Computer Science ›› 2026, Vol. 53 ›› Issue (1): 298-322.doi: 10.11896/jsjkx.250200113

• Information Security • Previous Articles     Next Articles

Privacy-preserving Computation in Edge Service Scenario of Internet of Vehicles:A Review ofTechnical Basis and Research Progress

LI Jiahui1, LI Yinglong1, CHEN Tieming1,2   

  1. 1 College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China;
    2 College of Geoinformatics, Zhejiang University of Technology, Hangzhou 310014, China
  • Received:2025-02-27 Revised:2025-05-24 Published:2026-01-08
  • About author:LI Jiahui,born in 2000,postgraduate,is a member of CCF(No.Y8989G).Her main research interests include privacy-preserving computation and IoV.
    LI Yinglong,born in 1981,Ph.D,master’s supervisor,is a member of CCF(No.31138M).His main research interests include privacy-preserving computation in edge mobile networks and artificial intelligence.
  • Supported by:
    National Natural Science Foundation of China(U22B2028) and Natural Science Foundation of Zhejiang Province,China(LY23F020022,LD22F020002).

Abstract: With the deep integration of intelligent vehicles,edge computing,and wireless communication technologies,the “vehicle-road-cloud” collaborative intelligent IoV edge service system is rapidly developing,optimizing traffic efficiency and driving safety through real-time data processing.However,the interaction and computation of massive vehicle perception data(such as location trajectories and driving behaviors) in an open edge network environment face privacy leakage risks such as eavesdropping attacks and inference attacks.Although the existing privacy protection schemes have gradually enhanced the effect of privacy protection,the characteristics of dynamic topology and resource constraints in the edge environment of the IoV create a conflict between the strength of privacy protection and service performance.Privacy-preserving computation,as an effective means of privacy protection,is of significant importance for safeguarding users’ personal rights and promoting the sustainable development of the IoV industry,and has become one of the key research areas for ensuring the services in the IoV.Initially,it outlines the edge service architecture of IoV and analyzes the potential privacy leakage risks within it.Subsequently,based on the different mechanisms of privacy-preserving computation technologies,it categorizes and discusses the privacy-preserving computation methods for IoV based on data transformation,secure multi-party computation,federated learning,and trusted execution environment technologies.On this basis,a systematic analysis and comparison of these privacy-preserving computation methods are conducted from four key evaluation dimensions:privacy leakage risk,data utility,overhead,and scalability,along with corresponding optimization strategies.Finally,the challenges faced by privacy-preserving computation technologies for IoV edge services and future research directions are discussed.

Key words: Internet of vehicles, Edge services, Privacy-preserving computation, Differential privacy, Fuzzy generalization, Secure multi-party computation, Federated learning, Trusted execution environment

CLC Number: 

  • TP391
[1]SAPUTRAY M,HOANG D T,NGUYEN D N,et al.Dynamic federated learning-based economic framework for internet-of-vehicles[J].IEEE Transactions on Mobile Computing,2023,22(4):2100-2115.
[2]FAN W,SU Y,LIU J,et al.Joint task offloading and resource allocation for vehicular edge computing based on V2I and V2V modes[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(4):4277-4292.
[3]SHEN Z H,GAO Y S,WANG H,et al.Deep deterministic poli-cy gradient caching method for privacy protection in Internet of Vehicles[J].Journal of Jilin University(Engineering and Technology Edition),2025,55(5):1638-1647.
[4]Summary of Academic Research on China ’s Automobile Engineering·2023[J].China Journal of Highway and Transport,2023,36(11):1-192.
[5]XU X,JIANG Q,ZHANG P,et al.Game theory for distributedIoV task offloading with fuzzy neural network in edge computing[J].IEEE Transactions on Fuzzy Systems,2022,30(11):4593-4604.
[6]HAN M,YANG C,HUA L,et al.Vehicle Pseudonym Management Scheme for Mobile Edge Computing Vehicle Networking[J].Computer Research and Development,2021,59(4):781-795.
[7]JIVTHESH M R,SAMUEL R M,GAUSHIK M R,et al.Smartverse:blockchain based crowdsourced V2X message verification and dissemination system[C]//2023 15th International Confe-rence on Communication Systems & Networks(COMSNETS).IEEE,2023:84-89.
