{"id":"https://openalex.org/W3215389959","doi":"https://doi.org/10.1109/tii.2021.3128972","title":"Guest Editorial: Security and Privacy of Federated Learning Solutions for Industrial IoT Applications","display_name":"Guest Editorial: Security and Privacy of Federated Learning Solutions for Industrial IoT Applications","publication_year":2021,"publication_date":"2021-11-18","ids":{"openalex":"https://openalex.org/W3215389959","doi":"https://doi.org/10.1109/tii.2021.3128972","mag":"3215389959"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3128972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3128972","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"editorial","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Guest_Editorial_Security_and_Privacy_of_Federated_Learning_Solutions_for_Industrial_IoT_Applications/20619486","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022893278","display_name":"Mohammad Shojafar","orcid":"https://orcid.org/0000-0003-3284-5086"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mohammad Shojafar","raw_affiliation_strings":["5G & 6G Innovation Centre, University of Surrey, Guildford, U.K"],"affiliations":[{"raw_affiliation_string":"5G & 6G Innovation Centre, University of Surrey, Guildford, U.K","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066710236","display_name":"Mithun Mukherjee","orcid":"https://orcid.org/0000-0002-6605-180X"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mithun Mukherjee","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009147954","display_name":"Vincenzo Piuri","orcid":"https://orcid.org/0000-0003-3178-8198"},"institutions":[{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Vincenzo Piuri","raw_affiliation_strings":["Computer Science Department, University of Milan, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Milan, Milano, Italy","institution_ids":["https://openalex.org/I189158943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019489166","display_name":"Jemal Abawajy","orcid":"https://orcid.org/0000-0001-8962-1222"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jemal Abawajy","raw_affiliation_strings":["School of Info Technology, Deakin University, Burwood, Australia"],"affiliations":[{"raw_affiliation_string":"School of Info Technology, Deakin University, Burwood, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022893278"],"corresponding_institution_ids":["https://openalex.org/I28290843"],"apc_list":null,"apc_paid":null,"fwci":1.2596,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.84190906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"18","issue":"5","first_page":"3519","last_page":"3521"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.930400013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9229000210762024,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8172268867492676},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5873861908912659},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5807967782020569},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.51021409034729},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5049617886543274},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4994163513183594},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4871911406517029},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38178664445877075},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34785181283950806},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3377372622489929},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3307810425758362},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2284495234489441},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21464577317237854},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14119407534599304}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8172268867492676},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5873861908912659},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5807967782020569},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.51021409034729},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5049617886543274},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4994163513183594},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4871911406517029},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38178664445877075},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34785181283950806},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3377372622489929},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3307810425758362},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2284495234489441},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21464577317237854},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14119407534599304}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tii.2021.3128972","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3128972","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/20619486","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Guest_Editorial_Security_and_Privacy_of_Federated_Learning_Solutions_for_Industrial_IoT_Applications/20619486","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20619486","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Guest_Editorial_Security_and_Privacy_of_Federated_Learning_Solutions_for_Industrial_IoT_Applications/20619486","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2944823289","https://openalex.org/W4390608645","https://openalex.org/W3037018281","https://openalex.org/W4247566972","https://openalex.org/W2972592048","https://openalex.org/W2960264696","https://openalex.org/W2358319515","https://openalex.org/W3090563135","https://openalex.org/W4321854979","https://openalex.org/W2070735207"],"abstract_inverted_index":{"The":[0,92],"Industrial":[1],"Internet":[2],"of":[3,8,11,34,54,94,174,208,300],"Things":[4],"(IoT)":[5],"typically":[6],"consists":[7],"several":[9],"thousands":[10],"heterogeneous":[12],"devices,":[13,41],"such":[14,28,63,95,249],"as":[15,64,84,112,250,308],"sensors,":[16],"actuators,":[17],"access":[18,145],"points,":[19],"machinery,":[20],"end-users'":[21],"handheld":[22],"equipment,":[23],"and":[24,50,60,67,123,229,258,291,298],"supply":[25],"chain.":[26],"In":[27,177,215],"an":[29,85],"industrial":[30,305],"environment,":[31,47],"a":[32,113,126,172,182,192],"multitude":[33],"data":[35,56,73,90,106,132,157,168,190,203,210,224],"is":[36,117,232],"generated":[37],"from":[38,58,107],"massive":[39],"IoT":[40,306],"e.g.,":[42],"sensors":[43],"for":[44,88,110,159,225,304],"monitoring":[45],"the":[46,55,120,130,136,144,150,197,212,226,230,263,275,282,296,301],"reading":[48],"temperature,":[49],"gauging":[51],"pressure.":[52],"Most":[53],"are":[57,98],"delay-sensitive":[59],"computation-intensive":[61],"applications,":[62],"real-time":[65],"manufacturing":[66],"automated":[68],"diagnostics,":[69],"which":[70,116],"require":[71,270],"big":[72,89],"analytics":[74],"with":[75,196],"low":[76],"latency.":[77],"Machine":[78],"learning":[79,162,213,276],"(ML)":[80],"has":[81],"been":[82],"witnessed":[83],"efficient":[86],"solution":[87],"analytics.":[91],"majority":[93],"ML":[96,121,137,152],"algorithms":[97,138],"centralized":[99,151],"methods,":[100],"meaning":[101],"that":[102,294],"they":[103],"first":[104],"gather":[105],"different":[108],"users":[109],"use":[111],"training":[114,141,184],"dataset,":[115],"placed":[118],"on":[119],"server,":[122],"then":[124],"build":[125],"model":[127,185],"to":[128,139,146,166,170,191,235,273],"classify":[129],"new":[131],"samples":[133,260],"by":[134,281],"applying":[135],"this":[140,285],"dataset.":[142],"However,":[143,239],"these":[147,175,267],"datasets":[148],"in":[149,206,221,240,278],"methods":[153],"raises":[154],"concerns":[155],"about":[156],"privacy":[158,169,299],"users.":[160],"Federated":[161],"(FL)":[163],"was":[164],"designed":[165],"protect":[167],"address":[171],"part":[173],"issues.":[176],"FL,":[178,241],"each":[179],"participant":[180,209,231],"uses":[181],"global":[183,227],"without":[186],"uploading":[187],"their":[188,237],"private":[189],"third-party":[193],"server.":[194],"Compared":[195],"conventional":[198],"ML,":[199],"FL":[200,217,302],"can":[201,218],"preserve":[202],"security,":[204],"especially":[205],"terms":[207],"during":[211],"process.":[214],"particular,":[216],"also":[219],"help":[220],"updating":[222],"server-side":[223],"model,":[228],"not":[233],"required":[234],"provide":[236],"data.":[238],"individual":[242],"computing":[243],"units":[244],"may":[245],"show":[246],"abnormal":[247],"actions,":[248],"faulty":[251],"software,":[252],"hardware":[253],"invasions,":[254],"unreliable":[255],"communication":[256],"channels,":[257],"malicious":[259],"deliberately":[261],"crafting":[262],"model.":[264],"To":[265],"mitigate":[266],"challenges,":[268],"we":[269],"robust":[271],"policies":[272],"control":[274],"phases":[277],"FL.":[279],"Motivated":[280],"abovementioned":[283],"issues,":[284],"special":[286],"section":[287],"solicits":[288],"original":[289],"research":[290],"practical":[292],"contributions":[293],"advance":[295],"security":[297],"solutions":[303],"applications":[307],"follows.":[309]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
