{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:35:37Z","timestamp":1762432537422,"version":"3.44.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02053-1","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:25:16Z","timestamp":1751603116000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy preserving hierarchical federated learning approach for secure urban mobility prediction"],"prefix":"10.1007","volume":"18","author":[{"given":"Vankamamidi S.","family":"Naresh","sequence":"first","affiliation":[]},{"given":"D.","family":"Ayaaappa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,4]]},"reference":[{"key":"2053_CR1","doi-asserted-by":"crossref","unstructured":"Hao, G., Meese, C., Li, W., Shen, C.-C., Mark, M., &Nejad, (2023). B^2SFL: A Bi-level Block chained Architecture for Secure Federated Learning-based Traffic Prediction. IEEE Transactions on Services Computing. doi: 10.1109\/tsc.2023.3318990.","DOI":"10.1109\/TSC.2023.3318990"},{"key":"2053_CR2","doi-asserted-by":"crossref","unstructured":"Liu, L., Tian, Y., Chakraborty, C., Feng, J., Pei, Q., Zhen, L., & Yu, K. (2023). Multilevel federated learning-based intelligent traffic flow forecasting for transportation network management. IEEE Transactions on Network and Service Management, 20(2), 1446\u20131458.","DOI":"10.1109\/TNSM.2023.3280515"},{"key":"2053_CR3","doi-asserted-by":"crossref","unstructured":"Liu, T., Li, P., Gu, Y., & Su, Z. (2022). S-Glint: Secure federated graph learning with traffic throttling and flow scheduling. IEEE Transactions on Green Communications and Networking, 7(2), 894\u2013903.","DOI":"10.1109\/TGCN.2022.3187149"},{"key":"2053_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Y., James, J. Q., Kang, J., Niyato, D., & Zhang, S. (2020). Privacy-preserving traffic flow prediction: A federated learning approach. IEEE Internet of Things Journal, 7(8), 7751\u20137763.","DOI":"10.1109\/JIOT.2020.2991401"},{"key":"2053_CR5","doi-asserted-by":"crossref","unstructured":"Cai, Y., Ding, W., Xiao, Y., Yan, Z., Liu, X., & Wan, Z. (2023). SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption. IEEE Transactions on Dependable and Secure Computing.","DOI":"10.1109\/TDSC.2023.3336977"},{"key":"2053_CR6","doi-asserted-by":"crossref","unstructured":"Han, J., & Yan, L. (2023). Adaptive Batch Homomorphic Encryption for Joint Federated Learning in Cross-Device Scenarios. IEEE Internet of Things Journal.","DOI":"10.1109\/JIOT.2023.3323358"},{"key":"2053_CR7","doi-asserted-by":"crossref","unstructured":"Ren, Y., Li, Y., Feng, G., & Zhang, X. (2022). Privacy-enhanced and verification-traceable aggregation for federated learning. IEEE Internet of Things Journal, 9(24), 24933\u201324948.","DOI":"10.1109\/JIOT.2022.3194930"},{"key":"2053_CR8","doi-asserted-by":"crossref","unstructured":"Hu, N., Liang, W., Zhang, D., Xie, K., Li, K., &Zomaya, A. Y. (2024). FedGCN: A Federated Graph Convolutional Network for Privacy-Preserving Traffic Prediction. IEEE Transactions on Sustainable Computing.","DOI":"10.1109\/TSUSC.2024.3395350"},{"key":"2053_CR9","doi-asserted-by":"crossref","unstructured":"Xie, Q., Jiang, S., Jiang, L., Huang, Y., Zhao, Z., Khan, S.,\u2026 & Wu, K. (2024). Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey. IEEE Internet of Things Journal, 11(14), 24569\u201324580.","DOI":"10.1109\/JIOT.2024.3382875"},{"key":"2053_CR10","doi-asserted-by":"crossref","unstructured":"Kim, D., & Guyot, C. (2023). Optimized privacy-preserving cnn inference with fully homomorphic encryption. IEEE Transactions on Information Forensics and Security, 18, 2175\u20132187.","DOI":"10.1109\/TIFS.2023.3263631"},{"key":"2053_CR11","doi-asserted-by":"crossref","unstructured":"Parekh, R., Patel, N., Gupta, R., Jadav, N. K., Tanwar, S., Alharbi, A.,\u2026 &Raboaca, M. S. (2023). Gefl: Gradient encryption-aided privacy preserved federated learning for autonomous vehicles. IEEE Access, 11, 1825\u20131839.","DOI":"10.1109\/ACCESS.2023.3233983"},{"key":"2053_CR12","doi-asserted-by":"crossref","unstructured":"Kong, Q., Yin, F., Lu, R., Li, B., Wang, X., Cui, S., & Zhang, P. (2021). Privacy-preserving aggregation for federated learning-based navigation in vehicular fog. IEEE Transactions on Industrial Informatics, 17(12), 8453\u20138463.","DOI":"10.1109\/TII.2021.3075683"},{"key":"2053_CR13","doi-asserted-by":"crossref","unstructured":"Chen, J., Li, K., & Philip, S. Y. (2021). Privacy-preserving deep learning model for decentralized vanets using fully homomorphic encryption and blockchain. IEEE Transactions on Intelligent Transportation Systems, 23(8), 11633\u201311642.","DOI":"10.1109\/TITS.2021.3105682"},{"key":"2053_CR14","doi-asserted-by":"crossref","unstructured":"Yuan, X., Chen, J., Yang, J., Zhang, N., Yang, T., Han, T., &Taherkordi, A. (2022). Fedstn: Graph representation driven federated learning for edge computing enabled urban traffic flow prediction. IEEE Transactions on Intelligent Transportation Systems, 24(8), 8738\u20138748.","DOI":"10.1109\/TITS.2022.3157056"},{"key":"2053_CR15","doi-asserted-by":"crossref","unstructured":"Parekh, R., Patel, N., Gupta, R., Jadav, N. K., Tanwar, S., Alharbi, A.,\u2026 &Raboaca, M. S. (2023). Gefl: Gradient encryption-aided privacy preserved federated learning for autonomous vehicles. IEEE Access, 11, 1825\u20131839.","DOI":"10.1109\/ACCESS.2023.3233983"},{"key":"2053_CR16","doi-asserted-by":"crossref","unstructured":"Liu, L., Tian, Y., Chakraborty, C., Feng, J., Pei, Q., Zhen, L., & Yu, K. (2023). Multilevel federated learning-based intelligent traffic flow forecasting for transportation network management. IEEE Transactions on Network and Service Management, 20(2), 1446\u20131458.","DOI":"10.1109\/TNSM.2023.3280515"},{"key":"2053_CR17","doi-asserted-by":"crossref","unstructured":"Yazdinejad, A., Dehghantanha, A., Karimipour, H., Srivastava, G., &Parizi, R. M. (2024). A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Transactions on Information Forensics and Security.","DOI":"10.1109\/TIFS.2024.3420126"},{"key":"2053_CR18","doi-asserted-by":"crossref","unstructured":"Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., & Liang, Y. (2021). Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Transactions on Industrial Informatics, 18(6), 4049\u20134058.","DOI":"10.1109\/TII.2021.3085960"},{"key":"2053_CR19","doi-asserted-by":"crossref","unstructured":"Vyas, A., Lin, P. C., Hwang, R. H., & Tripathi, M. (2024). Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey. IEEE Access.","DOI":"10.1109\/ACCESS.2024.3454211"},{"key":"2053_CR20","doi-asserted-by":"crossref","unstructured":"Chen, Chen., Ziye, Liu., Shaohua, Wan., Jintai, Luan., Qingqi, Pei. (2021). 50. Traffic Flow Prediction Based on Deep Learning in Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109\/TITS.2020.3025856","DOI":"10.1109\/TITS.2020.3025856"},{"key":"2053_CR21","doi-asserted-by":"crossref","unstructured":"Dongdong, Ye., Rong, Yu., Miao, Pan., Zhu, Han. (2020). 