{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:49:41Z","timestamp":1773413381337,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:00:00Z","timestamp":1770595200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T00:00:00Z","timestamp":1773360000000},"content-version":"vor","delay-in-days":32,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100009567","name":"Budapest University of Technology and Economics","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009567","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00294-x","type":"journal-article","created":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T22:43:05Z","timestamp":1770676985000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Federated learning with adaptively sparsified and recoverable perturbation for internet of things"],"prefix":"10.1007","volume":"6","author":[{"given":"Hiwot Birhanu","family":"Tazebew","sequence":"first","affiliation":[]},{"given":"Atallo Kassaw","family":"Takele","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,9]]},"reference":[{"key":"294_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.iotcps.2023.12.003","volume":"4","author":"F Alwahedi","year":"2024","unstructured":"Alwahedi F, Aldhaheri A, Ferrag MA, Battah A, Tihanyi N. Machine learning techniques for iot security: current research and future vision with generative AI and large language models. Internet Things Cyber-Phys Syst. 2024;4:167\u201385.","journal-title":"Internet Things Cyber-Phys Syst"},{"key":"294_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101187","volume":"26","author":"E Fazel","year":"2024","unstructured":"Fazel E, Nezhad MZ, Rezazadeh J, Moradi M, Ayoade J. Iot convergence with machine learning & blockchain: a review. Internet Things. 2024;26:101187.","journal-title":"Internet Things"},{"issue":"2","key":"294_CR3","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1007\/s12652-019-01452-6","volume":"15","author":"F Piccialli","year":"2024","unstructured":"Piccialli F, Cuomo S, Cola VSD, Casolla GA. Machine learning approach for iot cultural data. J Ambient Intell Humaniz Comput. 2024;15(2):1715\u201326.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"294_CR4","doi-asserted-by":"publisher","first-page":"12077","DOI":"10.1038\/s41598-024-62861-y","volume":"14","author":"H El-Sofany","year":"2024","unstructured":"El-Sofany H, El-Seoud SA, Karam OH, Bouallegue B. Using machine learning algorithms to enhance iot system security. Sci Rep. 2024;14(1):12077.","journal-title":"Sci Rep"},{"key":"294_CR5","doi-asserted-by":"publisher","first-page":"57128","DOI":"10.1109\/ACCESS.2024.3382709","volume":"12","author":"M Adam","year":"2024","unstructured":"Adam M, Hammoudeh M, Alrawashdeh R, Alsulaimy B. A survey on security, privacy, trust, and architectural challenges in iot systems. IEEE Access. 2024;12:57128\u201349.","journal-title":"IEEE Access"},{"issue":"1","key":"294_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s43926-024-00090-5","volume":"4","author":"AA Laghari","year":"2024","unstructured":"Laghari AA, Li H, Khan AA, Shoulin Y, Karim S, Khani MAK. Internet of things (iot) applications security trends and challenges. Discov Internet of Things. 2024;4(1):36.","journal-title":"Discov Internet of Things"},{"issue":"1","key":"294_CR7","volume":"4","author":"P Jayaraman","year":"2024","unstructured":"Jayaraman P, Nagarajan KK, Partheeban P, Krishnamurthy V. Critical review on water quality analysis using iot and machine learning models. Int J Inf Manage Data Insights. 2024;4(1):100210.","journal-title":"Int J Inf Manage Data Insights"},{"key":"294_CR8","doi-asserted-by":"crossref","unstructured":"Xiao Y, Gong J, Wang Y, Wang C. Intelligent agricultural greenhouse control system based on internet of things and machine learning. In: Proceedings of the 2025 International Conference on Machine Learning and Neural Networks, 2025; pp. 292\u2013300.","DOI":"10.1145\/3747227.3747273"},{"key":"294_CR9","doi-asserted-by":"crossref","unstructured":"Fu L, Pan R, Gu T, Cheng X, Zhang H. Iot-enabled supply chain management from a customer perspective: Challenges and opportunities. IEEE Internet Things J. 2024.","DOI":"10.1109\/JIOT.2024.3505412"},{"issue":"2","key":"294_CR10","doi-asserted-by":"publisher","first-page":"400","DOI":"10.26599\/TST.2023.9010007","volume":"29","author":"NA Jalali","year":"2023","unstructured":"Jalali NA, Chen H. Federated learning security and privacy-preserving algorithm and experiments research under internet of things critical infrastructure. Tsinghua Sci Technol. 