Computer Science ›› 2026, Vol. 53 ›› Issue (1): 298-322.doi: 10.11896/jsjkx.250200113
• Information Security • Previous Articles Next Articles
LI Jiahui1, LI Yinglong1, CHEN Tieming1,2
CLC Number:
| [1]SAPUTRAY M,HOANG D T,NGUYEN D N,et al.Dynamic federated learning-based economic framework for internet-of-vehicles[J].IEEE Transactions on Mobile Computing,2023,22(4):2100-2115. [2]FAN W,SU Y,LIU J,et al.Joint task offloading and resource allocation for vehicular edge computing based on V2I and V2V modes[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(4):4277-4292. [3]SHEN Z H,GAO Y S,WANG H,et al.Deep deterministic poli-cy gradient caching method for privacy protection in Internet of Vehicles[J].Journal of Jilin University(Engineering and Technology Edition),2025,55(5):1638-1647. [4]Summary of Academic Research on China ’s Automobile Engineering·2023[J].China Journal of Highway and Transport,2023,36(11):1-192. [5]XU X,JIANG Q,ZHANG P,et al.Game theory for distributedIoV task offloading with fuzzy neural network in edge computing[J].IEEE Transactions on Fuzzy Systems,2022,30(11):4593-4604. [6]HAN M,YANG C,HUA L,et al.Vehicle Pseudonym Management Scheme for Mobile Edge Computing Vehicle Networking[J].Computer Research and Development,2021,59(4):781-795. [7]JIVTHESH M R,SAMUEL R M,GAUSHIK M R,et al.Smartverse:blockchain based crowdsourced V2X message verification and dissemination system[C]//2023 15th International Confe-rence on Communication Systems & Networks(COMSNETS).IEEE,2023:84-89. [8]VIJAYAKUMAR P,AZEES M,KOZLOV S A,et al.An Ano-nymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(2):1630-1638. [9]AGRAWAL N,BINNS R,VAN KLEEK M,et al.ExploringDesign and Governance Challenges in the Development of Privacy-Preserving Computation[C]//Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems.New York:ACM,2021:1-13. [10]SHINDE S S,TARCHI D.Joint Air-Ground Distributed Federated Learning for Intelligent Transportation Systems[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(9):9996-10011. [11]DAI Y F,ZHOU X Z,FAN Z Y,et al.Key-driven trust mechanisms for identity authentication in vehicular networks[J].Journal of Jilin University(Engineering and Technology Edition),2025,55(5):1788-1797. [12]LI Z,WU H,LU Y,et al.Matching game for multi-task federated learning in internet of vehicles[J].IEEE Transactions on Vehicular Technology,2024,73(2):1623-1636. [13]ZHANG X,WANG J,ZHANG H,et al.Data-driven transportation network company vehicle scheduling with users’ location differential privacy preservation[J].IEEE Transactions on Mobile Computing,2023,22(2):813-823. [14]YU H,ZHANG H,JIA X,et al.PSafety:Privacy-preservingsafety monitoring in online ride hailing services[J].IEEE Transactions on Dependable and Secure Computing,2023,20(1):209-224. [15]GHOSAL A,CONTI M.Security issues and challenges in V2X:A Survey[J].Computer Networks:The International Journal of Computer and Telecommunications Networking,2020,169. [16]HUANG J,FANG D,QIAN Y,et al.Recent Advances andChallenges in Security and Privacy for V2X Communications[J].IEEE Open Journal of Vehicular Technology,2020,1:244-266. [17]LU R,ZHANG L,NI J,et al.5G Vehicle-to-Everything Ser-vices:Gearing Up for Security and Privacy[C]//Proceedings of the IEEE.2020:373-389. [18]MOYA OSORIO D P,AHMAD I,SANCHEZ J D V,et al.Towards 6G-Enabled Internet of Vehicles:Security and Privacy[J].IEEE Open Journal of the Communications Society,2022,3:82-105. [19]SEDAR R,KALALAS C,VAZQUEZ-GALLEGO F,et al.AComprehensive Survey of V2X Cybersecurity Mechanisms and Future Research Paths[J].IEEE Open