[8]VIJAYAKUMAR P,AZEES M,KOZLOV S A,et al.An Ano-nymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(2):1630-1638.
[9]AGRAWAL N,BINNS R,VAN KLEEK M,et al.ExploringDesign and Governance Challenges in the Development of Privacy-Preserving Computation[C]//Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems.New York:ACM,2021:1-13.
[10]SHINDE S S,TARCHI D.Joint Air-Ground Distributed Federated Learning for Intelligent Transportation Systems[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(9):9996-10011.
[11]DAI Y F,ZHOU X Z,FAN Z Y,et al.Key-driven trust mechanisms for identity authentication in vehicular networks[J].Journal of Jilin University(Engineering and Technology Edition),2025,55(5):1788-1797.
[12]LI Z,WU H,LU Y,et al.Matching game for multi-task federated learning in internet of vehicles[J].IEEE Transactions on Vehicular Technology,2024,73(2):1623-1636.
[13]ZHANG X,WANG J,ZHANG H,et al.Data-driven transportation network company vehicle scheduling with users’ location differential privacy preservation[J].IEEE Transactions on Mobile Computing,2023,22(2):813-823.
[14]YU H,ZHANG H,JIA X,et al.PSafety:Privacy-preservingsafety monitoring in online ride hailing services[J].IEEE Transactions on Dependable and Secure Computing,2023,20(1):209-224.
[15]GHOSAL A,CONTI M.Security issues and challenges in V2X:A Survey[J].Computer Networks:The International Journal of Computer and Telecommunications Networking,2020,169.
[16]HUANG J,FANG D,QIAN Y,et al.Recent Advances andChallenges in Security and Privacy for V2X Communications[J].IEEE Open Journal of Vehicular Technology,2020,1:244-266.
[17]LU R,ZHANG L,NI J,et al.5G Vehicle-to-Everything Ser-vices:Gearing Up for Security and Privacy[C]//Proceedings of the IEEE.2020:373-389.
[18]MOYA OSORIO D P,AHMAD I,SANCHEZ J D V,et al.Towards 6G-Enabled Internet of Vehicles:Security and Privacy[J].IEEE Open Journal of the Communications Society,2022,3:82-105.
[19]SEDAR R,KALALAS C,VAZQUEZ-GALLEGO F,et al.AComprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths[J].IEEE Open Journal of the Communications Society,2023,4:325-391.
[20]DENG Y K,ZHANG L,LI J.Research on Privacy Protection of Internet of Vehicles[J].Application Research of Computers,2022,39(10):2891-2906.
[21]LIU H,ZHANG L,LI J.Survey on Privacy Preserving Data Aggregation Based on Internet of Vehicles[J].Application Research of Computers,2022,39(12):3546-3554.
[22]ZHANG X Q,LIU Y W,LIU J X,et al.A Survey of Federated Learning for Edge Intelligence[J].Computer Research and Development,2023,60(6):1276-1295.
[23]HADDAJI A,AYED S,CHAARI FOURATI L.IoV securityand privacy survey:Issues,countermeasures,and challenges[J].Journal of Supercomputing,2024,80(15):23018-23082.
[24]ABIDI R,AZZOUNA N B,TROJET W,et al.A study of mecha-nisms and approaches for IoV trust models requirements achievement[J].Journal of Supercomputing,2024,80(3):4157-4201.
[25]LI R Q,HU X Y,ZHANG J Y,et al.Research on Privacy Protection Technology of Internet of Vehicles[J].Journal of Information Security,20240,9(2):1-18.
[26]LI S,LI J,PEI J,et al.Eco-CSAS:a safe and eco-friendly speed advisory system for autonomous vehicle platoon using consortium blockchain[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(7):7802-7812.
[27]WANG S,LI J,WU G,et al.Joint optimization of task offloa-ding and resource allocation based on differential privacy in vehicular edge computing[J].IEEE Transactions on ComputationalSocial Systems,2022,9(1):109-119.
[28]GUO B,LIU S C,LIU Y,et al.Intelligent Internet of Things:Concept,Architecture and Key Technologies[J].Chinese Journal of Computers,2023,46(11):2259-2278.
[29]ZHOU H,XU W,CHEN J,et al.Evolutionary V2X Technologies Toward the Internet of Vehicles:Challenges and Opportunities[C]//Proceedings of the IEEE.2020:308-323.
