{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:36:58Z","timestamp":1776919018073,"version":"3.51.2"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100014188","name":"Korea Ministry of Science and ICT","doi-asserted-by":"publisher","award":["RS-2023-00217689"],"award-info":[{"award-number":["RS-2023-00217689"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["IITP-2026-RS-2023-00259967"],"award-info":[{"award-number":["IITP-2026-RS-2023-00259967"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019403","name":"Information Technology Research Centre","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019403","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002701","name":"Korea Ministry of Education","doi-asserted-by":"publisher","award":["2022R1I1A3055233"],"award-info":[{"award-number":["2022R1I1A3055233"]}],"id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.jisa.2026.104380","type":"journal-article","created":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:09:27Z","timestamp":1769206167000},"page":"104380","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A user-centric privacy transformation framework for federated learning in industrial internet of things"],"prefix":"10.1016","volume":"98","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4271-3944","authenticated-orcid":false,"given":"Assem","family":"Utaliyeva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-5082","authenticated-orcid":false,"given":"Yoon-Ho","family":"Choi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104380_bib0001","series-title":"Artificial intelligence and statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"issue":"10","key":"10.1016\/j.jisa.2026.104380_bib0002","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1038\/s41591-021-01506-3","article-title":"Federated learning for predicting clinical outcomes in patients with COVID-19","volume":"27","author":"Dayan","year":"2021","journal-title":"Nat Med"},{"issue":"1","key":"10.1016\/j.jisa.2026.104380_bib0003","doi-asserted-by":"crossref","DOI":"10.2196\/24207","article-title":"Federated learning of electronic health records improves mortality prediction in patients hospitalized with COVID-19: machine learning approach","volume":"9","author":"Vaid","year":"2021","journal-title":"JMIR Med. Informatics"},{"key":"10.1016\/j.jisa.2026.104380_bib0004","first-page":"374","article-title":"Towards federated learning at scale: system design","volume":"1","author":"Bonawitz","year":"2019","journal-title":"Proc Mach Learn Syst"},{"key":"10.1016\/j.jisa.2026.104380_bib0005","unstructured":"Hard A., Rao K., Mathews R., Ramaswamy S., Beaufays F., Augenstein S., et al. Federated learning for mobile keyboard prediction. 2018. arXiv preprint arXiv:181103604."},{"issue":"6","key":"10.1016\/j.jisa.2026.104380_bib0006","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial iot","volume":"16","author":"Lu","year":"2019","journal-title":"IEEE Trans Ind Inf"},{"issue":"9","key":"10.1016\/j.jisa.2026.104380_bib0007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3560816","article-title":"Blockchain-based federated learning for securing internet of things: a comprehensive survey","volume":"55","author":"Issa","year":"2023","journal-title":"ACM Comput Surv"},{"issue":"8","key":"10.1016\/j.jisa.2026.104380_bib0008","doi-asserted-by":"crossref","first-page":"5605","DOI":"10.1109\/TII.2020.3034674","article-title":"Adaptive federated learning and digital twin for industrial internet of things","volume":"17","author":"Sun","year":"2020","journal-title":"IEEE Trans Ind Inf"},{"key":"10.1016\/j.jisa.2026.104380_bib0009","doi-asserted-by":"crossref","first-page":"168854","DOI":"10.1109\/ACCESS.2020.3023940","article-title":"Resource optimized federated learning-enabled cognitive internet of things for smart industries","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.jisa.2026.104380_bib0010","doi-asserted-by":"crossref","first-page":"2044","DOI":"10.1109\/TMI.2023.3239391","article-title":"Do gradient inversion attacks make federated learning unsafe?","volume":"42","author":"Hatamizadeh","year":"2023","journal-title":"IEEE Trans Med Imaging"},{"key":"10.1016\/j.jisa.2026.104380_bib0011","article-title":"Deep leakage from gradients","volume":"32","author":"Zhu","year":"2019","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.jisa.2026.104380_bib0012","series-title":"2019\u202fIEEE Symposium on security and privacy (SP)","first-page":"691","article-title":"Exploiting unintended feature