Journal of the Communications Society,2023,4:325-391. [20]DENG Y K,ZHANG L,LI J.Research on Privacy Protection of Internet of Vehicles[J].Application Research of Computers,2022,39(10):2891-2906. [21]LIU H,ZHANG L,LI J.Survey on Privacy Preserving Data Aggregation Based on Internet of Vehicles[J].Application Research of Computers,2022,39(12):3546-3554. [22]ZHANG X Q,LIU Y W,LIU J X,et al.A Survey of Federated Learning for Edge Intelligence[J].Computer Research and Development,2023,60(6):1276-1295. [23]HADDAJI A,AYED S,CHAARI FOURATI L.IoV securityand privacy survey:Issues,countermeasures,and challenges[J].Journal of Supercomputing,2024,80(15):23018-23082. [24]ABIDI R,AZZOUNA N B,TROJET W,et al.A study of mecha-nisms and approaches for IoV trust models requirements achievement[J].Journal of Supercomputing,2024,80(3):4157-4201. [25]LI R Q,HU X Y,ZHANG J Y,et al.Research on Privacy Protection Technology of Internet of Vehicles[J].Journal of Information Security,20240,9(2):1-18. [26]LI S,LI J,PEI J,et al.Eco-CSAS:a safe and eco-friendly speed advisory system for autonomous vehicle platoon using consortium blockchain[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(7):7802-7812. [27]WANG S,LI J,WU G,et al.Joint optimization of task offloa-ding and resource allocation based on differential privacy in vehicular edge computing[J].IEEE Transactions on ComputationalSocial Systems,2022,9(1):109-119. [28]GUO B,LIU S C,LIU Y,et al.Intelligent Internet of Things:Concept,Architecture and Key Technologies[J].Chinese Journal of Computers,2023,46(11):2259-2278. [29]ZHOU H,XU W,CHEN J,et al.Evolutionary V2X Technologies Toward the Internet of Vehicles:Challenges and Opportunities[C]//Proceedings of the IEEE.2020:308-323. [30]WANG Z.Automotive Data Gets a “Safety Lock”[N].People’s Daily,2021-12-26:004. [31]Summary and Analysis of Data Leakage Incidents in the Automotive Industry[EB/OL]. https://www.anyong.net/industrynews/1266.html. [32]GOUPSEC. Volkswagen Group Suffers Severe Data Leakage in Europe,800 000 Car Owners Can Be Located[EB/OL].http://mp.weixin.qq.com/s?__biz=MzkxNTI2MTI1NA==&mid=2247501939&idx=1&sn=2a54c17ec6b87ad1ed5a0d59689c9885&chksm=c08436f7495fe0ac6a95d1e79bb9377239d4d1bc6c4ecfe231a62365171a263aa46d544d9678#rd. [33]U.S.Automotive Parts Giant AutoZone Suffered a Cyber Attack[EB/OL].https://cn-sec.com/archives/2237681.html. [34]YANG Z Y.Add a “Safety Lock” to Automotive Data[N].Economic Daily,2022-12-23:009. [35]WANG Z,HUANG Y,SONG M,et al.Poisoning-assisted pro-perty inference attack against federated learning[J].IEEE Transactions on Dependable and Secure Computing,2023,20(4):3328-3340. [36]ZHOU H L,ZHENG Y F,HUANG H J,et al.Toward robust hierarchical federated learning in internet of vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(5):5600-5614. [37]LIU L,WANG Y,LIU G,et al.Membership inference attacksagainst machine learning models via prediction sensitivity[J].IEEE Transactions on Dependable and Secure Computing,2023,20(3):2341-2347. [38]AZEES M,VIJAYAKUMAR P,JEGATHA DEBORAH L.Comprehensive survey on security services in vehicular ad-hoc networks[J].IET Intelligent Transport Systems,2016,10(6):379-388. [39]BARUAH B,DHAL S.A security and privacy preserved intelligent vehicle navigation system[J].IEEE Transactions on Dependable and Secure Computing,2023,20(2):944-959. [40]DWORK C,LEI J.Differential privacy and robust statistics[C]//Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing.ACM,2009:371-380. [41]XU Q,ZHAO L,SU Z,et al.Secure federated learning in quantum autonomous vehicular networks[J].IEEE