{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:59:46Z","timestamp":1774173586677,"version":"3.50.1"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["ESSCKF2022-02"],"award-info":[{"award-number":["ESSCKF2022-02"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004204","name":"Tongji University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004204","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022MF338"],"award-info":[{"award-number":["ZR2022MF338"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2023LZH018"],"award-info":[{"award-number":["ZR2023LZH018"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112209","type":"journal-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T16:56:48Z","timestamp":1773161808000},"page":"112209","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["FedCST: Reliable federated learning under clustered data distribution in industrial internet of things"],"prefix":"10.1016","volume":"280","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6101-1131","authenticated-orcid":false,"given":"Yuncan","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2917-8198","authenticated-orcid":false,"given":"Lina","family":"Ni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5193-0687","authenticated-orcid":false,"given":"Jinquan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7179-0079","authenticated-orcid":false,"given":"Yongquan","family":"Liang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.comnet.2026.112209_bib0001","doi-asserted-by":"crossref","first-page":"3037","DOI":"10.1109\/JIOT.2022.3141382","article-title":"Edge-intelligence-based condition monitoring of beam pumping units under heavy noise in industrial internet of things for industry 4.0","volume":"10","author":"Song","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112209_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2025.103214","article-title":"Federated learning based on dynamic hierarchical game incentives in industrial internet of things","volume":"65","author":"Tang","year":"2025","journal-title":"Adv. Eng. Inf."},{"issue":"18","key":"10.1016\/j.comnet.2026.112209_bib0003","doi-asserted-by":"crossref","first-page":"17844","DOI":"10.1109\/JIOT.2022.3161943","article-title":"Data heterogeneity-robust federated learning via group client selection in industrial IoT","volume":"9","author":"Li","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2026.112209_bib0004","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1109\/LWC.2024.3366510","article-title":"When visible light communication meets RIS: a soft actor-critic approach","volume":"13","author":"Zhang","year":"2024","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"5","key":"10.1016\/j.comnet.2026.112209_bib0005","doi-asserted-by":"crossref","first-page":"3541","DOI":"10.1109\/TII.2025.3534441","article-title":"Network traffic fingerprinting for IIoT device identification: a survey","volume":"21","author":"Sheng","year":"2025","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"7","key":"10.1016\/j.comnet.2026.112209_bib0006","doi-asserted-by":"crossref","first-page":"11663","DOI":"10.1109\/JIOT.2023.3330754","article-title":"Optimizing tradeoff between learning speed and cost for federated-learning-enabled industrial IoT","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"10.1016\/j.comnet.2026.112209_bib0007","doi-asserted-by":"crossref","first-page":"11935","DOI":"10.1109\/TVT.2023.3270859","article-title":"Digital twin-assisted edge computation offloading in industrial internet of things with NOMA","volume":"72","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"10.1016\/j.comnet.2026.112209_bib0008","doi-asserted-by":"crossref","first-page":"59","DOI":"10.63180\/jsrm.thestap.2025.1.3","article-title":"Responsive machine learning framework and lightweight utensil of prevention of evasion attacks in the IoT-based IDS","volume":"2025","author":"Laila","year":"2025","journal-title":"STAP J. Secur. Risk Manage."},{"key":"10.1016\/j.comnet.2026.112209_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.130455","article-title":"FedCkic: A federated learning inference attack defense method based on centralized key agreement and integrity verification","volume":"301","author":"Tang","year":"2026","journal-title":"Expert Syst. Appl."},{"issue":"12","key":"10.1016\/j.comnet.2026.112209_bib0010","doi-asserted-by":"crossref","DOI":"10.1145\/3679013","article-title":"When federated learning meets privacy-preserving computation","volume":"56","author":"Chen","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"7","key":"10.1016\/j.comnet.2026.112209_bib0011","doi-asserted-by":"crossref","first-page":"3615","DOI":"10.1109\/TKDE.2024.3352628","article-title":"Vertical federated learning: concepts, advances, and challenges","volume":"36","author":"Liu","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"10.1016\/j.comnet.2026.112209_bib0012","doi-asserted-by":"crossref","first-page":"3639","DOI":"10.1109\/TNSE.2024.3382206","article-title":"Resources-efficient adaptive federated learning for digital twin-enabled IIoT","volume":"11","author":"Qiao","year":"2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.comnet.2026.112209_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.102074","article-title":"FL-CTIF: a federated learning