{"id":"https://openalex.org/W4400231575","doi":"https://doi.org/10.1109/vnc61989.2024.10576001","title":"Secure Hierarchical Federated Learning in Vehicular Networks Using Dynamic Client Selection and Anomaly Detection","display_name":"Secure Hierarchical Federated Learning in Vehicular Networks Using Dynamic Client Selection and Anomaly Detection","publication_year":2024,"publication_date":"2024-05-29","ids":{"openalex":"https://openalex.org/W4400231575","doi":"https://doi.org/10.1109/vnc61989.2024.10576001"},"language":"en","primary_location":{"id":"doi:10.1109/vnc61989.2024.10576001","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vnc61989.2024.10576001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Vehicular Networking Conference (VNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093766774","display_name":"M. Saeid HaghighiFard","orcid":"https://orcid.org/0000-0003-1657-4773"},"institutions":[{"id":"https://openalex.org/I1351752","display_name":"Ko\u00e7 University","ror":"https://ror.org/00jzwgz36","country_code":"TR","type":"education","lineage":["https://openalex.org/I1351752"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"M. Saeid HaghighiFard","raw_affiliation_strings":["Ko&#x00E7; University,Department of Electrical and Electronics Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"Ko&#x00E7; University,Department of Electrical and Electronics Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I1351752"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063874470","display_name":"Sinem \u00c7\u00f6leri","orcid":"https://orcid.org/0000-0002-7502-3122"},"institutions":[{"id":"https://openalex.org/I1351752","display_name":"Ko\u00e7 University","ror":"https://ror.org/00jzwgz36","country_code":"TR","type":"education","lineage":["https://openalex.org/I1351752"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Sinem Coleri","raw_affiliation_strings":["Ko&#x00E7; University,Department of Electrical and Electronics Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"Ko&#x00E7; University,Department of Electrical and Electronics Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I1351752"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093766774"],"corresponding_institution_ids":["https://openalex.org/I1351752"],"apc_list":null,"apc_paid":null,"fwci":1.0911,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80431498,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9506999850273132,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9438999891281128,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8116519451141357},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7005593776702881},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5632538795471191},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47133374214172363},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3690352439880371},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3228069543838501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3209910988807678}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8116519451141357},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7005593776702881},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5632538795471191},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47133374214172363},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3690352439880371},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3228069543838501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3209910988807678}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vnc61989.2024.10576001","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vnc61989.2024.10576001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Vehicular Networking Conference (VNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2023835067","https://openalex.org/W2422659833","https://openalex.org/W3015613093","https://openalex.org/W3045638580","https://openalex.org/W3112379500","https://openalex.org/W3133434317","https://openalex.org/W3143519386","https://openalex.org/W3200256144","https://openalex.org/W3208393290","https://openalex.org/W3209202523","https://openalex.org/W4220764289","https://openalex.org/W4229455429","https://openalex.org/W4317795078","https://openalex.org/W4318619660","https://openalex.org/W4362598035","https://openalex.org/W4386268663","https://openalex.org/W4387449166","https://openalex.org/W4389259311","https://openalex.org/W4391045952","https://openalex.org/W4391125459","https://openalex.org/W6728757088","https://openalex.org/W6861074183","https://openalex.org/W6861357275"],"related_works":["https://openalex.org/W2105642232","https://openalex.org/W3197833032","https://openalex.org/W4386081464","https://openalex.org/W4205762803","https://openalex.org/W3207332793","https://openalex.org/W2499612753","https://openalex.org/W2535856026","https://openalex.org/W3113278055","https://openalex.org/W2265065644","https://openalex.org/W2750709484"],"abstract_inverted_index":{"Hierarchical":[0],"Federated":[1],"Learning":[2],"(HFL)":[3],"faces":[4],"the":[5,19,83,92,115,143,172,207],"significant":[6],"challenge":[7],"of":[8,86,204],"adversarial":[9],"or":[10,88],"unreliable":[11],"vehicles":[12,118],"in":[13,171,186,192,206],"vehicular":[14],"networks,":[15],"which":[16],"can":[17],"compromise":[18],"model's":[20],"integrity":[21],"through":[22],"misleading":[23],"updates.":[24,154],"Addressing":[25],"this,":[26],"our":[27,159,196],"study":[28],"introduces":[29],"a":[30,58,201],"novel":[31],"framework":[32],"that":[33],"integrates":[34],"dynamic":[35],"vehicle":[36,60],"selection":[37,47,125],"and":[38,48,68,103,110,126,142,150],"robust":[39],"anomaly":[40,69,72,98,127],"detection":[41,73,128],"mechanisms,":[42],"aiming":[43],"to":[44,77,113,148],"optimize":[45],"participant":[46],"mitigate":[49],"risks":[50],"associated":[51],"with":[52,105],"malicious":[53],"contributions.":[54],"Our":[55],"approach":[56],"involves":[57],"comprehensive":[59],"reliability":[61],"assessment,":[62],"considering":[63],"historical":[64],"accuracy,":[65],"contribution":[66,111],"frequency,":[67],"records.":[70],"An":[71],"algorithm":[74,161],"is":[75,200],"utilized":[76],"identify":[78,114],"anomalous":[79],"behavior":[80],"by":[81],"analyzing":[82],"cosine":[84],"similarity":[85],"local":[87],"model":[89],"parameters":[90],"during":[91],"federated":[93],"learning":[94,121],"(FL)":[95],"process.":[96,209],"These":[97],"records":[99],"are":[100,130],"then":[101],"registered":[102],"combined":[104],"past":[106],"performance":[107,157],"for":[108,119],"accuracy":[109],"frequency":[112],"most":[116],"suitable":[117],"each":[120],"round.":[122],"Dynamic":[123],"client":[124],"algorithms":[129],"deployed":[131],"at":[132,179],"different":[133],"levels,":[134],"including":[135],"cluster":[136,139],"heads":[137],"(CHs),":[138],"members":[140],"(CMs),":[141],"Evolving":[144],"Packet":[145],"Core":[146],"(EPC),":[147],"detect":[149],"filter":[151],"out":[152],"spurious":[153],"Through":[155],"simulation-based":[156],"evaluation,":[158],"proposed":[160,197],"demonstrates":[162],"remarkable":[163],"resilience":[164],"even":[165],"under":[166],"intense":[167],"attack":[168],"conditions.":[169],"Even":[170],"worst-case":[173],"scenarios,":[174],"it":[175],"achieves":[176],"convergence":[177],"times":[178],"63":[180],"%":[181],"as":[182,184],"effective":[183],"those":[185],"scenarios":[187,193],"without":[188,194],"any":[189],"attacks.":[190],"Conversely,":[191],"utilizing":[195],"algorithm,":[198],"there":[199],"high":[202],"likelihood":[203],"non-convergence":[205],"FL":[208]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