Network,2023,37(6):240-247. [42]WANG Z,LI Y,LI D,et al.Enabling fairness-aware and privacy-preserving for quality evaluation in vehicular crowdsensing:a decentralized approach[J].Security and Communication Networks,2021,2021. [43]SALEEM M A,LI X,AYUB M F,et al.An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(9):9940-9951. [44]YING Z,CAO S,LIU X,et al.PrivacySignal:Privacy-Preserving Traffic Signal Control for Intelligent Transportation System[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(9):16290-16303. [45]FANG K,WANG T,TONG L,et al.Non-intrusive security as-sessment methods for future autonomous transportation IoV[J].IEEE Transactions on Automation Science and Enginee-ring,2023,21(3):2387-2399. [46]QU Z,TANG Y,MUHAMMAD G,et al.Privacy protection in intelligent vehicle networking:A novel federated learning algorithm based on information fusion[J].Information Fusion,2023,98:101824. [47]XU C,DING Y,CHEN C,et al.Personalized location privacyprotection for location-based services in vehicular networks[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(1):1163-1177. [48]BI R,XIONG J,TIAN Y,et al.Edge-cooperative privacy-preserving object detection over random point cloud shares for connected autonomous vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(12):24979-24990. [49]ERLINGSSON Ú,FELDMAN V,MIRONOV I,et al.Amplification by Shuffling:From Local to Central Differential Privacy via Anonymity[J].arXiv:1811.12469,2018. [50]LIN G,QIN S,KHATTAK Z H.FedAV:federated learning for cyberattack vulnerability and resilience of cooperative driving automation[J].Communications in Transportation Research,2025,5:100175. [51]ZHANG C,ZHANG X M,SOTTIWAT E,et al.Generative gradient inversion via over-parameterized networks in federated learning[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2023:5126-5135. [52]LI Y,SHI J,MENG D,et al.FuzzyCom:privacy-aware trajectory data compression using fuzzy sets in edge vehicular networks[C]//2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems(MASS).IEEE,2022:613-619. [53]CHEN T,TIAN X,LI Y,et al.FuzzyFollow:A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets[C]//2024 27th International Conference on Computer Supported Cooperative Work in Design(CSCWD).2024:2484-2490. [54]LI Y,LIU F,ZHANG J,et al.Privacy-aware fuzzy skyline par-king recommendation using edge traffic facilities[J].IEEE Transactions on Vehicular Technology,2021,70(10):9775-9786. [55]CHEN T,JIANG Q,LI Y,et al.Privacy-aware edge intelligentparking recommendation using intuitionistic fuzzy sets[J].IEEE Transactions on Industrial Informatics,2025,21(5):3606-3615. [56]LIU B,XIE S,WANG H,et al.VTDP:privately sanitizing fine-grained vehicle trajectory data with boosted utility[J].IEEE Transactions on Dependable and Secure Computing,2021,18(6):2643-2657. [57]CHEN X,ZHANG T,SHEN S,et al.An optimized differential privacy scheme with reinforcement learning in VANET[J].Computers & Security,2021,110:102446. [58]CAI S,LYU X,LI X,et al.A trajectory released scheme for the internet of vehicles based on differential privacy[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(9):16534-16547. [59]WEI J,LIN Y,YAO X,et al.Differential privacy-based location protection in spatial crowdsourcing[J].IEEE Transactions on Services Computing,2022,15(1):45-58. [60]LIU M,CHENG L,GU Y,et al.MPC-CSAS:multi-party computation for real-time privacy-preserving speed advisory systems[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(6):5887-5893. [61]LIU D,YU G,DING Y,et al.Privacy preserving multi-partycomputation with secret sharing for