{"id":"https://openalex.org/W4415427982","doi":"https://doi.org/10.3233/faia251349","title":"HPA-FedGAN: Federated Generative Adversarial Network Based on Hierarchical Prototype Alignment","display_name":"HPA-FedGAN: Federated Generative Adversarial Network Based on Hierarchical Prototype Alignment","publication_year":2025,"publication_date":"2025-10-21","ids":{"openalex":"https://openalex.org/W4415427982","doi":"https://doi.org/10.3233/faia251349"},"language":null,"primary_location":{"id":"doi:10.3233/faia251349","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251349","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia251349","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100414846","display_name":"Zhi-Gang Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhigang Wang","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100772594","display_name":"Xinhao Wang","orcid":"https://orcid.org/0000-0002-0366-7543"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinhao Wang","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101931677","display_name":"Shihao Yan","orcid":"https://orcid.org/0000-0002-4586-1926"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shihao Yan","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101977020","display_name":"Junfeng Zhao","orcid":"https://orcid.org/0000-0002-2772-1129"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junfeng Zhao","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, 01002, China","institution_ids":["https://openalex.org/I2722730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100414846"],"corresponding_institution_ids":["https://openalex.org/I2722730"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67995031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14339","display_name":"Image Processing and 3D Reconstruction","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6284999847412109},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5737000107765198},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.510200023651123},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.49619999527931213},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.47279998660087585},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.44760000705718994},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4320000112056732},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.40459999442100525},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.38269999623298645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8167999982833862},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6284999847412109},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5737000107765198},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.510200023651123},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.49619999527931213},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49459999799728394},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.47279998660087585},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.44760000705718994},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4320000112056732},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.40459999442100525},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.38269999623298645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37790000438690186},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.3725999891757965},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.367900013923645},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3560999929904938},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3553999960422516},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.35510000586509705},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.353300005197525},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.3465000092983246},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33649998903274536},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.3109999895095825},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2989000082015991},{"id":"https://openalex.org/C123138037","wikidata":"https://www.wikidata.org/wiki/Q5570871","display_name":"Global network","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2833000123500824},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C2780440489","wikidata":"https://www.wikidata.org/wiki/Q5227278","display_name":"Data-driven","level":2,"score":0.2718000113964081},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2556000053882599},{"id":"https://openalex.org/C2779606945","wikidata":"https://www.wikidata.org/wiki/Q5145847","display_name":"Collaborative network","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia251349","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251349","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia251349","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251349","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Generative":[0,24],"Adversarial":[1,25],"Networks":[2,26],"(GANs)":[3],"have":[4],"achieved":[5],"remarkable":[6],"success":[7],"in":[8,51,155],"data":[9,21,61,135,163],"synthesis":[10],"tasks,":[11],"but":[12],"centralized":[13],"training":[14,36],"methods":[15],"inherently":[16],"pose":[17],"risks":[18],"of":[19,93,132],"sensitive":[20],"exposure.":[22],"Federated":[23],"(FedGANs)":[27],"provide":[28],"a":[29,85],"privacy-preserving":[30],"solution":[31],"by":[32],"enabling":[33],"collaborative":[34],"model":[35,64,96,159],"across":[37],"distributed":[38,58],"clients":[39],"without":[40],"exchanging":[41],"raw":[42],"data.":[43],"However,":[44],"existing":[45],"FedGAN":[46,86],"frameworks":[47],"face":[48],"significant":[49,169],"challenges":[50],"practical":[52],"scenarios":[53,157],"involving":[54],"non-independent":[55],"and":[56,62,74,142,161],"identically":[57],"(non-IID)":[59],"client":[60],"heterogeneous":[63],"architectures,":[65],"often":[66],"leading":[67],"to":[68,111],"degraded":[69],"generation":[70,140],"quality,":[71],"mode":[72],"collapse,":[73],"potential":[75],"privacy":[76,146],"risks.":[77],"To":[78],"address":[79],"these":[80],"issues,":[81],"we":[82],"propose":[83],"HPA-FedGAN,":[84],"framework":[87,167],"leveraging":[88],"hierarchical":[89],"prototype":[90],"alignment.":[91],"Instead":[92],"directly":[94],"aggregating":[95],"parameters,":[97],"HPA-FedGAN":[98,166],"abstracts":[99],"local":[100,120,127],"features":[101],"into":[102],"multi-granularity":[103],"prototypes,":[104],"which":[105],"are":[106],"aggregated":[107],"on":[108],"the":[109,123,133,165],"server":[110],"form":[112],"global":[113,124,134],"prototypes.":[114],"Clients":[115],"then":[116],"hierarchically":[117],"align":[118],"their":[119],"prototypes":[121],"with":[122],"ones,":[125],"guiding":[126],"models":[128],"toward":[129],"consistent":[130],"approximation":[131],"distribution.":[136],"This":[137],"design":[138],"enhances":[139],"quality":[141],"diversity":[143],"while":[144],"improving":[145],"protection":[147],"through":[148],"feature":[149],"abstraction.":[150],"Experimental":[151],"results":[152],"demonstrate":[153],"that":[154],"complex":[156],"where":[158],"heterogeneity":[160],"Non-IID":[162],"coexist,":[164],"achieves":[168],"performance":[170],"improvements":[171],"over":[172],"state-of-the-art":[173],"methods.":[174]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-24T00:00:00"}