based CTI framework based on information fusion for secure IIoT","volume":"102","author":"Salim","year":"2024","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.comnet.2026.112209_bib0014","first-page":"1","article-title":"Intrusion detection approach for industrial internet of things traffic using deep recurrent reinforcement learning assisted federated learning","author":"Kaur","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"10.1016\/j.comnet.2026.112209_bib0015","first-page":"1","article-title":"Heterogeneous federated learning framework for IIoT based on selective knowledge distillation","author":"Guo","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.comnet.2026.112209_bib0016","series-title":"2024 32nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)","first-page":"230","article-title":"On the dynamics of non-IID data in federated learning and high-performance computing","author":"Annunziata","year":"2024"},{"issue":"12","key":"10.1016\/j.comnet.2026.112209_bib0017","doi-asserted-by":"crossref","first-page":"14053","DOI":"10.1109\/TII.2024.3441626","article-title":"Explainable semantic federated learning enabled industrial edge network for fire surveillance","volume":"20","author":"Dong","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.comnet.2026.112209_bib0018","series-title":"2024 International Conference on Inventive Computation Technologies (ICICT)","first-page":"1699","article-title":"Edge computing and federated learning for real-time anomaly detection in industrial internet of things (IIoT)","author":"Haldikar","year":"2024"},{"issue":"3","key":"10.1016\/j.comnet.2026.112209_bib0019","doi-asserted-by":"crossref","first-page":"2608","DOI":"10.1109\/TII.2022.3172310","article-title":"SCA: sybil-based collusion attacks of IIoT data poisoning in federated learning","volume":"19","author":"Xiao","year":"2023","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"20","key":"10.1016\/j.comnet.2026.112209_bib0020","doi-asserted-by":"crossref","first-page":"20243","DOI":"10.1109\/JIOT.2022.3175149","article-title":"WSCC: a weight-similarity-based client clustering approach for non-IID federated learning","volume":"9","author":"Tian","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2026.112209_bib0021","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3558005","article-title":"Personalized federated learning on non-IID data via group-based meta-learning","volume":"17","author":"Yang","year":"2023","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"12","key":"10.1016\/j.comnet.2026.112209_bib0022","doi-asserted-by":"crossref","first-page":"8475","DOI":"10.1109\/TII.2021.3064351","article-title":"Deep reinforcement learning assisted federated learning algorithm for data management of IIoT","volume":"17","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.comnet.2026.112209_bib0023","article-title":"A comprehensive survey of wireless time-sensitive networking (TSN): architecture, technologies, applications, and open issues","author":"Zanbouri","year":"2024","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.comnet.2026.112209_bib0024","series-title":"2023 European Conference on Communication Systems (ECCS)","first-page":"24","article-title":"Enhancing federated learning efficiency with generative model-based data augmentation for non-IID data","author":"Guo","year":"2023"},{"key":"10.1016\/j.comnet.2026.112209_bib0025","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"1536","article-title":"Joint local relational augmentation and global nash equilibrium for federated learning with non-IID data","author":"Liao","year":"2023"},{"key":"10.1016\/j.comnet.2026.112209_bib0026","doi-asserted-by":"crossref","first-page":"24462","DOI":"10.1109\/ACCESS.2021.3056919","article-title":"Client selection for federated learning with non-IID data in mobile edge computing","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112209_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119784","article-title":"rFedFW: secure and trustable aggregation scheme for byzantine-robust federated learning in internet of things","volume":"653","author":"Ni","year":"2024","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.comnet.2026.112209_bib0028","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1016\/j.dcan.2022.04.005","article-title":"A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6g","volume":"9","author":"Zhu","year":"2023","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.comnet.2026.112209_bib0029","unstructured":"J. Kone\u010dn\u1ef3, H.B. McMahan, F.X. Yu, P. Richt\u00e1rik, A.T. Suresh, D. Bacon, Federated learning: strategies for improving communication efficiency, (2016), arXiv preprint arXiv: 1610.05492."},{"issue":"6","key":"10.1016\/j.comnet.2026.112209_bib0030","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1109\/MWC.001.2100102","article-title":"Federated learning for industrial internet of things in future industries","volume":"28","author":"Nguyen","year":"2021","journal-title":"IEEE Wirel. Commun."