{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T22:53:35Z","timestamp":1774306415662,"version":"3.50.1"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010818","name":"Beijing Information Science and Technology University","doi-asserted-by":"publisher","award":["L254057"],"award-info":[{"award-number":["L254057"]}],"id":[{"id":"10.13039\/501100010818","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.neucom.2025.132334","type":"journal-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T16:39:25Z","timestamp":1765211965000},"page":"132334","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["An enhanced method for hierarchical federated learning based on privacy metric and adaptive differential privacy"],"prefix":"10.1016","volume":"667","author":[{"given":"Xiaoshi","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4348-3810","authenticated-orcid":false,"given":"Haiyan","family":"Kang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2025.132334_bib0005","series-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, PMLR","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"issue":"2","key":"10.1016\/j.neucom.2025.132334_bib0010","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1109\/JBHI.2022.3165945","article-title":"Federated-learning based privacy preservation and fraud-enabled blockchain iomt system for healthcare","volume":"27","author":"Abdullah","year":"2023","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"10.1016\/j.neucom.2025.132334_bib0015","series-title":"Proceedings of the 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","first-page":"24","article-title":"SHARE: shaping data distribution at edge for communication-efficient hierarchical federated learning","author":"Deng","year":"2021"},{"issue":"11","key":"10.1016\/j.neucom.2025.132334_bib0020","doi-asserted-by":"crossref","first-page":"8836","DOI":"10.1109\/JIOT.2020.3037194","article-title":"Local differential privacy based federated learning for internet of things","volume":"8","author":"Yang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.neucom.2025.132334_bib0025","series-title":"Conference on Neural Information Processing Systems","first-page":"1","article-title":"Dynamic personalized federated learning with adaptive differential privacy","author":"Yang","year":"2023"},{"issue":"5819","key":"10.1016\/j.neucom.2025.132334_bib0030","first-page":"1","article-title":"A federated learning differential privacy algorithm for non-gaussian heterogeneous data","volume":"13","author":"Yang","year":"2023","journal-title":"Sci. Rep."},{"key":"10.1016\/j.neucom.2025.132334_bib0035","series-title":"Proceedings of the International Joint Conference on Artificial Intelligence","first-page":"1571","article-title":"LDP-FL-practical private aggregation in federated learning with local differential privacy","author":"Sun","year":"2021"},{"issue":"6","key":"10.1016\/j.neucom.2025.132334_bib0040","first-page":"1963","article-title":"Research on the deep learning method based on data feature relevance and adaptive differential privacy[j]","volume":"52","author":"Hai-yan","year":"2024","journal-title":"Acta Electron. Sin."},{"issue":"1","key":"10.1016\/j.neucom.2025.132334_bib0045","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.future.2023.07.033","article-title":"Adaptive differential privacy in vertical federated learning for mobility forecasting","volume":"149","author":"Errounda","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.neucom.2025.132334_bib0050","series-title":"Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science","first-page":"51","article-title":"Boosting and differential privacy","author":"Dwork","year":"2010"},{"key":"10.1016\/j.neucom.2025.132334_bib0055","series-title":"Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems","first-page":"147","article-title":"Towards an axiomatization of statistical privacy and utility","author":"Kifer","year":"2010"},{"key":"10.1016\/j.neucom.2025.132334_bib0060","series-title":"Proceedings of the 2017 IEEE International Conference on Data Mining","first-page":"385","article-title":"Adaptive laplace mechanism: differential privacy preservation in deep learning","author":"Phan","year":"2017"},{"issue":"4","key":"10.1016\/j.neucom.2025.132334_bib0065","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"10.1016\/j.neucom.2025.132334_bib0070","series-title":"European Symposium on Research in Computer Security","first-page":"195","article-title":"Local differential privacy for federated learning","author":"Chamikara","year":"2022"},{"key":"10.1016\/j.neucom.2025.132334_bib0075","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"4510","article-title":"Mobilenetv2: inverted residuals and linear bottlenecks","author":"Sandler","year":"2018"},{"issue":"129529","key":"10.1016\/j.neucom.2025.132334_bib0080","first-page":"1","article-title":"Research on efficient data processing method for fog computing based on blockchain and federated learning","volume":"626","author":"Kang","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2025.132334_bib0085","series-title":"Proceedings of the 2024 IEEE International Conference on Big Data (BigData)","first-page":"1","article-title":"Hierarchical federated learning with privacy","author":"Chandrasekaran","year":"2024"},{"issue":"1","key":"10.1016\/j.neucom.2025.132334_bib0090","article-title":"Hierfedpdp: hierarchical federated learning with personalized differential privacy protection","volume":"83","author":"Sun","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.neucom.2025.132334_bib0095","author":"Hong"},{"key":"10.1016\/j.neucom.2025.132334_bib0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2024.104037","article-title":"Leveraging blockchain and federated learning in edge-fog-cloud computing environments for intelligent decision-making with ECG data in IOT","volume":"233","author":"Rajagopal","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.neucom.2025.132334_bib0105","series-title":"IEEE INFOCOM 2025-IEEE Conference on Computer Communications","article-title":"Lightweight federated learning with differential privacy and straggler resilience","author":"Hong","year":"2025"},{"key":"10.1016\/j.neucom.2025.132334_bib0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2024.102709","article-title":"YOLO-MIF: improved yolov8 with multi-information fusion for object detection in gray-scale images","volume":"62","author":"Wan","year":"2024","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.neucom.2025.132334_bib0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120355","article-title":"Random interpolation resize: a free image data augmentation method for object detection in industry","volume":"228","author":"Wan","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2025.132334_bib0120","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.106442","article-title":"Mixed local channel attention for object detection","volume":"123","author":"Wan","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"10.1016\/j.neucom.2025.132334_bib0125","first-page":"71","article-title":"A blockchain-enabled approach for privacy-protected data sharing in internet of robotic things networks","volume":"14","author":"Bilal","year":"2024","journal-title":"Hum. Cent. Comput. Inf. Sci."},{"issue":"19","key":"10.1016\/j.neucom.2025.132334_bib0130","doi-asserted-by":"crossref","first-page":"14469","DOI":"10.1007\/s00500-023-09037-4","article-title":"A data-driven approach for intrusion and anomaly detection using automated machine learning for the internet of things","volume":"27","author":"Hao","year":"2023","journal-title":"Soft Comput."},{"key":"10.1016\/j.neucom.2025.132334_bib0135","article-title":"An adaptive fused domain-cycling variational generative adversarial network for machine fault diagnosis under data scarcity","author":"Wang","year":"2025","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.neucom.2025.132334_bib0140","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2025.103340","article-title":"An interpretable integration fusion time-frequency prototype contrastive learning for machine fault diagnosis with limited labeled samples","volume":"124","author":"Dong","year":"2025","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.neucom.2025.132334_bib0145","article-title":"A task-oriented theil index-based meta-learning network with gradient calibration strategy for rotating machinery fault diagnosis with limited samples","volume":"62","author":"Mingzhe","year":"2024","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.neucom.2025.132334_bib0150","article-title":"Data compliance utilization method based on adaptive differential privacy and federated learning","author":"Kang","year":"2025","journal-title":"Int. J. Neural Syst."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231225030061?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231225030061?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T04:27:30Z","timestamp":1773894450000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231225030061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":30,"alternative-id":["S0925231225030061"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2025.132334","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An enhanced method for hierarchical federated learning based on privacy metric and adaptive differential privacy","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2025.132334","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"132334"}}