{"id":"https://openalex.org/W4416254692","doi":"https://doi.org/10.48550/arxiv.2509.13634","title":"Secure UAV-assisted Federated Learning: A Digital Twin-Driven Approach with Zero-Knowledge Proofs","display_name":"Secure UAV-assisted Federated Learning: A Digital Twin-Driven Approach with Zero-Knowledge Proofs","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4416254692","doi":"https://doi.org/10.48550/arxiv.2509.13634"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2509.13634","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.13634","pdf_url":"https://arxiv.org/pdf/2509.13634","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2509.13634","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120599440","display_name":"Md Bokhtiar Al Zami","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zami, Md Bokhtiar Al","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040134968","display_name":"Md. Raihan Uddin","orcid":"https://orcid.org/0000-0001-9703-1775"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Uddin, Md Raihan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5076942188","display_name":"Dinh C. Nguyen","orcid":"https://orcid.org/0000-0002-8092-6756"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nguyen, Dinh C.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5120599440"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.875,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.875,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.0272000003606081,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.015699999406933784,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6639999747276306},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5824999809265137},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.45649999380111694},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.45019999146461487},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.42329999804496765},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.34549999237060547},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.34529998898506165},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.3402999937534332},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.3327000141143799}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7804999947547913},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6639999747276306},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5824999809265137},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5178999900817871},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.45649999380111694},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.45019999146461487},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.42329999804496765},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3402999937534332},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.3327000141143799},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.32600000500679016},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.32179999351501465},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.2980000078678131},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28439998626708984},{"id":"https://openalex.org/C157972887","wikidata":"https://www.wikidata.org/wiki/Q463359","display_name":"Convex optimization","level":3,"score":0.28380000591278076},{"id":"https://openalex.org/C157553263","wikidata":"https://www.wikidata.org/wiki/Q5168004","display_name":"Coordinate descent","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2547999918460846},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C107645828","wikidata":"https://www.wikidata.org/wiki/Q12070446","display_name":"System model","level":2,"score":0.25110000371932983}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2509.13634","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.13634","pdf_url":"https://arxiv.org/pdf/2509.13634","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2509.13634","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2509.13634","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2509.13634","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.13634","pdf_url":"https://arxiv.org/pdf/2509.13634","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0,55],"learning":[1,13,168],"(FL)":[2],"has":[3],"gained":[4],"popularity":[5],"as":[6,29,64,176],"a":[7,122,177],"privacy-preserving":[8],"method":[9,149],"of":[10,23],"training":[11],"machine":[12],"models":[14,74],"on":[15,137],"decentralized":[16],"networks.":[17,184],"However":[18],"to":[19,58,71,157,160],"ensure":[20],"reliable":[21],"operation":[22],"UAV-assisted":[24],"FL":[25,73,162],"systems,":[26],"issues":[27],"like":[28],"excessive":[30],"energy":[31,115,153],"consumption,":[32],"communication":[33],"inefficiencies,":[34],"and":[35,53,76,92,117,133,144,171],"security":[36,104],"vulnerabilities":[37],"must":[38],"be":[39],"solved.":[40],"This":[41],"paper":[42],"proposes":[43],"an":[44],"innovative":[45],"framework":[46,175],"that":[47,126],"integrates":[48],"Digital":[49],"Twin":[50],"(DT)":[51],"technology":[52],"Zero-Knowledge":[54,100],"Learning":[56],"(zkFed)":[57],"tackle":[59],"these":[60],"challenges.":[61],"UAVs":[62],"act":[63],"mobile":[65],"base":[66],"stations,":[67],"allowing":[68,106],"scattered":[69],"devices":[70],"train":[72],"locally":[75],"upload":[77],"model":[78,107],"updates":[79],"for":[80,180],"aggregation.":[81],"By":[82],"incorporating":[83],"DT":[84],"technology,":[85],"our":[86,148],"approach":[87],"enables":[88],"real-time":[89],"system":[90,152],"monitoring":[91],"predictive":[93],"maintenance,":[94],"improving":[95],"UAV":[96,128],"network":[97,138],"efficiency.":[98],"Additionally,":[99],"Proofs":[101],"(ZKPs)":[102],"strengthen":[103],"by":[105,155],"verification":[108],"without":[109],"exposing":[110],"sensitive":[111],"data.":[112],"To":[113],"optimize":[114],"efficiency":[116],"resource":[118],"management,":[119],"we":[120],"introduce":[121],"dynamic":[123],"allocation":[124],"strategy":[125],"adjusts":[127],"flight":[129],"paths,":[130],"transmission":[131],"power,":[132],"processing":[134],"rates":[135],"based":[136],"conditions.":[139],"Using":[140],"block":[141],"coordinate":[142],"descent":[143],"convex":[145],"optimization":[146],"techniques,":[147],"significantly":[150],"reduces":[151],"consumption":[154],"up":[156],"29.6%":[158],"compared":[159],"conventional":[161],"approaches.":[163],"Simulation":[164],"results":[165],"demonstrate":[166],"improved":[167],"performance,":[169],"security,":[170],"scalability,":[172],"positioning":[173],"this":[174],"promising":[178],"solution":[179],"next-generation":[181],"UAV-based":[182],"intelligent":[183]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
