{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T03:10:03Z","timestamp":1746846603940,"version":"3.40.5"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100012542","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2022J021"],"award-info":[{"award-number":["ZYGX2022J021"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Provincial Science and Technology Support Program","doi-asserted-by":"publisher","award":["2024ZHCG0010"],"award-info":[{"award-number":["2024ZHCG0010"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2514050002560"],"award-info":[{"award-number":["2514050002560"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01952-7","type":"journal-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T02:23:38Z","timestamp":1745375018000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An enhancing privacy training architecture for federal vehicle networking"],"prefix":"10.1007","volume":"18","author":[{"given":"Yuzhou","family":"Dai","sequence":"first","affiliation":[]},{"given":"Qian","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hailing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiliang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Guangxin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"issue":"12","key":"1952_CR1","doi-asserted-by":"publisher","first-page":"10340","DOI":"10.1109\/JIOT.2021.3122115","volume":"9","author":"H Wu","year":"2022","unstructured":"Wu H, Gao Q, Tao X, Zhang N, Chen D, Han Z (2022) Differential game approach for attack-defense strategy analysis in internet of things networks. IEEE Internet Things J 9(12):10340\u201310353","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1952_CR2","doi-asserted-by":"publisher","first-page":"450","DOI":"10.3390\/vehicles6010020","volume":"6","author":"MMA Muslam","year":"2024","unstructured":"Muslam MMA (2024) Enhancing security in vehicle-to-vehicle communication: A comprehensive review of protocols and techniques. Veh 6(1):450\u2013467","journal-title":"Veh"},{"issue":"5","key":"1952_CR3","doi-asserted-by":"publisher","first-page":"4510","DOI":"10.1109\/TDSC.2024.3353827","volume":"21","author":"D Chen","year":"2024","unstructured":"Chen D, Liao Z, Chen R, Wang H, Yu C, Zhang K, Shen X (2024) Privacy-preserving anomaly detection of encrypted smart contract for blockchain-based data trading. IEEE Trans Dependable Secure Comput 21(5):4510\u20134525","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"7","key":"1952_CR4","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1038\/s44287-024-00053-6","volume":"1","author":"L Ale","year":"2024","unstructured":"Ale L, Zhang N, King SA, Chen D (2024) Empowering generative ai through mobile edge computing. Nat Rev Electr Eng 1(7):478\u2013486","journal-title":"Nat Rev Electr Eng"},{"issue":"2","key":"1952_CR5","doi-asserted-by":"publisher","first-page":"368","DOI":"10.3390\/s24020368","volume":"24","author":"E Alalwany","year":"2024","unstructured":"Alalwany E, Mahgoub I (2024) Security and trust management in the internet of vehicles (iov): Challenges and machine learning solutions. Sens 24(2):368\u2013404","journal-title":"Sens"},{"issue":"1","key":"1952_CR6","first-page":"1","volume":"2512","author":"S Jabeen","year":"2024","unstructured":"Jabeen S, Potturu SR (2024) Survey on security and privacy of connected vehicles and cloud platforms for communication. AIP Conf Proc 2512(1):1\u20137","journal-title":"AIP Conf Proc"},{"key":"1952_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119847656.ch1","volume-title":"Artificial intelligence in autonomous vehicles\u2014a survey of trends and challenges","author":"U Rajasekaran","year":"2024","unstructured":"Rajasekaran U, Malini A, Murugan M (2024) Artificial intelligence in autonomous vehicles\u2014a survey of trends and challenges. Scrivener Publishing, Beverly, MA, USA"},{"issue":"2","key":"1952_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/IOTM.001.2200225","volume":"7","author":"S Aoki","year":"2024","unstructured":"Aoki S (2024) Privacy, security, and reliability for urban ambient sensing with sensor-rich