trajectory prediction in VANETs[J].IEEE Transactions on Vehicular Technology,2024,73(12):18666-18677. [62]PENG T,ZHONG W,WANG G,et al.Privacy-preserving truth discovery based on secure multi-party computation in vehicle-based mobile crowdsensing[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(7):7767-7779. [63]WANG H,FAN K,ZHANG K,et al.Encrypted data retrieval and sharing scheme in space-air-ground-integrated vehicular networks[J].IEEE Internet of Things Journal,2022,9(8):5957-5970. [64]CHENG H,SHOJAFAR M,ALAZAB M,et al.PPVF:privacy-preserving protocol for vehicle feedback in cloud-assisted VANET[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(7):9391-9403. [65]JIANG W,GUO Z.An Anonymous Authentication Scheme forInternet of Vehicles Based on TRUG-PBFT Master-Slave Chains and Zero-Knowledge Proof[J].IEEE Internet of Things Journal,2024,12(7):7763-7777. [66]GUO Y,WANG Z,CUI H,et al.Vehicloak:A Blockchain-Ena-bled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services[J].IEEE Transactions on Mobile Computing,2023,22(11):6830-6842. [67]BATOOL H,ANJUM A,KHAN A,et al.A secure and privacy preserved infrastructure for VANETs based on federated lear-ning with local differential privacy[J].Information Sciences,2024,652:119717. [68]ZHAO L,WAN Q,ZOU Q,et al.Privacy-preserving collaborative deep learning with unreliable participants[J].IEEE Transactions on Information Forensics and Security,2020,15:1486-1500. [69]LI J H,WU Q M.Research on Internet of Vehicles data coope-rative learning and communication optimization based on tripartite federated learning[J].Modern Electronics Technique,2024,47(15):26-33. [70]KONG Q,YIN F,LU R,et al.Privacy-preserving aggregationfor federated learning-based navigation in vehicular fog[J].IEEE Transactions on Industrial Informatics,2021,17(12):8453-8463. [71]LI B,JIANG Y,PEI Q,et al.FEEL:Federated end-to-end lear-ning with non-IID data for vehicular ad hoc networks[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(9):16728-16740. [72]LI Y,LI H,XU G,et al.Efficient privacy-preserving federated learning with unreliable users[J].IEEE Internet of Things Journal,2022,9(13):11590-11603. [73]HUANG H,SUN C,LEI X,et al.Privacy-preserving travel time prediction for internet of vehicles:A crowdsensing and federated learning approach[C]//Neural Information Processing.Singapore:Springer,2024:55-66. [74]ZHAO L,JIANG J,FENG B,et al.SEAR:secure and efficient aggregation for byzantine-robust federated learning[J].IEEE Transactions on Dependable and Secure Computing,2022,19(5):3329-3342. [75]XU Z,ZHANG R,LIANG W,et al.A privacy-preserving data aggregation protocol for internet of vehicles with federated learning[J].IEEE Transactions on Intelligent Vehicles,2025,10(1):217-227. [76]ZHANG D,FAN L.Cerberus:Privacy-Preserving Computation in Edge Computing[C]//IEEE INFOCOM 2020-IEEE Confe-rence on Computer Communications Workshops(INFOCOM WKSHPS).2020:43-49. [77]CHEN X,DING J,LU Z.A decentralized trust managementsystem for intelligent transportation environments[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(1):558-571. [78]ZADEH L A.Fuzzy sets[J].Information and Control,1965,8(3):338-353. [79]KAMRA N,ZHU H,TRIVEDI D K,et al.Multi-agent trajectory prediction with fuzzy query attention[C]//Advances in Neural Information Processing Systems.Curran Associates Inc.,2020:22530-22541. [80]ISMAEL S F,ALIAS A H,ZAIDAN A A,et al.Toward Sustainable Transportation:A Pavement Strategy Selection Based on the Extension of Dual-Hesitant Fuzzy Multicriteria Decision-Making Methods[J].IEEE Transactions on Fuzzy