},{"key":"10.1016\/j.comnet.2026.112209_bib0031","doi-asserted-by":"crossref","first-page":"3557","DOI":"10.1109\/TWC.2023.3309376","article-title":"Ensemble federated learning with non-IID data in wireless networks","volume":"23","author":"Zhao","year":"2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.comnet.2026.112209_bib0032","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1109\/TCSS.2023.3296885","article-title":"Defending against data poisoning attack in federated learning with non-IID data","volume":"11","author":"Yin","year":"2023","journal-title":"IEEE Trans. Comput. Social Syst."},{"key":"10.1016\/j.comnet.2026.112209_bib0033","series-title":"2021 8th International Conference on Dependable Systems and Their Applications (DSA)","first-page":"551","article-title":"Detection and mitigation of label-flipping attacks in federated learning systems with KPCA and K-means","author":"Li","year":"2021"},{"key":"10.1016\/j.comnet.2026.112209_bib0034","unstructured":"S. Prakash, A.S. Avestimehr, Mitigating byzantine attacks in federated learning, (2020), arXiv preprint arXiv: 2010.07541."},{"key":"10.1016\/j.comnet.2026.112209_bib0035","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"7394-7402","article-title":"A four-pronged defense against byzantine attacks in federated learning","author":"Wan","year":"2023"},{"issue":"10","key":"10.1016\/j.comnet.2026.112209_bib0036","doi-asserted-by":"crossref","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","article-title":"Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112209_bib0037","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.future.2024.03.019","article-title":"Reliable federated learning based on dual-reputation reverse auction mechanism in internet of things","volume":"156","author":"Tang","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2026.112209_bib0038","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/TNSE.2023.3322701","article-title":"Hypernetworks-based hierarchical federated learning on hybrid non-IID datasets for digital twin in industrial IoT","volume":"11","author":"Yang","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.comnet.2026.112209_bib0039","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.ins.2022.10.120","article-title":"Byzantine-robust variance-reduced federated learning over distributed non-iid data","volume":"616","author":"Peng","year":"2022","journal-title":"Inf. Sci."},{"key":"10.1016\/j.comnet.2026.112209_bib0040","series-title":"29th USENIX Security Symposium (USENIX Security 20)","first-page":"1605","article-title":"Local model poisoning attacks to {Byzantine-Robust} federated learning","author":"Fang","year":"2020"},{"key":"10.1016\/j.comnet.2026.112209_bib0041","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.ins.2023.02.025","article-title":"Model poisoning attack in differential privacy-based federated learning","volume":"630","author":"Yang","year":"2023","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.comnet.2026.112209_bib0042","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/JIOT.2023.3288886","article-title":"Privacy-preserving federated learning against label-flipping attacks on non-IID data","volume":"11","author":"Shen","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112209_bib0043","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/TIFS.2022.3169918","article-title":"ShieldFL: mitigating model poisoning attacks in privacy-preserving federated learning","volume":"17","author":"Ma","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112209_bib0044","unstructured":"X. Li, K. Huang, W. Yang, S. Wang, Z. Zhang, On the convergence of fedavg on non-iid data, (2019), arXiv preprint arXiv: 1907.02189."},{"key":"10.1016\/j.comnet.2026.112209_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124979","article-title":"Credit card fraud detection based on federated graph learning","volume":"256","author":"Tang","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.comnet.2026.112209_bib0046","doi-asserted-by":"crossref","first-page":"10095","DOI":"10.1109\/JIOT.2023.3237032","article-title":"Federated feature selection for horizontal federated learning in IoT networks","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112209_bib0047","series-title":"2022 IEEE 38th International Conference on Data Engineering (ICDE)","first-page":"965","article-title":"Federated learning on non-iid data silos: an experimental study","author":"Li","year":"2022"},{"key":"10.1016\/j.comnet.2026.112209_bib0048","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"issue":"12","key":"10.1016\/j.comnet.2026.112209_bib0049","doi-asserted-by":"crossref","first-page":"21025","DOI":"10.1109\/JIOT.2025.3546624","article-title":"Overcoming forgetting using adaptive federated learning for IIoT devices with non-IID data","volume":"12","author":"Zhang","year":"2025","journal-title":"IEEE Internet Things J."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002215?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002215?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:42:09Z","timestamp":1774172529000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626002215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":49,"alternative-id":["S1389128626002215"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112209","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"FedCST: Reliable federated learning under clustered data distribution in industrial internet of things","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112209","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112209"}}