[30]WANG Z.Automotive Data Gets a “Safety Lock”[N].People’s Daily,2021-12-26:004.
[31]Summary and Analysis of Data Leakage Incidents in the Automotive Industry[EB/OL]. https://www.anyong.net/industrynews/1266.html.
[32]GOUPSEC. Volkswagen Group Suffers Severe Data Leakage in Europe,800 000 Car Owners Can Be Located[EB/OL].http://mp.weixin.qq.com/s?__biz=MzkxNTI2MTI1NA==&mid=2247501939&idx=1&sn=2a54c17ec6b87ad1ed5a0d59689c9885&chksm=c08436f7495fe0ac6a95d1e79bb9377239d4d1bc6c4ecfe231a62365171a263aa46d544d9678#rd.
[33]U.S.Automotive Parts Giant AutoZone Suffered a Cyber Attack[EB/OL].https://cn-sec.com/archives/2237681.html.
[34]YANG Z Y.Add a “Safety Lock” to Automotive Data[N].Economic Daily,2022-12-23:009.
[35]WANG Z,HUANG Y,SONG M,et al.Poisoning-assisted pro-perty inference attack against federated learning[J].IEEE Transactions on Dependable and Secure Computing,2023,20(4):3328-3340.
[36]ZHOU H L,ZHENG Y F,HUANG H J,et al.Toward robust hierarchical federated learning in internet of vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(5):5600-5614.
[37]LIU L,WANG Y,LIU G,et al.Membership inference attacksagainst machine learning models via prediction sensitivity[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2341-2347.
[38]AZEES M,VIJAYAKUMAR P,JEGATHA DEBORAH L.Comprehensive survey on security services in vehicular ad-hoc networks[J].IET Intelligent Transport Systems,2016,10(6):379-388.
[39]BARUAH B,DHAL S.A security and privacy preserved intelligent vehicle navigation system[J].IEEE Transactions on Dependable and Secure Computing,2023,20(2):944-959.
[40]DWORK C,LEI J.Differential privacy and robust statistics[C]//Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing.ACM,2009:371-380.
[41]XU Q,ZHAO L,SU Z,et al.Secure federated learning in quantum autonomous vehicular networks[J].IEEE Network,2023,37(6):240-247.
[42]WANG Z,LI Y,LI D,et al.Enabling fairness-aware and privacy-preserving for quality evaluation in vehicular crowdsensing:a decentralized approach[J].Security and Communication Networks,2021,2021.
[43]SALEEM M A,LI X,AYUB M F,et al.An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(9):9940-9951.
[44]YING Z,CAO S,LIU X,et al.PrivacySignal:Privacy-Preserving Traffic Signal Control for Intelligent Transportation System[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(9):16290-16303.
[45]FANG K,WANG T,TONG L,et al.Non-intrusive security as-sessment methods for future autonomous transportation IoV[J].IEEE Transactions on Automation Science and Enginee-ring,2023,21(3):2387-2399.
[46]QU Z,TANG Y,MUHAMMAD G,et al.Privacy protection in intelligent vehicle networking:A novel federated learning algorithm based on information fusion[J].Information Fusion,2023,98:101824.
[47]XU C,DING Y,CHEN C,et al.Personalized location privacyprotection for location-based services in vehicular networks[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(1):1163-1177.
[48]BI R,XIONG J,TIAN Y,et al.Edge-cooperative privacy-preserving object detection over random point cloud shares for connected autonomous vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(12):24979-24990.
[49]ERLINGSSON Ú,FELDMAN V,MIRONOV I,et al.Amplification by Shuffling:From Local to Central Differential Privacy via Anonymity[J].arXiv:1811.12469,2018.
[50]LIN G,QIN S,KHATTAK Z H.FedAV:federated learning for cyberattack vulnerability and resilience of cooperative driving automation[J].Communications in Transportation Research,2025,5:100175.
[51]ZHANG C,ZHANG X M,SOTTIWAT E,et al.Generative gradient inversion via over-parameterized networks in federated learning[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2023:5126-5135.
[52]LI Y,SHI J,MENG D,et al.FuzzyCom:privacy-aware trajectory data compression using fuzzy sets in edge vehicular networks[C]//2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems(MASS).IEEE,2022:613-619.
[53]CHEN T,TIAN X,LI Y,et al.FuzzyFollow:A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets[C]//2024 27th International Conference on Computer Supported Cooperative Work in Design(CSCWD).2024:2484-2490.