2023;29(2):400\u201314.","journal-title":"Tsinghua Sci Technol"},{"issue":"1","key":"294_CR11","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13467","volume":"41","author":"Z Rehman","year":"2024","unstructured":"Rehman Z, Tariq N, Moqurrab SA, Yoo J, Srivastava G. Machine learning and internet of things applications in enterprise architectures: solutions, challenges, and open issues. Expert Syst. 2024;41(1):e13467.","journal-title":"Expert Syst"},{"issue":"3","key":"294_CR12","first-page":"1365","volume":"16","author":"A Kumar","year":"2024","unstructured":"Kumar A, Singh D. Detection and prevention of ddos attacks on edge computing of iot devices through reinforcement learning. Int J Inf Technol. 2024;16(3):1365\u201376.","journal-title":"Int J Inf Technol"},{"key":"294_CR13","doi-asserted-by":"crossref","unstructured":"Nadeem M, Hongsong C. Advancing social network security with magteon-turing l3tm: a multi-layered defense system against cyber threats. Comput Netw. 2025;111375.","DOI":"10.1016\/j.comnet.2025.111375"},{"key":"294_CR14","doi-asserted-by":"crossref","unstructured":"Gao W, Tavallaie O, Chen S, Zomaya A. Federated learning as a service for hierarchical edge networks with heterogeneous models. In: International Conference on Service-Oriented Computing. Springer, 2024; pp. 85\u201399.","DOI":"10.1007\/978-981-96-0805-8_6"},{"issue":"1","key":"294_CR15","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s11277-021-08401-7","volume":"127","author":"SFA Mon","year":"2022","unstructured":"Mon SFA, Winster SG, Ramesh R. Trust model for iot using cluster analysis: a centralized approach. Wireless Pers Commun. 2022;127(1):715\u201336.","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"294_CR16","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s12065-020-00524-3","volume":"15","author":"BS Pattnaik","year":"2022","unstructured":"Pattnaik BS, Pattanayak AS, Udgata SK, Panda AK. Advanced centralized and distributed svm models over different iot levels for edge layer intelligence and control. Evol Intel. 2022;15(1):481\u201395.","journal-title":"Evol Intel"},{"key":"294_CR17","doi-asserted-by":"publisher","first-page":"101016","DOI":"10.1109\/ACCESS.2024.3422211","volume":"12","author":"H Xu","year":"2024","unstructured":"Xu H, Seng KP, Ang LM, Smith J. Decentralized and distributed learning for aiot: a comprehensive review, emerging challenges, and opportunities. IEEE Access. 2024;12:101016\u201352.","journal-title":"IEEE Access"},{"key":"294_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85559-8","volume-title":"Federated learning for IOT applications","author":"SP Yadav","year":"2022","unstructured":"Yadav SP, Bhati BS, Mahato DP, Kumar S. Federated learning for IOT applications. Springer; 2022."},{"key":"294_CR19","doi-asserted-by":"publisher","first-page":"7842","DOI":"10.1109\/OJCOMS.2024.3506214","volume":"5","author":"M Adam","year":"2024","unstructured":"Adam M, Baroud U. Federated learning for iot: applications, trends, taxonomy, challenges, current solutions, and future directions. IEEE Open J Commun Soc. 2024;5:7842\u201377.","journal-title":"IEEE Open J Commun Soc"},{"key":"294_CR20","doi-asserted-by":"crossref","unstructured":"Takele AK, Vill\u00e1nyi B. Two-stage aggregation based federated learning (tsa-fl) for industrial internet of things. J Eng Res. 2025.","DOI":"10.1016\/j.jer.2025.03.003"},{"issue":"10","key":"294_CR21","doi-asserted-by":"publisher","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","volume":"9","author":"X Wang","year":"2021","unstructured":"Wang X, Garg S, Lin H, Hu J, Kaddoum G, Piran MJ, et al. Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning. IEEE Internet Things J. 2021;9(10):7110\u20139.","journal-title":"IEEE Internet Things J"},{"issue":"17","key":"294_CR22","doi-asserted-by":"publisher","first-page":"15488","DOI":"10.1109\/JIOT.2023.3264259","volume":"10","author":"B Wang","year":"2023","unstructured":"Wang B, Chen Y, Jiang H, Zhao Z. Ppefl: privacy-preserving edge federated learning with local differential privacy. IEEE Internet Things J. 2023;10(17):15488\u2013500.","journal-title":"IEEE Internet Things J"},{"key":"294_CR23","doi-asserted-by":"publisher","unstructured":"Yang X, Feng Y, Fang W, Shao J, Tang X, Xia ST, Lu R. An accuracy-lossless perturbation method for defending privacy attacks in federated learning. In: Proceedings of the ACM Web Conference 2022, ser. WWW \u201922. New York, NY, USA: Association for Computing Machinery, 2022, p. 732\u2013742. Available: https:\/\/doi.org\/10.1145\/3485447.3512233","DOI":"10.1145\/3485447.3512233"},{"key":"294_CR24","doi-asserted-by":"crossref","unstructured":"Qammar A, Wang H, Ding J, Naouri A, Khelloufi A, Ning H. A novel hybrid approach to detect clients in federated learning for industrial internet of things. Int J Mach Learn Cybern. 