{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T12:29:34Z","timestamp":1768566574233,"version":"3.49.0"},"reference-count":25,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61932010"],"award-info":[{"award-number":["61932010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2019YFB1705903"],"award-info":[{"award-number":["2019YFB1705903"]}]},{"name":"Artificial Intelligence and Intelligent Transportation Joint Technical Center of Huazhong University of Science and Technology"},{"name":"Hubei Chutian Intelligent Transportation Co., Ltd."},{"name":"Intelligent Transportation Operation Monitoring Network and System","award":["0231129029"],"award-info":[{"award-number":["0231129029"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,2,29]]},"abstract":"<jats:p>\n            Multimedia cognitive computing as a revolutionary emerging concept of artificial intelligence emulating the reasoning process like human brains can facilitate the evolution of intelligent transportation systems (ITS) to be smarter, safer, and more efficient. Massive multimedia traffic big data is an important prerequisite for the success of cognitive computing in ITS. However, traditional data-centralized artificial intelligence approaches often face the problems of data islands and data famine due to concerns about data privacy and security. To this end, we propose the concept of cognitive federated learning leveraging federated learning as the learning paradigm for cognitive computing, which solves the preceding concerns by sharing updated models rather than raw data. Nevertheless, the exchange of numerous model parameters not only generates significant communication overhead but also suffers from the risk of privacy leakage due to inference attacks. This article aims to design a novel lightweight and privacy-enhanced cognitive federated learning architecture to facilitate the development of ITS. First, a privacy-enhanced model protection scheme with homomorphic encryption as the underlying technology is proposed to simultaneously defend against the inference attacks launched by external malicious attackers,\n            <jats:italic>honest-but-curious<\/jats:italic>\n            cognitive platforms, and internal participants. Furthermore, a novel tensor ring-block decomposition and its corresponding deep computation model converting the weight tensor into a set of matrices and third-order core tensors are proposed, which could reduce the communication overhead and storage requirements without compromising model performance. Experimental results on real-world datasets show that the proposed approach performs well.\n          <\/jats:p>","DOI":"10.1145\/3575661","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T12:06:12Z","timestamp":1676030772000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Tensor-Empowered LSTM for Communication-Efficient and Privacy-Enhanced Cognitive Federated Learning in Intelligent Transportation Systems"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7479-585X","authenticated-orcid":false,"given":"Ruonan","family":"Zhao","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7986-4244","authenticated-orcid":false,"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, and Hainan University, and St. Francis Xavier University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5233-9637","authenticated-orcid":false,"given":"Debin","family":"Liu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0098-791X","authenticated-orcid":false,"given":"Wanli","family":"Lu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2175-6221","authenticated-orcid":false,"given":"Chenlu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Hubei Chutian Expressway Digital Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8818-3467","authenticated-orcid":false,"given":"Yiheng","family":"Ruan","sequence":"additional","affiliation":[{"name":"Hubei Chutian Intelligence Transportation Co., Ltd."}]}],"member":"320","published-online":{"date-parts":[[2023,9,27]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ic-ETITE47903.2020.PDFeXpID6335287"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107484"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2003.821290"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2015.2402438"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3085960"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3151754"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491223"},{"key":"e_1_3_1_11_2","article-title":"Privacy-preserving federated learning based on multi-key homomorphic encryption","volume":"2104","author":"Ma Jing","year":"2022","unstructured":"Jing Ma, Si-Ahmed Naas, Stephan Sigg, and Xixiang Lyu. 2022. Privacy-preserving federated learning based on multi-key homomorphic encryption. arXiv abs\/2104.06824 (2022).","journal-title":"arXiv"},{"key":"e_1_3_1_12_2","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"1602","author":"McMahan H. Brendan","year":"2016","unstructured":"H. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2016. Communication-efficient learning of deep networks from decentralized data. CoRR abs\/1602.05629 (2016). http:\/\/arxiv.org\/abs\/1602.05629.","journal-title":"CoRR"},{"key":"e_1_3_1_13_2","first-page":"1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","author":"McMahan H. Brendan","year":"2017","unstructured":"H. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. 1\u201311."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1137\/090752286"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3007817"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC44903.2018.8939091"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3129598"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289464"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2988575"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3005909"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3157056"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3052183"},{"key":"e_1_3_1_25_2","article-title":"Tensor ring decomposition","volume":"1606","author":"Zhao Qibin","year":"2016","unstructured":"Qibin Zhao, Guoxu Zhou, Shengli Xie, Liqiang Zhang, and Andrzej Cichochi. 2016. Tensor ring decomposition. CoRR abs\/1606.05535 (2016).","journal-title":"CoRR"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2759728"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575661","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3575661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:52Z","timestamp":1750272232000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3575661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,27]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2,29]]}},"alternative-id":["10.1145\/3575661"],"URL":"https:\/\/doi.org\/10.1145\/3575661","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,27]]},"assertion":[{"value":"2022-03-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}