leakage in collaborative learning","author":"Melis","year":"2019"},{"key":"10.1016\/j.jisa.2026.104380_bib0013","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.future.2021.09.015","article-title":"An adaptive federated learning scheme with differential privacy preserving","volume":"127","author":"Wu","year":"2022","journal-title":"Fut Gen Comput Syst"},{"key":"10.1016\/j.jisa.2026.104380_bib0014","series-title":"Proceedings of the third ACM international workshop on edge systems, analytics and networking","first-page":"61","article-title":"Ldp-fed: federated learning with local differential privacy","author":"Truex","year":"2020"},{"key":"10.1016\/j.jisa.2026.104380_bib0015","series-title":"2023\u202fIEEE Security and privacy workshops (SPW)","first-page":"69","article-title":"Safefl: mpc-friendly framework for private and robust federated learning","author":"Gehlhar","year":"2023"},{"key":"10.1016\/j.jisa.2026.104380_sbref0016","series-title":"Smpai: secure multi-party computation for federated learning","author":"Mugunthan","year":"2019"},{"key":"10.1016\/j.jisa.2026.104380_bib0017","series-title":"2020\u202fUSENIX annual technical conference (USENIX ATC 20)","first-page":"493","article-title":"{BatchCrypt}: efficient homomorphic encryption for {Cross-Silo} federated learning","author":"Zhang","year":"2020"},{"issue":"4","key":"10.1016\/j.jisa.2026.104380_bib0018","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3390\/fi13040094","article-title":"Privacy preserving machine learning with homomorphic encryption and federated learning","volume":"13","author":"Fang","year":"2021","journal-title":"Fut Internet"},{"key":"10.1016\/j.jisa.2026.104380_bib0019","series-title":"Self-sovereign identity","author":"Preukschat","year":"2021"},{"key":"10.1016\/j.jisa.2026.104380_bib0020","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","article-title":"A survey on essential components of a self-sovereign identity","volume":"30","author":"M\u00fchle","year":"2018","journal-title":"Comput Sci Rev"},{"key":"10.1016\/j.jisa.2026.104380_bib0021","series-title":"International colloquium on automata, languages, and programming","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"key":"10.1016\/j.jisa.2026.104380_bib0022","series-title":"International conference on machine learning","first-page":"4507","article-title":"Instahide: instance-hiding schemes for private distributed learning","author":"Huang","year":"2020"},{"key":"10.1016\/j.jisa.2026.104380_bib0023","unstructured":"Xue H., Liu B., Ding M., Zhu T., Ye D., Song L., et al. Dp-image: differential privacy for image data in feature space. 2021. arXiv preprint arXiv:210307073."},{"key":"10.1016\/j.jisa.2026.104380_bib0024","series-title":"33rd USENIX security symposium (USENIX security 24)","first-page":"1063","article-title":"dp-promise: differentially private diffusion probabilistic models for image synthesis","author":"Wang","year":"2024"},{"key":"10.1016\/j.jisa.2026.104380_bib0025","series-title":"Proceedings of the 2016\u202fACM SIGSAC conference on computer and communications security","first-page":"308","article-title":"Deep learning with differential privacy","author":"Abadi","year":"2016"},{"key":"10.1016\/j.jisa.2026.104380_bib0026","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: algorithms and performance analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104380_bib0027","unstructured":"Geyer R.C., Klein T., Nabi M.. Differentially private federated learning: a client level perspective. 2017. arXiv preprint arXiv: 171207557."},{"issue":"6","key":"10.1016\/j.jisa.2026.104380_bib0028","doi-asserted-by":"crossref","first-page":"5113","DOI":"10.1109\/TDSC.2023.3241057","article-title":"Heterogeneous differential-private federated learning: trading privacy for utility truthfully","volume":"20","author":"Lin","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"10.1016\/j.jisa.2026.104380_bib0029","doi-asserted-by":"crossref","first-page":"3061","DOI":"10.1109\/TNET.2024.3377655","article-title":"More than enough is too much: adaptive defenses against gradient leakage in production federated learning","volume":"32","author":"Wang","year":"2024","journal-title":"IEEE\/ACM Trans Network"},{"key":"10.1016\/j.jisa.2026.104380_bib0030","series-title":"2025\u202fIEEE 41st international conference on data engineering (ICDE)","first-page":"3439","article-title":"Analyzing and optimizing perturbation of dp-sgd