{"id":"https://openalex.org/W3217540471","doi":"https://doi.org/10.1109/tii.2021.3128962","title":"Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures","display_name":"Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures","publication_year":2021,"publication_date":"2021-11-18","ids":{"openalex":"https://openalex.org/W3217540471","doi":"https://doi.org/10.1109/tii.2021.3128962","mag":"3217540471"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3128962","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3128962","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"editorial","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Guest_Editorial_Privacy-Preserving_Federated_Machine_Learning_Solutions_for_Enhanced_Security_of_Critical_Energy_Infrastructures/20622039","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033585021","display_name":"Imran Razzak","orcid":"https://orcid.org/0000-0002-3930-6600"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Imran Razzak","raw_affiliation_strings":["Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051512158","display_name":"Guandong Xu","orcid":"https://orcid.org/0000-0003-4493-6663"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guandong Xu","raw_affiliation_strings":["University of Technology Sydney, Broadway, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Broadway, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033585021"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.4159,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.62908202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"18","issue":"5","first_page":"3449","last_page":"3451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.8259671926498413},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7970721125602722},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6578748226165771},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.5771805047988892},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5131722092628479},{"id":"https://openalex.org/keywords/wind-power","display_name":"Wind power","score":0.45540839433670044},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4372670352458954},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4240511655807495},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3489878475666046},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3266963064670563},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.30287474393844604},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15705427527427673},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.11333370208740234}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.8259671926498413},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7970721125602722},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6578748226165771},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.5771805047988892},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5131722092628479},{"id":"https://openalex.org/C78600449","wikidata":"https://www.wikidata.org/wiki/Q43302","display_name":"Wind power","level":2,"score":0.45540839433670044},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4372670352458954},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4240511655807495},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3489878475666046},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3266963064670563},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.30287474393844604},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15705427527427673},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.11333370208740234},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2021.3128962","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3128962","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/20622039","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Guest_Editorial_Privacy-Preserving_Federated_Machine_Learning_Solutions_for_Enhanced_Security_of_Critical_Energy_Infrastructures/20622039","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20622039","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Guest_Editorial_Privacy-Preserving_Federated_Machine_Learning_Solutions_for_Enhanced_Security_of_Critical_Energy_Infrastructures/20622039","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2085358621","https://openalex.org/W3045199176","https://openalex.org/W4386971846","https://openalex.org/W3004302778","https://openalex.org/W2184280487","https://openalex.org/W4242728933","https://openalex.org/W3119634295","https://openalex.org/W2460691332","https://openalex.org/W2888810024","https://openalex.org/W2515529454"],"abstract_inverted_index":{"Critical":[0],"energy":[1,86,98,141],"infrastructure":[2],"(CEI)":[3],"is":[4,59,120],"specific":[5],"engineering":[6],"information":[7],"about":[8],"proposed":[9],"or":[10,35,38],"existing":[11],"critical":[12,15,108],"infrastructure.":[13],"Modern":[14],"infrastructures":[16],"are":[17,45,50,153],"increasingly":[18],"turning":[19],"into":[20],"distributed,":[21],"complex":[22,126],"cyber-physical":[23,43,127],"systems":[24,142],"that":[25],"need":[26],"proactive":[27],"protection":[28],"and":[29,49,103,140,143,149,159,165,174,179],"fast":[30],"restoration":[31],"to":[32,52,80,133],"mitigate":[33],"physical":[34],"cyber":[36],"incidents":[37],"attacks.":[39],"Most":[40],"importantly,":[41],"combined":[42],"attacks":[44],"much":[46],"more":[47,81],"challenging":[48],"expected":[51],"become":[53],"the":[54,63,67,76,85,89,95,117,124],"most":[55,125],"intrusive":[56],"attack.":[57],"This":[58],"particularly":[60],"true":[61],"for":[62],"CEIs.":[64],"During":[65],"2015,":[66],"Industrial":[68],"Control":[69],"Systems":[70],"Cyber":[71],"Emergency":[72],"Response":[73],"Team":[74],"in":[75,99],"Unites":[77],"States":[78],"responded":[79],"than":[82],"245":[83],"incidents;":[84],"sector":[87],"tops":[88],"list":[90],"with":[91,176],"32%":[92],"incidents.":[93],"Considering":[94],"importance":[96],"of":[97,123,156],"our":[100],"daily":[101],"lives":[102],"its":[104],"influence":[105],"on":[106],"other":[107,134],"infrastructures,":[109,128],"CEI":[110],"requires":[111],"significant":[112],"attention":[113],"comparatively.":[114],"For":[115],"example,":[116],"wind-turbine":[118],"system":[119],"considered":[121],"one":[122],"causing":[129],"huge":[130],"cascading":[131],"effects":[132],"CEIs,":[135],"such":[136],"as":[137],"electrical":[138],"power":[139,175],"transportation,":[144],"healthcare":[145],"sector,":[146],"communications,":[147],"industry,":[148],"finance.":[150],"Wind":[151],"turbines":[152],"mainly":[154],"composed":[155],"condition":[157],"monitoring":[158],"operational":[160],"data":[161,166],"(i.e.,":[162],"supervisory":[163],"command":[164],"acquisition),":[167],"including":[168],"air":[169,171],"temperature,":[170],"pressure,":[172],"voltage,":[173],"multiple":[177],"parameters":[178],"periodic":[180],"characteristics.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