Systems,2023,31(2):380-393. [81]MIAO T,SHEN J,LAI C F,et al.Fuzzy-based trustworthiness evaluation scheme for privilege management in vehicular ad hoc networks[J].IEEE Transactions on Fuzzy Systems,2021,29(1):137-147. [82]LI Y,LIU W,ZHU Y,et al.Privacy-aware fuzzy range queryprocessing over distributed edge devices[J].IEEE Transactions on Fuzzy Systems,2022,30(5):1421-1435. [83]LIU L,LIAN M,LU C,et al.TCSA:a traffic congestion situation assessment scheme based on multi-index fuzzy comprehensive evaluation in 5G-IoV[J].Electronics,2022,11(7):1032. [84]DIAKOULAKI D,MAVROTAS G,PAPAYANNAKIS L.Determining objective weights in multiple criteria problems:The critic method[J].Computers & Operations Research,1995,22(7):763-770. [85]LI Y,YANG S,REN X,et al.Multi-Stage Asynchronous Fede-rated Learning With Adaptive Differential Privacy[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2024,46(2):1243-1256. [86]LI Y,TAO X,ZHANG X,et al.Break the Data Barriers While Keeping Privacy:A Graph Differential Privacy Method[J].IEEE Internet of Things Journal,2023,10(5):3840-3850. [87]WANG X,KIM B G,AMOON M,et al.Federated learning with local differential privacy for autonomous electronic vehicles:enhancing security and performance[J].IEEE Transactions on Consumer Electronics,2025,71(2):6147-6157. [88]AN D,YANG Q,LI D,et al.Where Am I Parking:Incentive Online Parking-Space Sharing Mechanism With Privacy Protection[J].IEEE Transactions on Automation Science and Engineering,2022,19(1):143-162. [89]AN D,YANG Q,YU W,et al.LoPrO:Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging[J].Future Generation Computer Systems,2020,107:394-407. [90]ANDRES M E,BORDENABE N E,CHATZIKOKOLAKIS K,et al.Geo-indistinguishability:Differential privacy for location-based systems[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security.New York:ACM,2013:901-914. [91]HAN W L,SONG L S,RUAN W Q,et al.Secure Multi-Party Learning:From Secure Computing to Secure Learning[J].Chinese Journal of Computers,2023,46(7). [92]YANG H,VIJAYAKUMAR P,SHEN J,et al.A location-based privacy-preserving oblivious sharing scheme for indoor navigation[J].Future Generation Computer Systems,2022,137:42-52. [93]BI R,XIONG J,TIAN Y,et al.Achieving lightweight and privacy-preserving object detection for connected autonomous vehicles[J].IEEE Internet of Things Journal,2023,10(3):2314-2329. [94]MOHANTY T,SRIVASTAVA V,DEBNATH S K,et al.Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application[J].IEEE Internet of Things Journal,2024,11(1):1761-1772. [95]SUTRADHAR K.A Quantum Cryptographic Protocol for Se-cure Vehicular Communication[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(5):3513-3522. [96]HAN X,TIAN D,ZHOU J,et al.Privacy-preserving proxy re-encryption with decentralized trust management for MEC-empowered VANETs[J].IEEE Transactions on Intelligent Vehicles,2023,8(8):4105-4119. [97]LI L,LIU J,CHENG L,et al.CreditCoin:A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles[J].IEEE Transactions on Intelligent Transportation Systems,2018,19(7):2204-2220. [98]LI T,XIE S,ZENG Z,et al.ATPS:An AI Based Trust-Aware and Privacy-Preserving System for Vehicle Managements in Sustainable VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(10):19837-19851. [99]JIANG S,LI J,SANG G,et al.Vehicular edge computing meets cache:An access control scheme with fair incentives for privacy-aware content delivery[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(8):8404-8418. [100]MCMAHAN H B,MOORE E,RAMAGE D,et al.Communication-efficient learning of deep networks from decentralized data[J].arXiv:1602.05629,2016. [101]GU Y H,BAI Y B.Research Progress on Security and Privacy of Federated Learning Model[J].Journal of Software,2022,34(6):2833-2864. [102]GEIPING J,BANUERMEISTER H,DROGE H,et al.Inverting gradients-how easy is it to break privacy in federated learning?