[54]LI Y,LIU F,ZHANG J,et al.Privacy-aware fuzzy skyline par-king recommendation using edge traffic facilities[J].IEEE Transactions on Vehicular Technology,2021,70(10):9775-9786.
[55]CHEN T,JIANG Q,LI Y,et al.Privacy-aware edge intelligentparking recommendation using intuitionistic fuzzy sets[J].IEEE Transactions on Industrial Informatics,2025,21(5):3606-3615.
[56]LIU B,XIE S,WANG H,et al.VTDP:privately sanitizing fine-grained vehicle trajectory data with boosted utility[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2643-2657.
[57]CHEN X,ZHANG T,SHEN S,et al.An optimized differential privacy scheme with reinforcement learning in VANET[J].Computers & Security,2021,110:102446.
[58]CAI S,LYU X,LI X,et al.A trajectory released scheme for the internet of vehicles based on differential privacy[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(9):16534-16547.
[59]WEI J,LIN Y,YAO X,et al.Differential privacy-based location protection in spatial crowdsourcing[J].IEEE Transactions on Services Computing,2022,15(1):45-58.
[60]LIU M,CHENG L,GU Y,et al.MPC-CSAS:multi-party computation for real-time privacy-preserving speed advisory systems[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(6):5887-5893.
[61]LIU D,YU G,DING Y,et al.Privacy preserving multi-partycomputation with secret sharing for trajectory prediction in VANETs[J].IEEE Transactions on Vehicular Technology,2024,73(12):18666-18677.
[62]PENG T,ZHONG W,WANG G,et al.Privacy-preserving truth discovery based on secure multi-party computation in vehicle-based mobile crowdsensing[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(7):7767-7779.
[63]WANG H,FAN K,ZHANG K,et al.Encrypted data retrieval and sharing scheme in space-air-ground-integrated vehicular networks[J].IEEE Internet of Things Journal,2022,9(8):5957-5970.
[64]CHENG H,SHOJAFAR M,ALAZAB M,et al.PPVF:privacy-preserving protocol for vehicle feedback in cloud-assisted VANET[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(7):9391-9403.
[65]JIANG W,GUO Z.An Anonymous Authentication Scheme forInternet of Vehicles Based on TRUG-PBFT Master-Slave Chains and Zero-Knowledge Proof[J].IEEE Internet of Things Journal,2024,12(7):7763-7777.
[66]GUO Y,WANG Z,CUI H,et al.Vehicloak:A Blockchain-Ena-bled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services[J].IEEE Transactions on Mobile Computing,2023,22(11):6830-6842.
[67]BATOOL H,ANJUM A,KHAN A,et al.A secure and privacy preserved infrastructure for VANETs based on federated lear-ning with local differential privacy[J].Information Sciences,2024,652:119717.
[68]ZHAO L,WAN Q,ZOU Q,et al.Privacy-preserving collaborative deep learning with unreliable participants[J].IEEE Transactions on Information Forensics and Security,2020,15:1486-1500.
[69]LI J H,WU Q M.Research on Internet of Vehicles data coope-rative learning and communication optimization based on tripartite federated learning[J].Modern Electronics Technique,2024,47(15):26-33.
[70]KONG Q,YIN F,LU R,et al.Privacy-preserving aggregationfor federated learning-based navigation in vehicular fog[J].IEEE Transactions on Industrial Informatics,2021,17(12):8453-8463.
[71]LI B,JIANG Y,PEI Q,et al.FEEL:Federated end-to-end lear-ning with non-IID data for vehicular ad hoc networks[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(9):16728-16740.
[72]LI Y,LI H,XU G,et al.Efficient privacy-preserving federated learning with unreliable users[J].IEEE Internet of Things Journal,2022,9(13):11590-11603.
[73]HUANG H,SUN C,LEI X,et al.Privacy-preserving travel time prediction for internet of vehicles:A crowdsensing and federated learning approach[C]//Neural Information Processing.Singapore:Springer,2024:55-66.
[74]ZHAO L,JIANG J,FENG B,et al.SEAR:secure and efficient aggregation for byzantine-robust federated learning[J].IEEE Transactions on Dependable and Secure Computing,2022,19(5):3329-3342.