2025;1\u201317.","DOI":"10.1007\/s13042-025-02753-3"},{"issue":"16","key":"294_CR25","doi-asserted-by":"publisher","first-page":"14237","DOI":"10.1109\/JIOT.2020.3023588","volume":"9","author":"X Wang","year":"2020","unstructured":"Wang X, Garg S, Lin H, Kaddoum G, Hu J, Hossain MS. A secure data aggregation strategy in edge computing and blockchain-empowered internet of things. IEEE Internet Things J. 2020;9(16):14237\u201346.","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"294_CR26","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1109\/TSUSC.2024.3381812","volume":"9","author":"Z Li","year":"2024","unstructured":"Li Z, Chen H, Gao Y, Ni Z, Xue H, Shao H. Staged noise perturbation for privacy-preserving federated learning. IEEE Trans Sustain Comput. 2024;9(6):936\u201347.","journal-title":"IEEE Trans Sustain Comput"},{"issue":"8","key":"294_CR27","doi-asserted-by":"publisher","first-page":"8242","DOI":"10.1109\/TMC.2023.3343288","volume":"23","author":"R Hu","year":"2024","unstructured":"Hu R, Guo Y, Gong Y. Federated learning with sparsified model perturbation: improving accuracy under client-level differential privacy. IEEE Trans Mob Comput. 2024;23(8):8242\u201355.","journal-title":"IEEE Trans Mob Comput"},{"issue":"1","key":"294_CR28","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/JIOT.2023.3299947","volume":"11","author":"Z He","year":"2023","unstructured":"He Z, Wang L, Cai Z. Clustered federated learning with adaptive local differential privacy on heterogeneous iot data. IEEE Internet Things J. 2023;11(1):137\u201346.","journal-title":"IEEE Internet Things J"},{"issue":"23","key":"294_CR29","doi-asserted-by":"publisher","first-page":"24079","DOI":"10.1109\/JIOT.2022.3189361","volume":"9","author":"X Shen","year":"2022","unstructured":"Shen X, Liu Y, Zhang Z. Performance-enhanced federated learning with differential privacy for internet of things. IEEE Internet Things J. 2022;9(23):24079\u201394.","journal-title":"IEEE Internet Things J"},{"key":"294_CR30","volume":"70","author":"T Liu","year":"2022","unstructured":"Liu T, Hu X, Xu H, Shu T, Nguyen DN. High-accuracy low-cost privacy-preserving federated learning in iot systems via adaptive perturbation. J Inf Secur Appl. 2022;70:103309.","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"294_CR31","first-page":"1","volume":"18","author":"S Salim","year":"2022","unstructured":"Salim S, Moustafa N, Turnbull B, Razzak I. Perturbation-enabled deep federated learning for preserving internet of things-based social networks. ACM Trans Multimedia Comput Commun Appl (TOMM). 2022;18(2):1\u201319.","journal-title":"ACM Trans Multimedia Comput Commun Appl (TOMM)"},{"key":"294_CR32","doi-asserted-by":"crossref","unstructured":"Bhowmick C, Koutsoukos X. Resilient federated learning using trimmed-clipping aggregation. In: 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, pp. 192\u2013201;2024.","DOI":"10.1109\/TPS-ISA62245.2024.00031"},{"key":"294_CR33","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A. Ton_iot telemetry dataset: a new generation dataset of iot and iiot for data-driven intrusion detection systems. IEEE Access. 2020;8:165130\u201350.","journal-title":"IEEE Access"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00294-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00294-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00294-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T10:31:32Z","timestamp":1773397892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00294-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,9]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["294"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00294-x","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,9]]},"assertion":[{"value":"19 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"29"}}