[C]//Proceedings of the 34th International Conference on Neural Information Processing Systems.Red Hook,NY:Curran Associates Inc.,2020:16937-16947. [103]JIANG S,LI J,SANG G,et al.Vehicular edge computing meets cache:An access control scheme with fair incentives for privacy-aware content delivery[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(8):8404-8418. [104]LI Y,TAO X,ZHANG X,et al.Privacy-preserved federatedlearning for autonomous driving[J].IEEE Transactions on Intelligent Transportation Systems,2022,23(7):8423-8434. [105]ZHAO J,CHANG X,FENG Y,et al.Participant selection forfederated learning with heterogeneous data in intelligent transport system[J].IEEE Transactions on Intelligent Transportation Systems,2023,24(1):1106-1115. [106]WU W,HE L,LIN W,et al.SAFA:a semi-asynchronous protocol for fast federated learning with low overhead[J].IEEE Transactions on Computers,2021,70(5):655-668. [107]WU Y H,BAI G W,SHEN H.Multi-Dimensional Resource Dynamic Allocation Algorithm Based on Federated Learning in Vehicular Networks[J].Computer Science,2022,49(12):59-65. [108]MO Z J,GAO Z P,YANG Y,et al.An Efficient DistributedModel Sharing Strategy for Data Privacy Protection in Vehicular Networks[J].Journal of China Institute of Communications,2022,43(4):83-94. [109]WANG L L,WU S L,YANG N,et al.Research on Double-Layer Asynchronous Federated Learning of Vehicle Network Based on Two-Factor Update[J].Journal of Electronics and Informatics,2022,46(7):1-8. [110]JIANG X,BORCEA C.Complement sparsification:low-overhead model pruning for federated learning[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2023:8087-8095. [111]SHANG E,LIU H,YANG Z,et al.FedBiKD:federated bidirectional knowledge distillation for distracted driving detection[J].IEEE Internet of Things Journal,2023,10(13):11643-11654. [112]ZHAO C,GAO Z,WANG Q,et al.FedSup:a communication-efficient federated learning fatigue driving behaviors supervision approach[J].Future Generation Computer Systems,2023,138:52-60. [113]ZHANG J,ZHANG J,MA Z,et al.RUPT-FL:robust two-layered privacy-preserving federated learning framework with unlinkability for IoV[J].IEEE Transactions on Vehicular Technology,2025(4):74. [114]YU D,ZHANG H,CHEN W,et al.Gradient perturbation is underrated for differentially private convex optimization[C]//Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence.2021:3117-3123. [115]CAO S X,CHEN C M,TANG P,et al.Differential Privacy Fe-derated Learning Algorithm Based on Function Mechanism[J].Chinese Journal of Computers,2023,46(10):2178-2195. [116]LI J,WEI K,MA C,et al.DP-GenFL:A local differentially private federated learning system through generative data[J].Science China Information Sciences,2023,66(8):189303:1-189303:2. [117]ZHANG S,YUAN W,YIN H.Comprehensive privacy analysis on federated recommender system against attribute inference attacks[J].IEEE Transactions on Knowledge and Data Enginee-ring,2024,36(3):13. [118]LIU D,PEI X K,LAI J S,et al.Privacy Protection Scheme Combining Edge Intelligent Computing and Federated Learning[J].Journal of the University of Electronic Science and Technology of China,2023,52(1):95-101. [119]HUI Y,HU J,CHENG N,et al.RCFL:Redundancy-AwareCollaborative Federated Learning in Vehicular Networks[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(6):5539-5553. [120]GUO