[75]XU Z,ZHANG R,LIANG W,et al.A privacy-preserving data aggregation protocol for internet of vehicles with federated learning[J].IEEE Transactions on Intelligent Vehicles,2025,10(1):217-227.
[76]ZHANG D,FAN L.Cerberus:Privacy-Preserving Computation in Edge Computing[C]//IEEE INFOCOM 2020-IEEE Confe-rence on Computer Communications Workshops(INFOCOM WKSHPS).2020:43-49.
[77]CHEN X,DING J,LU Z.A decentralized trust managementsystem for intelligent transportation environments[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(1):558-571.
[78]ZADEH L A.Fuzzy sets[J].Information and Control,1965,8(3):338-353.
[79]KAMRA N,ZHU H,TRIVEDI D K,et al.Multi-agent trajectory prediction with fuzzy query attention[C]//Advances in Neural Information Processing Systems.Curran Associates Inc.,2020:22530-22541.
[80]ISMAEL S F,ALIAS A H,ZAIDAN A A,et al.Toward Sustainable Transportation:A Pavement Strategy Selection Based on the Extension of Dual-Hesitant Fuzzy Multicriteria Decision-Making Methods[J].IEEE Transactions on Fuzzy Systems,2023,31(2):380-393.
[81]MIAO T,SHEN J,LAI C F,et al.Fuzzy-based trustworthiness evaluation scheme for privilege management in vehicular ad hoc networks[J].IEEE Transactions on Fuzzy Systems,2021,29(1):137-147.
[82]LI Y,LIU W,ZHU Y,et al.Privacy-aware fuzzy range queryprocessing over distributed edge devices[J].IEEE Transactions on Fuzzy Systems,2022,30(5):1421-1435.
[83]LIU L,LIAN M,LU C,et al.TCSA:a traffic congestion situation assessment scheme based on multi-index fuzzy comprehensive evaluation in 5G-IoV[J].Electronics,2022,11(7):1032.
[84]DIAKOULAKI D,MAVROTAS G,PAPAYANNAKIS L.Determining objective weights in multiple criteria problems:The critic method[J].Computers & Operations Research,1995,22(7):763-770.
[85]LI Y,YANG S,REN X,et al.Multi-Stage Asynchronous Fede-rated Learning With Adaptive Differential Privacy[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2024,46(2):1243-1256.
[86]LI Y,TAO X,ZHANG X,et al.Break the Data Barriers While Keeping Privacy:A Graph Differential Privacy Method[J].IEEE Internet of Things Journal,2023,10(5):3840-3850.
[87]WANG X,KIM B G,AMOON M,et al.Federated learning with local differential privacy for autonomous electronic vehicles:enhancing security and performance[J].IEEE Transactions on Consumer Electronics,2025,71(2):6147-6157.
[88]AN D,YANG Q,LI D,et al.Where Am I Parking:Incentive Online Parking-Space Sharing Mechanism With Privacy Protection[J].IEEE Transactions on Automation Science and Engineering,2022,19(1):143-162.
[89]AN D,YANG Q,YU W,et al.LoPrO:Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging[J].Future Generation Computer Systems,2020,107:394-407.
[90]ANDRES M E,BORDENABE N E,CHATZIKOKOLAKIS K,et al.Geo-indistinguishability:Differential privacy for location-based systems[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security.New York:ACM,2013:901-914.
[91]HAN W L,SONG L S,RUAN W Q,et al.Secure Multi-Party Learning:From Secure Computing to Secure Learning[J].Chinese Journal of Computers,2023,46(7).
[92]YANG H,VIJAYAKUMAR P,SHEN J,et al.A location-based privacy-preserving oblivious sharing scheme for indoor navigation[J].Future Generation Computer Systems,2022,137:42-52.
[93]BI R,XIONG J,TIAN Y,et al.Achieving lightweight and privacy-preserving object detection for connected autonomous vehicles[J].IEEE Internet of Things Journal,2023,10(3):2314-2329.
[94]MOHANTY T,SRIVASTAVA V,DEBNATH S K,et al.Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application[J].IEEE Internet of Things Journal,2024,11(1):1761-1772.
[95]SUTRADHAR K.A Quantum Cryptographic Protocol for Se-cure Vehicular Communication[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(5):3513-3522.
[96]HAN X,TIAN D,ZHOU J,et al.Privacy-preserving proxy re-encryption with decentralized trust management for MEC-empowered VANETs[J].IEEE Transactions on Intelligent Vehicles,2023,8(8):4105-4119.
