{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:05:56Z","timestamp":1775066756986,"version":"3.50.1"},"reference-count":197,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471030"],"award-info":[{"award-number":["62471030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201029"],"award-info":[{"award-number":["62201029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"CAMS Innovation Fund for Medical Science","doi-asserted-by":"publisher","award":["2023-I2M-C&T-B-072"],"award-info":[{"award-number":["2023-I2M-C&T-B-072"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Key Project of PCL","award":["PCL2023A07"],"award-info":[{"award-number":["PCL2023A07"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/comst.2024.3523350","type":"journal-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T14:43:22Z","timestamp":1735310602000},"page":"3308-3338","source":"Crossref","is-referenced-by-count":11,"title":["Integration of Federated Learning and AI-Generated Content: A Survey of Overview, Opportunities, Challenges, and Solutions"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7521-5880","authenticated-orcid":false,"given":"Ying","family":"Liu","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9715-1773","authenticated-orcid":false,"given":"Jianhui","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2626-4883","authenticated-orcid":false,"given":"Weiting","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Changming","family":"An","sequence":"additional","affiliation":[{"name":"Department of Head and Neck Surgery, National Cancer Center\/National Clinical Research Center for Cancer\/Cancer Hospital, Chinese Academy of Medical Sciences and Peking Union Medical College, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yu","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8906-813X","authenticated-orcid":false,"given":"Hongke","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-30761-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC61773.2024.10561638"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123618"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3281931"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3058573"},{"key":"ref6","article-title":"Will we run out of data? An analysis of the limits of scaling datasets in machine learning","author":"Villalobos","year":"2022","journal-title":"arXiv:2211.04325"},{"key":"ref7","article-title":"FATE-LLM: A industrial grade federated learning framework for large language models","author":"Fan","year":"2023","journal-title":"arXiv:2310.10049"},{"key":"ref8","article-title":"When foundation model meets federated learning: Motivations, challenges, and future directions","author":"Zhuang","year":"2023","journal-title":"arXiv:2306.15546"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2928178"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8876317"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3579845"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","article-title":"A survey on security and privacy of federated learning","volume":"115","author":"Mothukuri","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3353265"},{"key":"ref16","article-title":"Challenges and remedies to privacy and security in AIGC: Exploring the potential of privacy computing, blockchain, and beyond","author":"Chen","year":"2023","journal-title":"arXiv:2306.00419"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2023.3315835"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2023.3300321"},{"key":"ref20","article-title":"Federated learning meets natural language processing: A survey","author":"Liu","year":"2021","journal-title":"arXiv:2107.12603"},{"key":"ref21","first-page":"20","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Stat.","volume":"54","author":"McMahan"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315746"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3277423"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3119038"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2022.3227563"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118352"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3116668"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3663364"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2023.3254179"},{"key":"ref31","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Brown"},{"key":"ref32","first-page":"4171","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. Conf. North Amer. Assoc. Comput. Linguist. Human Lang. Technol.","author":"Devlin"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref34","first-page":"1","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Goodfellow"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3626235"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60636-7_1"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3368879"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00780"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00531"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3274197"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622682"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS49936.2021.00075"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER52292.2023.00014"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2022.3224597"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3488565"},{"key":"ref46","first-page":"12","article-title":"Data-free one-shot federated learning under very high statistical heterogeneity","volume-title":"Proc. 11th Int. Conf. Learn. Rep.","author":"Heinbaugh"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00095"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3458929"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2024.3375150"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3278668"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2022.3221724"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054559"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3167482"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3397585"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3399226"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3120998"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3098259"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176360"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3045266"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3309858"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3172114"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TMLCN.2024.3393892"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/324"},{"key":"ref64","first-page":"14272","article-title":"PPIDSG: A privacy-preserving image distribution sharing scheme with GAN in federated learning","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"38","author":"Ma"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/tsusc.2024.3350040"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3302410"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01755"},{"key":"ref68","first-page":"7871","article-title":"Federated learning of large language models with parameter-efficient prompt tuning and adaptive optimization","volume-title":"Proc. Conf. Empirical Methods Nat. Lang. Process.","author":"Che"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3189703"},{"key":"ref70","first-page":"19332","article-title":"Federated learning from pre-trained models: A contrastive learning approach","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Tan"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/919"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i10.29007"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ATC58710.2023.10318858"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8546-3_18"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651935"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3688570"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3637494.3637507"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3453657"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2024.3407131"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3330943"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3130903"},{"key":"ref82","first-page":"2133","article-title":"CodexLeaks: Privacy leaks from code generation language models in GitHub copilot","volume-title":"Proc. 32nd USENIX Security Symp. (USENIX Security)","author":"Niu"},{"key":"ref83","first-page":"14022","article-title":"Sentence embedding leaks more information than you expect: Generative embedding inversion attack to recover the whole sentence","volume-title":"Proc. Findings Assoc. Comput. Linguist. (ACL)","author":"Li"},{"key":"ref84","first-page":"1","article-title":"BadGPT: Exploring security vulnerabilities of ChatGPT via backdoor attacks to instructGPT","volume-title":"Proc. NDSS","author":"Shi"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.naacl-long.165"},{"key":"ref86","first-page":"1","article-title":"Backdoor threats from compromised foundation models to federated learning","volume-title":"Proc. Int. Workshop