{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T18:48:11Z","timestamp":1769539691711,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Deanship of Graduate Studies and Scientific Research at the University of Bisha through the Fast-Track Research Support Program"},{"name":"European Union\u2019s (EU\u2019s) Horizon 2020 the Marie-Curie","award":["847652"],"award-info":[{"award-number":["847652"]}]},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["12\/RC\/2276_P2"],"award-info":[{"award-number":["12\/RC\/2276_P2"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,1]]},"DOI":"10.1109\/jiot.2025.3632564","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:45:24Z","timestamp":1763059524000},"page":"4411-4420","source":"Crossref","is-referenced-by-count":0,"title":["POST: Pruning Oriented Security for Inversion Attack in Edge-Based Internet of Things"],"prefix":"10.1109","volume":"13","author":[{"given":"Sunder Ali","family":"Khowaja","sequence":"first","affiliation":[{"name":"School of Computing, Dublin City University, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6019-4212","authenticated-orcid":false,"given":"Abi","family":"Waqas","sequence":"additional","affiliation":[{"name":"Tyndall National Institute, University College Cork, Cork, Ireland"}]},{"given":"Mohammad","family":"Tabrez Quasim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1262-8594","authenticated-orcid":false,"given":"Kapal","family":"Dev","sequence":"additional","affiliation":[{"name":"ADAPT Centre, Department of Computer Science and Munster Technological University, Cork, Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.014.2300319"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.012.2100153"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CFIS54774.2022.9756458"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2300377"},{"key":"ref6","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3280405"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20825"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279339"},{"key":"ref12","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp. (USENIX Security)","author":"Juvekar"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3022358"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01246"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449965"},{"key":"ref17","first-page":"1","article-title":"Deep compression: Compressing deep neural network with pruning, trained quantization and Huffman coding","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Han"},{"key":"ref18","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. 3rd Mach. Learn. Syst. Conf.","author":"Li"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3476920"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10571158"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5987-4_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3185956"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3135752"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.03.020"},{"key":"ref25","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3026709"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01953"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00465"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00410"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933032"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00290"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/080716542"},{"key":"ref33","first-page":"2178","article-title":"Generalised Lipschitz regularisation equals distributional robustness","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Cranko"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00335"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2021.104319"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6930"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3325413.3329791"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11363065\/11244847.pdf?arnumber=11244847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:03:19Z","timestamp":1769493799000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11244847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,1]]},"references-count":37,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3632564","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,1]]}}}