[97]LI L,LIU J,CHENG L,et al.CreditCoin:A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2018,19(7):2204-2220.
[98]LI T,XIE S,ZENG Z,et al.ATPS:An AI Based Trust-Aware and Privacy-Preserving System for Vehicle Managements in Sustainable VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(10):19837-19851.
[99]JIANG S,LI J,SANG G,et al.Vehicular edge computing meets cache:An access control scheme with fair incentives for privacy-aware content delivery[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(8):8404-8418.
[100]MCMAHAN H B,MOORE E,RAMAGE D,et al.Communication-efficient learning of deep networks from decentralized data[J].arXiv:1602.05629,2016.
[101]GU Y H,BAI Y B.Research Progress on Security and Privacy of Federated Learning Model[J].Journal of Software,2022,34(6):2833-2864.
[102]GEIPING J,BANUERMEISTER H,DROGE H,et al.Inverting gradients-how easy is it to break privacy in federated learning?[C]//Proceedings of the 34th International Conference on Neural Information Processing Systems.Red Hook,NY:Curran Associates Inc.,2020:16937-16947.
[103]JIANG S,LI J,SANG G,et al.Vehicular edge computing meets cache:An access control scheme with fair incentives for privacy-aware content delivery[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(8):8404-8418.
[104]LI Y,TAO X,ZHANG X,et al.Privacy-preserved federatedlearning for autonomous driving[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(7):8423-8434.
[105]ZHAO J,CHANG X,FENG Y,et al.Participant selection forfederated learning with heterogeneous data in intelligent transport system[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(1):1106-1115.
[106]WU W,HE L,LIN W,et al.SAFA:a semi-asynchronous protocol for fast federated learning with low overhead[J].IEEE Transactions on Computers,2021,70(5):655-668.
[107]WU Y H,BAI G W,SHEN H.Multi-Dimensional Resource Dynamic Allocation Algorithm Based on Federated Learning in Vehicular Networks[J].Computer Science,2022,49(12):59-65.
[108]MO Z J,GAO Z P,YANG Y,et al.An Efficient DistributedModel Sharing Strategy for Data Privacy Protection in Vehicular Networks[J].Journal of China Institute of Communications,2022,43(4):83-94.
[109]WANG L L,WU S L,YANG N,et al.Research on Double-Layer Asynchronous Federated Learning of Vehicle Network Based on Two-Factor Update[J].Journal of Electronics and Informatics,2022,46(7):1-8.
[110]JIANG X,BORCEA C.Complement sparsification:low-overhead model pruning for federated learning[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2023:8087-8095.
[111]SHANG E,LIU H,YANG Z,et al.FedBiKD:federated bidirectional knowledge distillation for distracted driving detection[J].IEEE Internet of Things Journal,2023,10(13):11643-11654.
[112]ZHAO C,GAO Z,WANG Q,et al.FedSup:a communication-efficient federated learning fatigue driving behaviors supervision approach[J].Future Generation Computer Systems,2023,138:52-60.
[113]ZHANG J,ZHANG J,MA Z,et al.RUPT-FL:robust two-layered privacy-preserving federated learning framework with unlinkability for IoV[J].IEEE Transactions on Vehicular Technology,2025(4):74.
[114]YU D,ZHANG H,CHEN W,et al.Gradient perturbation is underrated for differentially private convex optimization[C]//Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence.2021:3117-3123.
[115]CAO S X,CHEN C M,TANG P,et al.Differential Privacy Fe-derated Learning Algorithm Based on Function Mechanism[J].Chinese Journal of Computers,2023,46(10):2178-2195.
[116]LI J,WEI K,MA C,et al.DP-GenFL:A local differentially private federated learning system through generative data[J].Science China Information Sciences,2023,66(8):189303:1-189303:2.
[117]ZHANG S,YUAN W,YIN H.Comprehensive privacy analysis on federated recommender system against attribute inference attacks[J].IEEE Transactions on Knowledge and Data Enginee-ring,2024,36(3):13.
[118]LIU D,PEI X K,LAI J S,et al.Privacy Protection Scheme Combining Edge Intelligent Computing and Federated Learning[J].Journal of the University of Electronic Science and Technology of China,2023,52(1):95-101.
