,165,180,206,223,243],"stringent":[39],"bandwidth":[40],"limitations,":[41],"compared":[42],"to":[43,62,76,89,152,204],"traditional":[44],"FL":[45],"environments.":[46,190],"Additionally,":[47,191],"the":[48,63,143,158,172,183,214],"heterogeneity":[49,187],"of":[50,69,133,160,174,185,216],"unconventional":[53],"distribution":[55],"complicate":[56],"model":[57,114],"training":[58],"further.":[59],"Moreover,":[60],"due":[61],"broadcast":[64],"nature":[65],"vulnerability":[68],"medium,":[71],"nodes":[73],"are":[74],"susceptible":[75],"interference":[77],"or":[78,91],"malicious":[79],"attacks,":[80,87],"such":[81],"as":[82],"information":[83,175,218],"theft":[84],"poisoning":[86,123,209,245],"leading":[88],"inaccurate":[90],"even":[92],"failed":[93],"outcomes.":[95],"Many":[96],"distributed":[97,167],"algorithms":[99],"assume":[100],"stable":[101],"node":[102],"environments,":[103,234],"overlooking":[104],"security":[105,215],"communication":[107,155,179,224],"bottlenecks,":[108],"which":[109,150],"reduces":[110],"efficiency":[112],"performance.":[115],"Therefore,":[116],"researching":[117],"privacy":[118,238],"protection":[119,239],"defenses":[121],"against":[122,208],"attacks":[124],"federated":[126],"within":[128],"significant":[134],"importance":[135],"value.":[137],"To":[138],"address":[139],"this,":[140],"we":[141,192],"propose":[142],"Differential":[144],"Evolution":[145],"Edge-Partially":[146],"Learning":[148],"framework,":[149],"aims":[151],"secure":[153],"gradient":[154,178,217],"by":[156,241,249],"leveraging":[157],"characteristics":[159],"heterogeneous":[161],"non-independent":[164],"identically":[166],"(Non-IID)":[168],"data,":[169],"thereby":[170],"reducing":[171],"risk":[173],"leakage":[176],"during":[177],"effectively":[181],"mitigating":[182],"impact":[184],"have":[193],"designed":[194],"a":[195],"shared-layer":[196],"mean":[197],"detection":[198],"method":[199],"based":[200],"on":[201],"this":[202,235],"framework":[203,236],"detect":[205],"defend":[207],"attacks.":[210],"This":[211],"algorithm":[212],"protects":[213],"without":[219,251],"significantly":[220],"increasing":[221],"computational":[222,254],"overhead.":[225],"Experimental":[226],"results":[227],"demonstrate":[228],"that,":[229],"improves":[237],"performance":[240],"20%":[242],"increases":[244],"attack":[246],"defense":[247],"rates":[248],"10%":[250],"adding":[252],"extra":[253],"costs.":[255]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
