{"id":"https://openalex.org/W4410492317","doi":"https://doi.org/10.1109/tce.2025.3571352","title":"Q-P2FL: Quantum-Enhanced Federated Edge Intelligence for Privacy-Preserving Adversarial Attack Detection on Consumer Edge Devices","display_name":"Q-P2FL: Quantum-Enhanced Federated Edge Intelligence for Privacy-Preserving Adversarial Attack Detection on Consumer Edge Devices","publication_year":2025,"publication_date":"2025-05-01","ids":{"openalex":"https://openalex.org/W4410492317","doi":"https://doi.org/10.1109/tce.2025.3571352"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3571352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3571352","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101745850","display_name":"Farhan Ullah","orcid":"https://orcid.org/0000-0003-2422-575X"},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Farhan Ullah","raw_affiliation_strings":["Cybersecurity Center, Prince Mohammad Bin Fahd University, Al Khobar, Saudi Arabia","Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Center, Prince Mohammad Bin Fahd University, Al Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]},{"raw_affiliation_string":"Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027538068","display_name":"Nazeeruddin Mohammad","orcid":"https://orcid.org/0000-0003-3580-5960"},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nazeeruddin Mohammad","raw_affiliation_strings":["Cybersecurity Center, Prince Mohammad Bin Fahd University, Al Khobar, Saudi Arabia","Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Center, Prince Mohammad Bin Fahd University, Al Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]},{"raw_affiliation_string":"Cybersecurity Center, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016526188","display_name":"Leonardo Mostarda","orcid":"https://orcid.org/0000-0001-8852-8317"},"institutions":[{"id":"https://openalex.org/I27483092","display_name":"University of Perugia","ror":"https://ror.org/00x27da85","country_code":"IT","type":"education","lineage":["https://openalex.org/I27483092"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Leonardo Mostarda","raw_affiliation_strings":["Department of Mathematics and Computer Science, University of Perugia, Perugia, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, University of Perugia, Perugia, Italy","institution_ids":["https://openalex.org/I27483092"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028388054","display_name":"Diletta Cacciagrano","orcid":"https://orcid.org/0000-0003-4491-0666"},"institutions":[{"id":"https://openalex.org/I112859197","display_name":"Universit\u00e0 di Camerino","ror":"https://ror.org/0005w8d69","country_code":"IT","type":"education","lineage":["https://openalex.org/I112859197"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Diletta Cacciagrano","raw_affiliation_strings":["Division of Computer Science, University of Camerino, Camerino, Italy"],"affiliations":[{"raw_affiliation_string":"Division of Computer Science, University of Camerino, Camerino, Italy","institution_ids":["https://openalex.org/I112859197"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101801777","display_name":"Yue Zhao","orcid":"https://orcid.org/0000-0002-7865-5555"},"institutions":[{"id":"https://openalex.org/I4210153668","display_name":"Wenzhou-Kean University","ror":"https://ror.org/05609xa16","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153668"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Zhao","raw_affiliation_strings":["Department of Computer Science, College of Science, Mathematics and Technology, Wenzhou-Kean University, Wenzhou, China","Department of Computer Science, College of Science, Mathematics and Technology at Wenzhou-Kean University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Science, Mathematics and Technology, Wenzhou-Kean University, Wenzhou, China","institution_ids":["https://openalex.org/I4210153668"]},{"raw_affiliation_string":"Department of Computer Science, College of Science, Mathematics and Technology at Wenzhou-Kean University, Wenzhou, China","institution_ids":["https://openalex.org/I4210153668"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101745850"],"corresponding_institution_ids":["https://openalex.org/I138564716"],"apc_list":null,"apc_paid":null,"fwci":7.8371,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96822315,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"71","issue":"2","first_page":"4914","last_page":"4924"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6520230770111084},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5754950642585754},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5527969598770142},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4983396530151367},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4422309100627899},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4151769280433655},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22706973552703857},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19156432151794434},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.12131735682487488}],"concepts":[{