[119]HUI Y,HU J,CHENG N,et al.RCFL:Redundancy-AwareCollaborative Federated Learning in Vehicular Networks[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(6):5539-5553.
[120]GUO H,HUANG W,LIU J,et al.Inter-Server Collaborative Federated Learning for Ultra-Dense Edge Computing[J].IEEE Transactions on Wireless Communications,2022,21(7):5191-5203.
[121]LI Z,WU H,LU Y.Coalition based utility and efficiency optimization for multi-task federated learning in internet of vehicles[J].Future Generation Computer Systems,2023,140:196-208.
[122]JAI VINITA L,VETRISELVI V.Federated Learning-basedMisbehaviour detection on an emergency message dissemination scenario for the 6G-enabled Internet of Vehicles[J].Ad Hoc Networks,2023,144:103153.
[123]ZHANG X,CHANG Z,HU T,et al.Vehicle Selection and Resource Allocation for Federated Learning-Assisted Vehicular Network[J].IEEE Transactions on Mobile Computing,2024,23(5):3817-3829.
[124]TOLPEGIN V,TRUEX S,GURSOY M E,et al.Data poisoning attacks against federated learning systems[C]//Computer Security-ESORICS 2020.Cham:Springer,2020:480-501.
[125]KUMAR S P,GOPE P,PUTHAL D.Blockchain and federated learning-enabled distributed secure and privacy-preserving computing architecture for IoT network[C]//2022 IEEE European Symposium on Security and Privacy Workshops(EuroS & PW).IEEE,2022.
[126]WANG Y,LI G L,LI K Y.A Review of Federal Learning Contribution Assessment[J].Journal of Software,2023,34(3):1168-1192.
[127]ZHAO Z,XIANG T,BI Y,et al.A Novel Multi-Criteria Contribution Evaluation Scheme for Federated Learning in Internet of Vehicles[C]//2023 15th International Conference on Communication Software and Networks(ICCSN).IEEE,2023:319-325.
[128]LI C,SONG M,LUO Y.Federated learning based on stackel-berg game in unmanned-aerial-vehicle-enabled mobile edge computing.[J].Expert Systems With Applications,2024,235:121023.
[129]WU Q,ZHAO Y,FAN Q,et al.Mobility-aware cooperative ca-ching in vehicular edge computing based on asynchronous fede-rated and deep reinforcement learning[J].IEEE Journal of Selec-ted Topics in Signal Processing,2023,17(1):66-81.
[130]OUALIL S,OUCHEIKH R,EL KAMILI M,et al.A personali-zed learning scheme for internet of vehicles caching[C]//2021 IEEE Global Communications Conference(GLOBECOM).2021:1-6.
[131]LI Y,ZENG D,GU L,et al.PASTO:enabling secure and efficient task offloading in TrustZone-enabled edge clouds[J].IEEE Transactions on Vehicular Technology,2023,72(6):8234-8238.
[132]CHEN G,ZHANG Y.Securing TEEs with verifiable execution contracts[J].IEEE Transactions on Dependable and Secure Computing,2023,20(4):3222-3237.
[133]MIAO X,CHANG R,ZHAO J,et al.CVTEE:A compatibleverified TEE architecture with enhanced security.[J].IEEE Transactions on Dependable and Secure Computing,2023,20(1):377-391.
[134]ULLAH I,KHALIL I,BAI X,et al.An ensemble-based hybrid model for the detection of attacks in the internet of vehicular things[J].IEEE Transactions on Intelligent Transportation Systems(Early Access),2025:1-14.
[135]CHEN X,SONG X,REN R,et al.Fine-grained privacy detection with graph-regularized hierarchical attentive representation learning[J].ACM Transactions on Information Systems,2020,38(4):1-26.
[136]AMARAL O,ABUALHAIJA S,TORRE D,et al.AI-enabled automation for completeness checking of privacy policies[J].IEEE Transactions on Software Engineering,2022,48(11):4647-4674.
[137]CHEN C,ZHOU D,YE Y,et al.CLEAR:towards contextual LLM-empowered privacy policy analysis and risk generation for large language model applications[C]//Proceedings of the 30th International Conference on Intelligent User Interfaces.New York:ACM,2025:277-297.
[138]CAO X,YU J,HAN J,et al.A transformer decoder-based ge-nerative adversarial model with TrajLoss function for privacy-preserving trajectory publishing[C]//Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing(MLNLP 2022).2022:271-278.