Feder. Learn. Age Found. Models Conjunction (NeurIPS)","author":"Li"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00116"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaw4399"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-05881-4"},{"key":"ref90","article-title":"On the robustness of ChatGPT: An adversarial and out-of-distribution perspective","author":"Wang","year":"2023","journal-title":"arXiv:2302.12095"},{"key":"ref91","article-title":"Ignore previous prompt: Attack techniques for language models","author":"Perez","year":"2022","journal-title":"arXiv:2211.09527"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA53684.2021.00062"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3023126"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000372"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00989"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3151873"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3265366"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3116132"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3226861"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3539604"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3081560"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3297996"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3160425"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685388"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.jpdc.2022.01.019","article-title":"FGFL: A blockchain-based fair incentive governor for federated learning","volume":"163","author":"Gao","year":"2022","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3144450"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2024.3390208"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3295763"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213323"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3163791"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3126207"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3028101"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892848"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3050781"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3134755"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400278"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3056773"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3132226"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213347"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.115.2200014"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000604"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2966069"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3162499"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00017"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622598"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000263"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977383"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.inffus.2022.09.027","article-title":"FusionFedBlock: Fusion of blockchain and federated learning to preserve privacy in industry 5.0","volume":"90","author":"Singh","year":"2023","journal-title":"Inf. Fusion"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3151917"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130116"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3180968"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3185673"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.3040015"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2022.3220757"},{"key":"ref137","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2023.105893","article-title":"FedCSCD-GAN: A secure and collaborative framework for clinical cancer diagnosis via optimized federated learning and GAN","volume":"89","author":"Rehman","year":"2024","journal-title":"Biomed. Signal Process. Control"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3093715"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191202"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34344-5_11"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3422376"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3460469"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3210597"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3423786"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2024.3349990"},{"key":"ref146","doi-asserted-by":"crossref","DOI":"10.1016\/j.jbi.2024.104712","article-title":"MolCFL: A personalized and privacy-preserving drug discovery framework based on generative clustered federated learning","volume":"157","author":"Guo","year":"2024","journal-title":"J. Biomed. Informat."},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300259"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3190864"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3442922"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Fall60731.2023.10333689"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3017474"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10571334"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3155656"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3200121"},{"key":"ref156","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.108862","article-title":"Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized federated learning networks","volume":"135","author":"Liang","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref157","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.comcom.2022.06.015","article-title":"FEDGAN-IDS: Privacy-preserving IDS using GAN and federated learning","volume":"192","author":"Tabassum","year":"2022","journal-title":"Comput. Commun."},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST59916.2023.10713010"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3165869"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3289814"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA53684.2021.00021"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570977"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3353377"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.006.2300223"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/tgcn.2024.3425792"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3132561"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3247859"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2024.3353180"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080609"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079510"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2024.3366560"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.105.2100620"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017668"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015772"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3278329"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300174"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC61514.2024.10592435"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3435389"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3287092"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3434600"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS60910.2024.00019"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2024.3371772"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3420696"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622695"},{"key":"ref187","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103812","article-title":"Harnessing federated generative learning for green and sustainable Internet of Things","volume":"222","author":"Qi","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437312"},{"key":"ref189","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108671","article-title":"Privacy-preserving blockchain-enabled federated learning for B5G-driven edge computing","volume":"204","author":"Wan","year":"2022","journal-title":"Comput. Netw."},{"key":"ref190","article-title":"Generative models for effective ML on private, decentralized datasets","author":"Augenstein","year":"2019","journal-title":"arXiv:1911.06679"},{"key":"ref191","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2021.10.027","article-title":"Federated synthetic data generation with differential privacy","volume":"468","author":"Xin","year":"2022","journal-title":"Neurocomputing"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10144-6"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3461329"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3414138"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3213345"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3014370"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3211192"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11207096\/10816667.pdf?arnumber=10816667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:00:00Z","timestamp":1760983200000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10816667\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":197,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3523350","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}