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6520230770111084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5754950642585754},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5527969598770142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4983396530151367},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4422309100627899},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4151769280433655},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22706973552703857},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19156432151794434},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.12131735682487488},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3571352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3571352","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2908442265","https://openalex.org/W3009195050","https://openalex.org/W3015460945","https://openalex.org/W3017217726","https://openalex.org/W3115360974","https://openalex.org/W3135750780","https://openalex.org/W3143373604","https://openalex.org/W3157288834","https://openalex.org/W3163963286","https://openalex.org/W3172942063","https://openalex.org/W3217804443","https://openalex.org/W4205368719","https://openalex.org/W4226319939","https://openalex.org/W4313591247","https://openalex.org/W4314446179","https://openalex.org/W4319344880","https://openalex.org/W4362466319","https://openalex.org/W4381485906","https://openalex.org/W4385062808","https://openalex.org/W4385210255","https://openalex.org/W4385856279","https://openalex.org/W4387067995","https://openalex.org/W4387911072","https://openalex.org/W4389665308","https://openalex.org/W4392450127","https://openalex.org/W4392828041","https://openalex.org/W4396521014","https://openalex.org/W4396817532","https://openalex.org/W4398150616","https://openalex.org/W4399446810","https://openalex.org/W4401076675","https://openalex.org/W4401366983","https://openalex.org/W4402035331","https://openalex.org/W4402475093","https://openalex.org/W4404563218"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"The":[0,54,178,205],"rapid":[1],"expansion":[2],"of":[3,16,57,63,158,168,220],"smart":[4],"consumer":[5,47,58,101,233],"environments":[6],"is":[7,30,124,161,208],"facilitated":[8],"by":[9,163],"device-to-device":[10],"communication,":[11],"which":[12],"generates":[13],"considerable":[14],"quantities":[15],"data":[17,25,82,201],"and":[18,84,117,129,196,203,215,222,239],"improves":[19],"the":[20,61,156,175,187,192],"user":[21],"experience.":[22],"While":[23],"this":[24],"provides":[26],"useful":[27],"insights,":[28],"it":[29],"also":[31],"subject":[32],"to":[33,80,126,145,154,185],"malicious":[34],"cyberattacks.":[35,65],"Machine":[36],"Learning":[37,93],"(ML)-based":[38],"threat":[39],"detection":[40,218],"technologies":[41],"solve":[42],"these":[43],"challenges;":[44],"however":[45],"crucial":[46],"electronics":[48],"privacy":[49,83,128],"concerns":[50],"are":[51,139,152],"often":[52],"bypassed.":[53],"growing":[55],"connectivity":[56],"devices":[59,235],"raises":[60],"possibility":[62],"adversarial":[64,98,150,169,198,237],"Quantum":[66],"technology":[67],"may":[68,78,112],"give":[69],"stronger":[70],"protection":[71],"against":[72],"threats,":[73],"while":[74],"FL-based":[75],"edge":[76,102,134,234],"computing":[77,107],"help":[79],"ensure":[81],"security.":[85],"This":[86,160,225],"work":[87],"proposes":[88],"a":[89,228],"Quantum-based":[90,115],"Privacy-Preserving":[91],"Federated":[92],"(Q-P2FL)":[94],"technique":[95],"for":[96,231],"detecting":[97],"attacks":[99,238],"on":[100,133,210],"devices.":[103,135],"First,":[104],"as":[105],"quantum":[106],"advances,":[108],"standard":[109,212],"validation":[110],"approaches":[111],"become":[113],"obsolete.":[114],"registration":[116],"authentication":[118],"with":[119,217],"Additive":[120],"Homomorphic":[121],"Encryption":[122],"(AHE)":[123],"employed":[125],"safeguard":[127],"secure":[130],"model":[131,189],"weights":[132],"Second,":[136],"image-based":[137],"features":[138,184],"extracted":[140],"from":[141,236],"network":[142],"traffic":[143],"bytes":[144],"generate":[146,186],"distinguished":[147],"datasets.":[148,159],"Third,":[149],"examples":[151],"generated":[153],"assess":[155],"robustness":[157],"achieved":[162],"employing":[164],"four":[165],"distinct":[166],"types":[167],"techniques":[170],"that":[171],"incorporate":[172],"perturbations":[173],"into":[174],"input":[176],"data.":[177],"pre-trained":[179],"Vision":[180],"Transformer":[181],"(ViT)":[182],"extracts":[183],"local":[188],"weights.":[190],"Finally,":[191],"Q-P2FL":[193],"approach":[194,226],"detects":[195],"classifies":[197],"attacks,":[199],"ensuring":[200],"security":[202],"privacy.":[204],"proposed":[206],"method":[207],"evaluated":[209],"two":[211],"datasets:":[213],"Edge-IIoT":[214],"CICIoMT2024,":[216],"accuracies":[219],"99.38%":[221],"99.41%,":[223],"respectively.":[224],"presents":[227],"promising":[229],"solution":[230],"protecting":[232],"improving":[240],"their":[241],"privacy-preserving":[242],"capabilities.":[243]},"counts_by_year":[{"year":2026,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