autonomous vehicles. IEEE Internet Things Mag 7(2):114\u201311","journal-title":"IEEE Internet Things Mag"},{"unstructured":"Wu R, Chen Y, Dou H, Zhang Y, Long Z (2023) Privacy protection algorithm for federated learning against attacks. Comput Eng","key":"1952_CR9"},{"issue":"1","key":"1952_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01840-6","volume":"18","author":"T Zheng","year":"2025","unstructured":"Zheng T, Li X, Chen X, Ren H, Shen C (2025) Efficient privacy-preserving federated logistic regression with poor-quality users. Peer-to-Peer Netw Appl 18(1):1\u201312","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1952_CR11","first-page":"310","volume":"7","author":"M Chen","year":"2022","unstructured":"Chen M, Zhang J, Li T (2022) A review of federated learning security and defense. Comput Sci 7:310\u2013323","journal-title":"Comput Sci"},{"issue":"1","key":"1952_CR12","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/s12083-023-01584-9","volume":"17","author":"Y Liu","year":"2024","unstructured":"Liu Y, Li H, Hao M (2024) Svfgnn: A privacy-preserving vertical federated graph neural network model training framework based on split learning. Peer-to-Peer Netw Appl 17(1):246\u2013260","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"1952_CR13","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TCC.2024.3430237","volume":"12","author":"D Chen","year":"2024","unstructured":"Chen D, Liao Z, Xie Z, Chen R, Qin Z, Cao M, Dai HN, Zhang K (2024) Mfsse: Multi-keyword fuzzy ranked symmetric searchable encryption with pattern hidden in mobile cloud computing. IEEE Trans Cloud Comput 12(4):1042\u20131057","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"1952_CR14","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.1007\/s12083-024-01683-1","volume":"17","author":"I Seth","year":"2024","unstructured":"Seth I, Guleria K, Panda SN (2024) A comprehensive review on vehicular ad-hoc networks routing protocols for urban and highway scenarios, research gaps and future enhancements. Peer-to-Peer Netw Appl 17(4):2090\u20132122","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"1952_CR15","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s12083-023-01616-4","volume":"17","author":"J Hao","year":"2024","unstructured":"Hao J, Zhang L, Zhao Y (2024) Grouped federated learning for time-sensitive tasks in industrial iots. Peer-to-Peer Netw Appl 17(2):819\u2013833","journal-title":"Peer-to-Peer Netw Appl"},{"doi-asserted-by":"crossref","unstructured":"Long Z, Chen Y, Dou H, Zhang Y (2024) Fedsq: Sparse-quantized federated learning for communication efficiency. IEEE Tran Serv Comput 1\u201316","key":"1952_CR16","DOI":"10.1109\/TCE.2024.3352432"},{"key":"1952_CR17","first-page":"203","volume":"1","author":"P Zhuang","year":"2024","unstructured":"Zhuang P, Han Z, Nie J, Li Z, Lin S (2024) Bilateral selection federated learning algorithm for vehicles and parameter servers. Radio Commun Technol 1:203\u2013212","journal-title":"Radio Commun Technol"},{"key":"1952_CR18","first-page":"10","volume":"12","author":"J Liu","year":"2023","unstructured":"Liu J, Wang X, Liang M, Wang J (2023) Hierarchical federated learning framework based on shared dataset and gradient compensation. Inf Netw Secur 12:10\u201320","journal-title":"Inf Netw Secur"},{"issue":"2","key":"1952_CR19","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.eng.2023.04.015","volume":"33","author":"X Yuan","year":"2024","unstructured":"Yuan X, Chen J, Zhang N, Ye QJ, Li C, Zhu C, Shen XS (2024) Low-cost federated broad learning for privacy-preserved knowledge sharing in the ris-aided internet of vehicles. Eng 33(2):178\u2013189","journal-title":"Eng"},{"key":"1952_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sysarc.2025.103364","volume":"161","author":"R Wang","year":"2025","unstructured":"Wang R, Xiong L, Geng J, Xie C, Li R (2025) An effective and verifiable secure aggregation scheme with privacy-preserving for federated learning. J Syst Archit 161:1\u201313","journal-title":"J Syst Archit"},{"doi-asserted-by":"crossref","unstructured":"Sun H, Zhang