{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:04:51Z","timestamp":1770681891725,"version":"3.49.0"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Natural Science Foundation of China, Jinan University","award":["62272198"],"award-info":[{"award-number":["62272198"]}]},{"name":"National Natural Science Foundation of China, Jinan University","award":["62276277"],"award-info":[{"award-number":["62276277"]}]},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving","award":["2023B1212060036"],"award-info":[{"award-number":["2023B1212060036"]}]},{"name":"Guangdong-Hong Kong Joint Laboratory for Data Security and Privacy Preserving","award":["2023B1212120007"],"award-info":[{"award-number":["2023B1212120007"]}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2024A1515010121"],"award-info":[{"award-number":["2024A1515010121"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Foundation","award":["Z230001"],"award-info":[{"award-number":["Z230001"]}]},{"name":"China Postdoctoral Fellowship Fund","award":["373500"],"award-info":[{"award-number":["373500"]}]},{"name":"Beihang Dare to Take Action Plan","award":["KG16336101"],"award-info":[{"award-number":["KG16336101"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372493"],"award-info":[{"award-number":["62372493"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2022ZD0116800"],"award-info":[{"award-number":["2022ZD0116800"]}]},{"name":"Special Funds for the Cultivation of Guangdong College Students\u2019 Scientific and Technological Innovation"},{"name":"Outstanding Innovative Talents Cultivation Funded Programs for Doctoral Students of Jinan University","award":["2023CXB022"],"award-info":[{"award-number":["2023CXB022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,7,15]]},"DOI":"10.1109\/jiot.2025.3560635","type":"journal-article","created":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T13:38:38Z","timestamp":1744724318000},"page":"26200-26214","source":"Crossref","is-referenced-by-count":3,"title":["Federated Graph Learning via Constructing and Sharing Feature Spaces for Cross-Domain IoT"],"prefix":"10.1109","volume":"12","author":[{"given":"Jiale","family":"Chen","sequence":"first","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5610-005X","authenticated-orcid":false,"given":"Shengda","family":"Zhuo","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1855-7642","authenticated-orcid":false,"given":"Jinchun","family":"He","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence, Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9654-9515","authenticated-orcid":false,"given":"Wangjie","family":"Qiu","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence, Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9220-2694","authenticated-orcid":false,"given":"Qinnan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence, Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4440-941X","authenticated-orcid":false,"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Somapah Rd, Singapore"}]},{"given":"Zhiming","family":"Zheng","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence, Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University, Beijing, China"}]},{"given":"Yin","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Management, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0960-4447","authenticated-orcid":false,"given":"Min","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5972-559X","authenticated-orcid":false,"given":"Changdong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9551-022X","authenticated-orcid":false,"given":"Shuqiang","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Cyber Security and the Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3095077"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3407584"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref5","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3360429"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3575637.3575644"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2022.100521"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2024.104712"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3299947"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3368054"},{"key":"ref13","first-page":"1","article-title":"FedGCN: Convergence-communication tradeoffs in federated training of graph convolutional networks","volume-title":"Proc. 37th Conf. Neural Inf. Process. Syst.","volume":"36","author":"Yao"},{"key":"ref14","first-page":"1396","article-title":"Personalized subgraph federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Baek"},{"key":"ref15","article-title":"FedGNN: Federated graph neural network for privacy-preserving recommendation","author":"Wu","year":"2021","journal-title":"arXiv:2102.04925"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3412357"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti1007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3376548"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3250275"},{"key":"ref21","first-page":"39801","article-title":"Personalized federated learning with inferred collaboration graphs","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ye"},{"key":"ref22","first-page":"18839","article-title":"Federated graph classification over non-IID graphs","volume-title":"Proc. 35th Conf. Neural Inf. Process. Syst.","volume":"34","author":"Xie"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3015958"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26187"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013541"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3282-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.05.003"},{"key":"ref30","article-title":"A survey on class imbalance in federated learning","author":"Zhang","year":"2023","journal-title":"arXiv:2303.11673"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210355"},{"key":"ref32","article-title":"Federated learning with personalization layers","author":"Arivazhagan","year":"2019","journal-title":"arXiv:1912.00818"},{"key":"ref33","first-page":"29515","article-title":"Towards personalized federated learning via heterogeneous model reassembly","volume-title":"Proc. 37th Conf. Neural Inf. Process. Syst.","volume":"36","author":"Wang"},{"key":"ref34","article-title":"Peer-to-peer federated learning on graphs","author":"Lalitha","year":"2019","journal-title":"arXiv:1901.11173"},{"key":"ref35","first-page":"6671","article-title":"Subgraph federated learning with missing neighbor generation","volume-title":"Proc. 35th Conf. Neural Inf. Process. Syst.","volume":"34","author":"Zhang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3462724"},{"key":"ref37","article-title":"Federated graph semantic and structural learning","author":"Huang","year":"2024","journal-title":"arXiv:2406.18937"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00309"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2024.3372381"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-024-01292-1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"ref42","article-title":"Graph neural networks with learnable structural and positional representations","author":"Dwivedi","year":"2021","journal-title":"arXiv:2110.07875"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16960"},{"key":"ref44","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","author":"Li"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20819"},{"key":"ref46","article-title":"On the convergence of Adam and beyond","author":"Reddi","year":"2019","journal-title":"arXiv:1904.09237"},{"key":"ref47","article-title":"Tudataset: A collection of benchmark datasets for learning with graphs","author":"Morris","year":"2020","journal-title":"arXiv:2007.08663"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89689-0_33"},{"key":"ref49","first-page":"3756","article-title":"Graph invariant kernels","volume-title":"Proc. 24th Int. Joint Conf. Artif. Intell.","author":"Orsini"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0103-5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1021\/jm040835a"},{"key":"ref52","article-title":"A large-scale database for graph representation learning","author":"Freitas","year":"2020","journal-title":"arXiv:2011.07682"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkh081"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783417"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00058"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/426"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1609.02907"},{"key":"ref58","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009953814988"},{"key":"ref60","article-title":"Pitfalls of graph neural network evaluation","author":"Shchur","year":"2018","journal-title":"arXiv:1811.05868"},{"key":"ref61","volume-title":"METIS: Unstructured Graph Partitioning and Sparse Matrix Ordering System","author":"Karypis","year":"1997"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11074249\/10965783.pdf?arnumber=10965783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T17:50:00Z","timestamp":1752169800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10965783\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,15]]},"references-count":61,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3560635","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,15]]}}}