{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:31:21Z","timestamp":1772033481639,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/ucet51115.2020.9205482","type":"proceedings-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T22:11:45Z","timestamp":1601417505000},"page":"1-4","source":"Crossref","is-referenced-by-count":35,"title":["Federated Machine Learning in Vehicular Networks: A summary of Recent Applications"],"prefix":"10.1109","author":[{"given":"Kang","family":"Tan","sequence":"first","affiliation":[]},{"given":"Duncan","family":"Bremner","sequence":"additional","affiliation":[]},{"given":"Julien Le","family":"Kernec","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Imran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2956472"},{"key":"ref11","author":"de haan","year":"2007","journal-title":"Extreme Value Theory An Introduction"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2200\/S00271ED1V01Y201006CNT007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800286"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v30i1.10295","article-title":"Deep reinforcement learning with double q-learning","author":"van hasselt","year":"2016","journal-title":"THIRTIETH AAAI Conference on Artificial Intelligence"},{"key":"ref15","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2016","journal-title":"et al"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919736"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968399"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VTS-APWCS.2019.8851649"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013587"},{"key":"ref28","first-page":"601","article-title":"Stealing&#x2019; machine learning models via prediction apis","author":"tram\u00e8r","year":"2016","journal-title":"25th USENIX Security Symposium USENIX Security 16"},{"key":"ref4","article-title":"Study on LTE-Based V2X Services","year":"2016","journal-title":"3rd Generation Partnership Project (3GPP) Technical report (TR) 36 814"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: attack and defense strategies","volume":"20","author":"xu","year":"2006","journal-title":"IEEE Network"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872122"},{"key":"ref6","first-page":"103","author":"imran","year":"2019","journal-title":"Evolution of Vehicular Communications within the Context of 5G Systems"},{"key":"ref5","article-title":"Federated learning: Strategies for improving communication efficiency","author":"konecny","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2882873"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924243"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2001.948835"},{"key":"ref20","first-page":"0","article-title":"Constrained k-means clustering","volume":"20","author":"bradley","year":"2000","journal-title":"Microsoft Research Redmond"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2917133"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref24","article-title":"Hybrid-fl: Cooperative learning mechanism using non-iid data in wireless networks","volume":"abs 1905 7210","author":"yoshida","year":"2019","journal-title":"CoRR"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2974748"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"ref25","article-title":"Towards federated learning at scale: System design","volume":"abs 1902 1046","author":"bonawitz","year":"2019","journal-title":"CoRR"}],"event":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,8,20]]},"end":{"date-parts":[[2020,8,21]]}},"container-title":["2020 International Conference on UK-China Emerging Technologies (UCET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9203795\/9205349\/09205482.pdf?arnumber=9205482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T05:50:45Z","timestamp":1669009845000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9205482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ucet51115.2020.9205482","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}