65. Federated Learning in Vehicular Edge Computing: A Selective Model Aggregation Approach. IEEE Access, doi: 10.1109\/ACCESS.2020.2968399","DOI":"10.1109\/ACCESS.2020.2968399"},{"key":"2053_CR22","doi-asserted-by":"crossref","unstructured":"Rongbo, Zhu., Meng, Li., Jiangjin, Yin., Lubing, Sun., Hao, Liu. (2023). 66. Enhanced Federated Learning for Edge Data Security in Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109\/tits.2023.3243088","DOI":"10.1109\/TITS.2023.3243088"},{"key":"2053_CR23","doi-asserted-by":"crossref","unstructured":"Liang, Guo., Yaoxiang, Yu., Meng, Qian., Ruiqi, Zhang., Hongli, Gao., Zheng, Min, Cheng. (2023). 70. FedRUL: A New Federated Learning Method for Edge-Cloud Collaboration Based Remaining Useful Life Prediction of Machines. IEEE-ASME Transactions on Mechatronics, doi: 10.1109\/TMECH.2022.3195524","DOI":"10.1109\/TMECH.2022.3195524"},{"key":"2053_CR24","doi-asserted-by":"crossref","unstructured":"Liang, Yuan., Lu, Su., Ziran, Wang. (2023). 80. Federated Transfer-Ordered-Personalized Learning for Driver Monitoring Application. IEEE Internet of Things Journal, doi: 10.1109\/JIOT.2023.3279273","DOI":"10.1109\/JIOT.2023.3279273"},{"key":"2053_CR25","doi-asserted-by":"crossref","unstructured":"Sayed, Mohammed, Samsudeen., G., Senthil, Kumar. (2023). 79. FeduLPM: Federated Unsupervised Learning-Based Predictive Model for Speed Control in Customizable Automotive Variants. IEEE Sensors Journal, doi: 10.1109\/JSEN.2023.3275154.","DOI":"10.1109\/JSEN.2023.3275154"},{"key":"2053_CR26","unstructured":"https:\/\/www.kaggle.com\/datasets\/fedesoriano\/traffic-prediction-dataset."},{"key":"2053_CR27","unstructured":"Khan, L. U., Tun, Y. K., Alsenwi, M., Imran, M., Han, Z., & Hong, C. S. (2022). A dispersed federated learning framework for 6G-enabled autonomous driving cars. IEEE Transactions on Network Science and Engineering."},{"key":"2053_CR28","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., & Ristenpart, T. (2015, October). Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 1322\u20131333).","DOI":"10.1145\/2810103.2813677"},{"key":"2053_CR29","doi-asserted-by":"crossref","unstructured":"Cheon, J. H., Kim, A., Kim, M., & Song, Y. (2017). Homomorphic encryption for arithmetic of approximate numbers. In Advances in cryptology\u2013ASIACRYPT 2017: 23rd international conference on the theory and applications of cryptology and information security, Hong kong, China, December 3\u20137, 2017, proceedings, part i 23 (pp. 409\u2013437). Springer International Publishing.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"2053_CR30","doi-asserted-by":"crossref","unstructured":"Xu, J., Glicksberg, B. S., Su, C., Walker, P., Bian, J., & Wang, F. (2021). Federated learning for healthcare informatics. Journal of healthcare informatics research, 5, 1\u201319.","DOI":"10.1007\/s41666-020-00082-4"},{"key":"2053_CR31","unstructured":"Geyer, R. C., Klein, T., & Nabi, M. (2017). Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557."}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02053-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02053-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02053-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:51Z","timestamp":1758986571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02053-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2053"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02053-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"18 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"230"}}