[139]HU Y,WU F,LI Q,et al.SoK:Privacy-Preserving Data Synthesis[C]//2024 IEEE Symposium on Security and Privacy(SP).2024:4696-4713.
[140]SHANG F J,DENG X X.Blockchain-based privacy-preservinginternet of vehicles data sharing scheme[J].Journal of Chongqing University of Posts and Telecommunications( Natural Science Edition),2025,37(2):155-164.
[141]ZHOU J,CHEN S,CHOO K K R,et al.EPNS:Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs[J].IEEE Transactions on Mobile Computing,2023,22(3):1491-1506.
[142]CAI Z,XIONG A.Understand users’ privacy perception and decision of V2X communication in connected autonomous vehicles[C]//32nd USENIX Security Symposium,USENIX Security 2023.2023:2975-2992.
[1] WU Jiagao, YI Jing, ZHOU Zehui, LIU Linfeng. Personalized Federated Learning Framework for Long-tailed Heterogeneous Data [J]. Computer Science, 2025, 52(9): 232-240.
[2] LUO Yanjie, LI Lin, WU Xiaohua, LIU Jia. Happiness Prediction Approach via Adaptive Privacy Budget Allocation [J]. Computer Science, 2025, 52(7): 372-378.
[3] WANG Chundong, ZHANG Qinghua, FU Haoran. Federated Learning Privacy Protection Method Combining Dataset Distillation [J]. Computer Science, 2025, 52(6A): 240500132-7.
[4] JIANG Yufei, TIAN Yulong, ZHAO Yanchao. Persistent Backdoor Attack for Federated Learning Based on Trigger Differential Optimization [J]. Computer Science, 2025, 52(4): 343-351.
[5] LUO Zhengquan, WANG Yunlong, WANG Zilei, SUN Zhenan, ZHANG Kunbo. Study on Active Privacy Protection Method in Metaverse Gaze Communication Based on SplitFederated Learning [J]. Computer Science, 2025, 52(3): 95-103.
[6] HU Kangqi, MA Wubin, DAI Chaofan, WU Yahui, ZHOU Haohao. Federated Learning Evolutionary Multi-objective Optimization Algorithm Based on Improved NSGA-III [J]. Computer Science, 2025, 52(3): 152-160.
[7] WANG Ruicong, BIAN Naizheng, WU Yingjun. FedRCD:A Clustering Federated Learning Algorithm Based on Distribution Extraction andCommunity Detection [J]. Computer Science, 2025, 52(3): 188-196.
[8] WANG Dongzhi, LIU Yan, GUO Bin, YU Zhiwen. Edge-side Federated Continuous Learning Method Based on Brain-like Spiking Neural Networks [J]. Computer Science, 2025, 52(3): 326-337.
[9] XIE Jiachen, LIU Bo, LIN Weiwei , ZHENG Jianwen. Survey of Federated Incremental Learning [J]. Computer Science, 2025, 52(3): 377-384.
[10] ZHENG Jianwen, LIU Bo, LIN Weiwei, XIE Jiachen. Survey of Communication Efficiency for Federated Learning [J]. Computer Science, 2025, 52(2): 1-7.
[11] WANG Xin, CHEN Kun, SUN Lingyun. Research on Foundation Model Methods for Addressing Non-IID Issues in Federated Learning [J]. Computer Science, 2025, 52(12): 302-313.
[12] PENG Jiao, CHANG Yongjuan, YAN Tao, YOU Zhangzheng, SONG Meina, ZHU Yifan, ZHANG Pengfei, HE Yue, ZHANG Bo, OU Zhonghong. Decentralized Federated Learning Algorithm Sensitive to Delay [J]. Computer Science, 2025, 52(12): 314-320.
[13] SU Xinzhong, XU Youyun. Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation [J]. Computer Science, 2025, 52(12): 331-338.
[14] ZHAO Tong, CHEN Xuebin, WANG Liu, JING Zhongrui, ZHONG Qi. Backdoor Attack Method for Federated Learning Based on Knowledge Distillation [J]. Computer Science, 2025, 52(11): 434-443.
[15] DUN Jingbo, LI Zhuo. Survey on Transmission Optimization Technologies for Federated Large Language Model Training [J]. Computer Science, 2025, 52(1): 42-55.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!