Y, Zhuang H, Li J, Xu Z, Wu L (2025) Pear: Privacy-preserving and effective aggregation for byzantine-robust federated learning in real-world scenarios. Comput J 1\u201318","key":"1952_CR21","DOI":"10.1093\/comjnl\/bxae086"},{"unstructured":"Wang L, Polato M, Brighente A, Conti M, Zhang L, Xu L (2024) Priverifl: Privacy-preserving and aggregation-verifiable federated learning. IEEE Tran Serv Comput 1\u201316","key":"1952_CR22"},{"issue":"9","key":"1952_CR23","doi-asserted-by":"publisher","first-page":"5880","DOI":"10.1002\/int.22818","volume":"37","author":"J Ma","year":"2022","unstructured":"Ma J, Naas SA, Sigg S, Lyu X (2022) Privacy-preserving federated learning based on multi-key homomorphic encryption. Int J Intell Syst 37(9):5880\u20135901","journal-title":"Int J Intell Syst"},{"doi-asserted-by":"crossref","unstructured":"Xu Z, Zhang R, Liang W, Li KC, Gu K, Li X, Huang J (2024) A privacy-preserving data aggregation protocol for internet of vehicles with federated learning. IEEE Trans Intell Veh 1\u201311","key":"1952_CR24","DOI":"10.1109\/TIV.2024.3411313"},{"unstructured":"Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: A client level perspective. arXiv preprint. 1\u201310","key":"1952_CR25"},{"key":"1952_CR26","volume-title":"Principles of mathematical analysis","author":"W Rudin","year":"1976","unstructured":"Rudin W (1976) Principles of mathematical analysis. McGraw-Hill, New York, USA"},{"issue":"11","key":"1952_CR27","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.14778\/2350229.2350253","volume":"5","author":"J Zhang","year":"2012","unstructured":"Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: Regression analysis under differential privacy. Proceedings of the VLDB Endowment 5(11):1364\u20131375","journal-title":"Proceedings of the VLDB Endowment"},{"unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y\u00a0Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. Proceedings of the 20th international conference on artificial intelligence and statistics (AISTATS), vol 54. pp 1273\u20131282","key":"1952_CR28"},{"key":"1952_CR29","doi-asserted-by":"publisher","first-page":"3107","DOI":"10.1109\/TIFS.2022.3201386","volume":"17","author":"D Chen","year":"2022","unstructured":"Chen D, Jiang S, Zhang N, Liu L, Choo KKR (2022) On message authentication channel capacity over a wiretap channel. IEEE Trans Inf Forensic Secur 17:3107\u20133122","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"2","key":"1952_CR30","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s12083-022-01427-z","volume":"16","author":"C Lin","year":"2023","unstructured":"Lin C, Li Y, Ahmed M, Song C (2023) Piece-wise pricing optimization with computation resource constraints for parked vehicle edge computing. Peer-to-Peer Netw Appl 16(2):709\u2013726","journal-title":"Peer-to-Peer Netw Appl"},{"unstructured":"McMahan HB, Moore E, Ramage D, y\u00a0Arcas BA (2016) Federated learning of deep networks using model averaging. arXiv preprint. 1\u20136, 2016","key":"1952_CR31"},{"key":"1952_CR32","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei K, Li J, Ding M et al (2020) Federated learning with differential privacy: Algorithms and performance analysis. IEEE Trans Inf Forensic Secur 15:3454\u20133469","journal-title":"IEEE Trans Inf Forensic Secur"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01952-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01952-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01952-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:33:13Z","timestamp":1746844393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01952-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,23]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1952"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01952-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,4,23]]},"assertion":[{"value":"23 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"We agree to publication in the journal Peer-to-Peer Networking and Applications.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish:"}}],"article-number":"156"}}