geometrically","author":"Duan","year":"2025"},{"key":"10.1016\/j.jisa.2026.104380_bib0031","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"9311","article-title":"Soteria: provable defense against privacy leakage in federated learning from representation perspective","author":"Sun","year":"2021"},{"key":"10.1016\/j.jisa.2026.104380_bib0032","series-title":"2022\u202fIEEE International conference on trust, security and privacy in computing and communications (trustcom)","first-page":"656","article-title":"Adap dp-fl: differentially private federated learning with adaptive noise","author":"Fu","year":"2022"},{"key":"10.1016\/j.jisa.2026.104380_bib0033","series-title":"International conference on algorithms and architectures for parallel processing","first-page":"24","article-title":"Differential privacy in federated dynamic gradient clipping based on gradient norm","author":"Mao","year":"2023"},{"key":"10.1016\/j.jisa.2026.104380_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2025.110070","article-title":"Awe-dpfl: adaptive weighting and dynamic privacy budget federated learning for heterogeneous data in iot","volume":"123","author":"Zheng","year":"2025","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.jisa.2026.104380_bib0035","first-page":"72181","article-title":"Dynamic personalized federated learning with adaptive differential privacy","volume":"36","author":"Yang","year":"2023","journal-title":"Adv Neural Inf Process Syst"},{"issue":"3","key":"10.1016\/j.jisa.2026.104380_bib0036","doi-asserted-by":"crossref","first-page":"2254","DOI":"10.1109\/TNSE.2025.3546777","article-title":"Exploring the privacy-accuracy trade-off using adaptive gradient clipping in federated learning","volume":"12","author":"Zhang","year":"2025","journal-title":"IEEE Trans Network Sci Eng"},{"issue":"15","key":"10.1016\/j.jisa.2026.104380_bib0037","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1007\/s10586-025-05699-x","article-title":"Dynamic privacy budget allocation for enhanced differential privacy in federated learning","volume":"28","author":"Zhu","year":"2025","journal-title":"Cluster Comput"},{"issue":"4","key":"10.1016\/j.jisa.2026.104380_bib0038","doi-asserted-by":"crossref","first-page":"828","DOI":"10.14778\/3503585.3503592","article-title":"Projected federated averaging with heterogeneous differential privacy","volume":"15","author":"Liu","year":"2021","journal-title":"Proc VLDB Endow"},{"key":"10.1016\/j.jisa.2026.104380_bib0039","unstructured":"(ISO) International Organization for Standardization and (IEC) I.E.C.. ISO\/IEC 62443: security for industrial automation and control systems2018;Accessed: 2025-03-07; https:\/\/www.iso.org\/standard\/80803.html."},{"key":"10.1016\/j.jisa.2026.104380_bib0040","unstructured":"International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). ISO\/IEC 27701: security techniques - privacy information management2019;Accessed: 2025-03-07; https:\/\/www.iso.org\/standard\/71670.html."},{"key":"10.1016\/j.jisa.2026.104380_bib0041","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"2636","article-title":"Bdd100k: a diverse driving dataset for heterogeneous multitask learning","author":"Yu","year":"2020"},{"key":"10.1016\/j.jisa.2026.104380_bib0042","series-title":"2008 International conference on prognostics and health management","first-page":"1","article-title":"Damage propagation modeling for aircraft engine run-to-failure simulation","author":"Saxena","year":"2008"},{"key":"10.1016\/j.jisa.2026.104380_bib0043","unstructured":"Beutel D.J., Topal T., Mathur A., Qiu X., Fernandez-Marques J., Gao Y., et al. Flower: a friendly federated learning research framework. 2020. arXiv preprint arXiv: 200714390."},{"key":"10.1016\/j.jisa.2026.104380_bib0044","first-page":"91","article-title":"Faster r-cnn: towards real-time object detection with region proposal networks","volume":"28","author":"Ren","year":"2015","journal-title":"Adv Neural Inf Process Syst"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000104?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000104?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T03:47:43Z","timestamp":1776916063000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":44,"alternative-id":["S2214212626000104"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104380","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A user-centric privacy transformation framework for federated learning in industrial internet of things","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104380","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104380"}}