H,HUANG W,LIU J,et al.Inter-Server Collaborative Federated Learning for Ultra-Dense Edge Computing[J].IEEE Transactions on Wireless Communications,2022,21(7):5191-5203. [121]LI Z,WU H,LU Y.Coalition based utility and efficiency optimization for multi-task federated learning in internet of vehicles[J].Future Generation Computer Systems,2023,140:196-208. [122]JAI VINITA L,VETRISELVI V.Federated Learning-basedMisbehaviour detection on an emergency message dissemination scenario for the 6G-enabled Internet of Vehicles[J].Ad Hoc Networks,2023,144:103153. [123]ZHANG X,CHANG Z,HU T,et al.Vehicle Selection and Resource Allocation for Federated Learning-Assisted Vehicular Network[J].IEEE Transactions on Mobile Computing,2024,23(5):3817-3829. [124]TOLPEGIN V,TRUEX S,GURSOY M E,et al.Data poisoning attacks against federated learning systems[C]//Computer Security-ESORICS 2020.Cham:Springer,2020:480-501. [125]KUMAR S P,GOPE P,PUTHAL D.Blockchain and federated learning-enabled distributed secure and privacy-preserving computing architecture for IoT network[C]//2022 IEEE European Symposium on Security and Privacy Workshops(EuroS & PW).IEEE,2022. [126]WANG Y,LI G L,LI K Y.A Review of Federal Learning Contribution Assessment[J].Journal of Software,2023,34(3):1168-1192. [127]ZHAO Z,XIANG T,BI Y,et al.A Novel Multi-Criteria Contribution Evaluation Scheme for Federated Learning in Internet of Vehicles[C]//2023 15th International Conference on Communication Software and Networks(ICCSN).IEEE,2023:319-325. [128]LI C,SONG M,LUO Y.Federated learning based on stackel-berg game in unmanned-aerial-vehicle-enabled mobile edge computing.[J].Expert Systems With Applications,2024,235:121023. [129]WU Q,ZHAO Y,FAN Q,et al.Mobility-aware cooperative ca-ching in vehicular edge computing based on asynchronous fede-rated and deep reinforcement learning[J].IEEE Journal of Selec-ted Topics in Signal Processing,2023,17(1):66-81. [130]OUALIL S,OUCHEIKH R,EL KAMILI M,et al.A personali-zed learning scheme for internet of vehicles caching[C]//2021 IEEE Global Communications Conference(GLOBECOM).2021:1-6. [131]LI Y,ZENG D,GU L,et al.PASTO:enabling secure and efficient task offloading in TrustZone-enabled edge clouds[J].IEEE Transactions on Vehicular Technology,2023,72(6):8234-8238. [132]CHEN G,ZHANG Y.Securing TEEs with verifiable execution contracts[J].IEEE Transactions on Dependable and Secure Computing,2023,20(4):3222-3237. [133]MIAO X,CHANG R,ZHAO J,et al.CVTEE:A compatibleverified TEE architecture with enhanced security.[J].IEEE Transactions on Dependable and Secure Computing,2023,20(1):377-391. [134]ULLAH I,KHALIL I,BAI X,et al.An ensemble-based hybrid model for the detection of attacks in the internet of vehicular things[J].IEEE Transactions on Intelligent Transportation Systems(Early Access),2025:1-14. [135]CHEN X,SONG X,REN R,et al.Fine-grained privacy detection with graph-regularized hierarchical attentive representation learning[J].ACM Transactions on Information Systems,2020,38(4):1-26. [136]AMARAL O,ABUALHAIJA S,TORRE D,et al.AI-enabled automation for completeness checking of privacy policies[J].IEEE Transactions on Software Engineering,2022,48(11):4647-4674. [137]CHEN C,ZHOU D,YE Y,et al.CLEAR:towards contextual LLM-empowered privacy policy analysis and risk generation for large language model applications[C]//Proceedings of the 30th International Conference on Intelligent User Interfaces.New York:ACM,2025:277-297. [138]CAO X,YU J,HAN J,et al.A transformer decoder-based ge-nerative adversarial model with TrajLoss function for