{"id":"https://openalex.org/W4415625273","doi":"https://doi.org/10.1109/rtsi64020.2025.11212329","title":"Decentralized AI for Smart Cities: A Federated Learning Framework for Resilient Cybersecurity","display_name":"Decentralized AI for Smart Cities: A Federated Learning Framework for Resilient Cybersecurity","publication_year":2025,"publication_date":"2025-08-24","ids":{"openalex":"https://openalex.org/W4415625273","doi":"https://doi.org/10.1109/rtsi64020.2025.11212329"},"language":null,"primary_location":{"id":"doi:10.1109/rtsi64020.2025.11212329","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rtsi64020.2025.11212329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 9th Forum on Research and Technologies for Society and Industry (RTSI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064785400","display_name":"Mehdi Houichi","orcid":"https://orcid.org/0009-0008-0255-9904"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mehdi Houichi","raw_affiliation_strings":["University of Carthage, Higher School of Communication of Tunis (Sup'Com),Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia,2083"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Higher School of Communication of Tunis (Sup'Com),Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia,2083","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002514441","display_name":"Faouzi Ja\u00efdi","orcid":"https://orcid.org/0000-0001-5893-5296"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faouzi Jaidi","raw_affiliation_strings":["University of Carthage, Higher School of Communication of Tunis (Sup'Com) University of Carthage, National School of Engineers of Carthage,Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Higher School of Communication of Tunis (Sup'Com) University of Carthage, National School of Engineers of Carthage,Innov&#x2019;Com Lab \\ Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Arabian Gulf University,College of Graduate Studies,Department of Next-Generation Computing,Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Arabian Gulf University,College of Graduate Studies,Department of Next-Generation Computing,Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064785400"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":1.1311,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.85218139,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"180","last_page":"184"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11479","display_name":"Smart Cities and Technologies","score":0.2915000021457672,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11479","display_name":"Smart Cities and Technologies","score":0.2915000021457672,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.18790000677108765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.07370000332593918,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7498999834060669},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6412000060081482},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6139000058174133},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.569100022315979},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5396999716758728},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.46470001339912415},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.46149998903274536},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.41920000314712524},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3806999921798706}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7720000147819519},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7498999834060669},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6412000060081482},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6139000058174133},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.569100022315979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5568000078201294},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5396999716758728},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.46470001339912415},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.46149998903274536},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.41920000314712524},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3806999921798706},{"id":"https://openalex.org/C2777103469","wikidata":"https://www.wikidata.org/wiki/Q1231558","display_name":"Smart city","level":3,"score":0.36719998717308044},{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.36660000681877136},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.35190001130104065},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3303999900817871},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.328900009393692},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3059999942779541},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2989000082015991},{"id":"https://openalex.org/C152223200","wikidata":"https://www.wikidata.org/wiki/Q3055471","display_name":"Smart environment","level":3,"score":0.2924000024795532},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.27559998631477356},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2535000145435333},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/rtsi64020.2025.11212329","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rtsi64020.2025.11212329","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 9th Forum on Research and Technologies for Society and Industry (RTSI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2066832805","https://openalex.org/W2557671501","https://openalex.org/W2623902153","https://openalex.org/W2762776925","https://openalex.org/W2974429275","https://openalex.org/W4313640965","https://openalex.org/W4402215664","https://openalex.org/W4402527198","https://openalex.org/W4407467362"],"related_works":[],"abstract_inverted_index":{"The":[0,75],"integration":[1],"of":[2,45,114,150],"artificial":[3],"intelligence":[4],"(AI)":[5],"into":[6],"cybersecurity":[7,57,159],"has":[8],"transformed":[9],"the":[10,98,109,126,148],"ability":[11],"to":[12,17,85,135],"detect,":[13],"predict,":[14],"and":[15,34,107,118,142,157],"respond":[16],"cyber":[18],"threats":[19],"in":[20,112,153],"real":[21],"time.":[22],"However,":[23],"centralized":[24,136],"AI":[25,79,152],"systems":[26],"often":[27],"struggle":[28],"with":[29],"privacy":[30,140],"concerns,":[31],"data":[32,90],"heterogeneity,":[33],"limited":[35],"scalability\u2014especially":[36],"within":[37],"smart":[38,61,104,163],"city":[39,105],"infrastructures":[40],"that":[41,125],"generate":[42],"massive":[43],"volumes":[44],"sensitive,":[46],"distributed":[47],"data.":[48,74],"In":[49],"this":[50],"paper,":[51],"we":[52],"propose":[53],"a":[54,103],"federated":[55,128,151],"learning-based":[56],"framework":[58,76],"tailored":[59],"for":[60,102,161],"cities,":[62],"enabling":[63],"collaborative":[64],"anomaly":[65],"detection":[66,133],"across":[67],"multiple":[68,94],"urban":[69],"nodes":[70],"without":[71],"sharing":[72],"raw":[73],"leverages":[77],"local":[78],"models":[80,137],"trained":[81],"on":[82],"edge":[83],"devices":[84],"detect":[86],"cyber-attacks":[87],"while":[88,138],"preserving":[89],"privacy.":[91],"We":[92],"simulate":[93],"attack":[95],"scenarios":[96],"using":[97],"CICIDS2017":[99],"dataset":[100],"adapted":[101],"context":[106],"evaluate":[108],"system\u2019s":[110],"performance":[111],"terms":[113],"accuracy,":[115],"communication":[116],"cost,":[117],"robustness":[119],"against":[120],"adversarial":[121],"perturbations.":[122],"Results":[123],"demonstrate":[124],"proposed":[127],"learning":[129],"approach":[130],"achieves":[131],"comparable":[132],"accuracy":[134],"ensuring":[139],"preservation":[141],"improved":[143],"scalability.":[144],"This":[145],"work":[146],"highlights":[147],"potential":[149],"creating":[154],"resilient,":[155],"ethical,":[156],"decentralized":[158],"solutions":[160],"future":[162],"cities.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-28T00:00:00"}