privacy-preserving trajectory publishing[C]//Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing(MLNLP 2022).2022:271-278. [139]HU Y,WU F,LI Q,et al.SoK:Privacy-Preserving Data Synthesis[C]//2024 IEEE Symposium on Security and Privacy(SP).2024:4696-4713. [140]SHANG F J,DENG X X.Blockchain-based privacy-preservinginternet of vehicles data sharing scheme[J].Journal of Chongqing University of Posts and Telecommunications( Natural Science Edition),2025,37(2):155-164. [141]ZHOU J,CHEN S,CHOO K K R,et al.EPNS:Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs[J].IEEE Transactions on Mobile Computing,2023,22(3):1491-1506. [142]CAI Z,XIONG A.Understand users’ privacy perception and decision of V2X communication in connected autonomous vehicles[C]//32nd USENIX Security Symposium,USENIX Security 2023.2023:2975-2992. |
| [1] | WU Jiagao, YI Jing, ZHOU Zehui, LIU Linfeng. Personalized Federated Learning Framework for Long-tailed Heterogeneous Data [J]. Computer Science, 2025, 52(9): 232-240. |
| [2] | LUO Yanjie, LI Lin, WU Xiaohua, LIU Jia. Happiness Prediction Approach via Adaptive Privacy Budget Allocation [J]. Computer Science, 2025, 52(7): 372-378. |
| [3] | WANG Chundong, ZHANG Qinghua, FU Haoran. Federated Learning Privacy Protection Method Combining Dataset Distillation [J]. Computer Science, 2025, 52(6A): 240500132-7. |
| [4] | JIANG Yufei, TIAN Yulong, ZHAO Yanchao. Persistent Backdoor Attack for Federated Learning Based on Trigger Differential Optimization [J]. Computer Science, 2025, 52(4): 343-351. |
| [5] | LUO Zhengquan, WANG Yunlong, WANG Zilei, SUN Zhenan, ZHANG Kunbo. Study on Active Privacy Protection Method in Metaverse Gaze Communication Based on SplitFederated Learning [J]. Computer Science, 2025, 52(3): 95-103. |
| [6] | HU Kangqi, MA Wubin, DAI Chaofan, WU Yahui, ZHOU Haohao. Federated Learning Evolutionary Multi-objective Optimization Algorithm Based on Improved NSGA-III [J]. Computer Science, 2025, 52(3): 152-160. |
| [7] | WANG Ruicong, BIAN Naizheng, WU Yingjun. FedRCD:A Clustering Federated Learning Algorithm Based on Distribution Extraction andCommunity Detection [J]. Computer Science, 2025, 52(3): 188-196. |
| [8] | WANG Dongzhi, LIU Yan, GUO Bin, YU Zhiwen. Edge-side Federated Continuous Learning Method Based on Brain-like Spiking Neural Networks [J]. Computer Science, 2025, 52(3): 326-337. |
| [9] | XIE Jiachen, LIU Bo, LIN Weiwei , ZHENG Jianwen. Survey of Federated Incremental Learning [J]. Computer Science, 2025, 52(3): 377-384. |
| [10] | ZHENG Jianwen, LIU Bo, LIN Weiwei, XIE Jiachen. Survey of Communication Efficiency for Federated Learning [J]. Computer Science, 2025, 52(2): 1-7. |
| [11] | WANG Xin, CHEN Kun, SUN Lingyun. Research on Foundation Model Methods for Addressing Non-IID Issues in Federated Learning [J]. Computer Science, 2025, 52(12): 302-313. |
| [12] | PENG Jiao, CHANG Yongjuan, YAN Tao, YOU Zhangzheng, SONG Meina, ZHU Yifan, ZHANG Pengfei, HE Yue, ZHANG Bo, OU Zhonghong. Decentralized Federated Learning Algorithm Sensitive to Delay [J]. Computer Science, 2025, 52(12): 314-320. |
| [13] | SU Xinzhong, XU Youyun. Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation [J]. Computer Science, 2025, 52(12): 331-338. |
| [14] | ZHAO Tong, CHEN Xuebin, WANG Liu, JING Zhongrui, ZHONG Qi. Backdoor Attack Method for Federated Learning Based on Knowledge Distillation [J]. Computer Science, 2025, 52(11): 434-443. |
| [15] | DUN Jingbo, LI Zhuo. Survey on Transmission Optimization Technologies for Federated Large Language Model Training [J]. Computer Science, 2025, 52(1): 42-55. |
|
||