{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:42:39Z","timestamp":1772908959327,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:00:00Z","timestamp":1691280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3599957.3606250","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:48:17Z","timestamp":1693331297000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Integration of Digital Twin and Federated Learning for Securing Vehicular Internet of Things"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7844-9092","authenticated-orcid":false,"given":"Deepti","family":"Gupta","sequence":"first","affiliation":[{"name":"Texas A&amp;M University - Central, Texas, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7710-4217","authenticated-orcid":false,"given":"Shafika Showkat","family":"Moni","sequence":"additional","affiliation":[{"name":"Embry-Riddle Aeronautical University, Daytona Beach, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9958-1495","authenticated-orcid":false,"given":"Ali Saman","family":"Tosun","sequence":"additional","affiliation":[{"name":"University of North Carolina at Pembroke, North Carolina, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DLACB: Deep Learning Based Access Control Using Blockchain. arXiv preprint arXiv:2303.14758","author":"Akbarfam Asma Jodeiri","year":"2023","unstructured":"Asma Jodeiri Akbarfam , Sina Barazandeh , Hoda Maleki , and Deepti Gupta . 2023 . DLACB: Deep Learning Based Access Control Using Blockchain. arXiv preprint arXiv:2303.14758 (2023). Asma Jodeiri Akbarfam, Sina Barazandeh, Hoda Maleki, and Deepti Gupta. 2023. DLACB: Deep Learning Based Access Control Using Blockchain. arXiv preprint arXiv:2303.14758 (2023)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087316"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3002712"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2992630"},{"key":"e_1_3_2_1_5_1","volume-title":"Deep Learning for Security and Privacy Preservation in IoT","author":"Gupta Deepti","unstructured":"Deepti Gupta , Smriti Bhatt , Paras Bhatt , Maanak Gupta , and Ali Saman Tosun . 2021. Game Theory Based Privacy Preserving Approach for Collaborative Deep Learning in IoT . In Deep Learning for Security and Privacy Preservation in IoT . Springer , 127--149. Deepti Gupta, Smriti Bhatt, Paras Bhatt, Maanak Gupta, and Ali Saman Tosun. 2021. Game Theory Based Privacy Preserving Approach for Collaborative Deep Learning in IoT. In Deep Learning for Security and Privacy Preservation in IoT. Springer, 127--149."},{"key":"e_1_3_2_1_6_1","volume-title":"Access control model for google cloud iot. In 2020 IEEE 6th Intl conference on big data security on cloud (BigDataSecurity)","author":"Gupta Deepti","unstructured":"Deepti Gupta , Smriti Bhatt , Maanak Gupta , Olumide Kayode , and Ali Saman Tosun . 2020. Access control model for google cloud iot. In 2020 IEEE 6th Intl conference on big data security on cloud (BigDataSecurity) , IEEE Intl conference on high performance and smart computing, (HPSC) and IEEE Intl conference on intelligent data and security (IDS). IEEE , 198--208. Deepti Gupta, Smriti Bhatt, Maanak Gupta, Olumide Kayode, and Ali Saman Tosun. 2020. Access control model for google cloud iot. In 2020 IEEE 6th Intl conference on big data security on cloud (BigDataSecurity), IEEE Intl conference on high performance and smart computing, (HPSC) and IEEE Intl conference on intelligent data and security (IDS). IEEE, 198--208."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100342"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRI51335.2021.00011"},{"key":"e_1_3_2_1_9_1","volume-title":"Learner's dilemma: IoT devices training strategies in collaborative deep learning. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)","author":"Gupta Deepti","unstructured":"Deepti Gupta , Olumide Kayode , Smriti Bhatt , Maanak Gupta , and Ali Saman Tosun . 2020. Learner's dilemma: IoT devices training strategies in collaborative deep learning. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT) . IEEE , 1--6. Deepti Gupta, Olumide Kayode, Smriti Bhatt, Maanak Gupta, and Ali Saman Tosun. 2020. Learner's dilemma: IoT devices training strategies in collaborative deep learning. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, 1--6."},{"key":"e_1_3_2_1_10_1","volume-title":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC). IEEE, 16--25","author":"Gupta Deepti","year":"2021","unstructured":"Deepti Gupta , Olumide Kayode , Smriti Bhatt , Maanak Gupta , and Ali Saman Tosun . 2021 . Hierarchical federated learning based anomaly detection using digital twins for smart healthcare . In 2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC). IEEE, 16--25 . Deepti Gupta, Olumide Kayode, Smriti Bhatt, Maanak Gupta, and Ali Saman Tosun. 2021. Hierarchical federated learning based anomaly detection using digital twins for smart healthcare. In 2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC). IEEE, 16--25."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900053"},{"key":"e_1_3_2_1_12_1","volume-title":"Device-to-Device Assisted Federated Learning in Edge Computing","author":"Li Yuchen","year":"2023","unstructured":"Yuchen Li , Weifa Liang , Jing Li , Xiuzhen Cheng , Dongxiao Yu , Albert Y Zomaya , and Song Guo . 2023. Energy-Aware , Device-to-Device Assisted Federated Learning in Edge Computing . IEEE Transactions on Parallel and Distributed Systems ( 2023 ). Yuchen Li, Weifa Liang, Jing Li, Xiuzhen Cheng, Dongxiao Yu, Albert Y Zomaya, and Song Guo. 2023. Energy-Aware, Device-to-Device Assisted Federated Learning in Edge Computing. IEEE Transactions on Parallel and Distributed Systems (2023)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"e_1_3_2_1_14_1","volume-title":"The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications","author":"Moni Shafika Showkat","year":"2022","unstructured":"Shafika Showkat Moni and Deepti Gupta . 2022 . Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network . The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (2022). Shafika Showkat Moni and Deepti Gupta. 2022. Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network. The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (2022)."},{"key":"e_1_3_2_1_15_1","volume-title":"ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1--7.","author":"Moni Shafika Showkat","year":"2020","unstructured":"Shafika Showkat Moni and D Manivannan . 2020 . An efficient RSU authentication scheme based on Merkle Hash Tree for VANETs . In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1--7. Shafika Showkat Moni and D Manivannan. 2020. An efficient RSU authentication scheme based on Merkle Hash Tree for VANETs. In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1--7."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100350"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100605"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"e_1_3_2_1_19_1","volume-title":"A Comprehensive Systematic Literature Review on Intrusion Detection Systems","author":"Ozkan-Okay Merve","year":"2021","unstructured":"Merve Ozkan-Okay , Refik Samet , \u00d6mer Aslan , and Deepti Gupta . 2021. A Comprehensive Systematic Literature Review on Intrusion Detection Systems . IEEE Access ( 2021 ). Merve Ozkan-Okay, Refik Samet, \u00d6mer Aslan, and Deepti Gupta. 2021. A Comprehensive Systematic Literature Review on Intrusion Detection Systems. IEEE Access (2021)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108906"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2990686"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/bs.adcom.2022.02.005","article-title":"Chapter Eight-Edge platforms, frameworks and applications","volume":"127","author":"Saini Kavita","year":"2022","unstructured":"Kavita Saini and Pethuru Raj . 2022 . Chapter Eight-Edge platforms, frameworks and applications . Adv. Comput. 127 (2022), 237 -- 258 . Kavita Saini and Pethuru Raj. 2022. Chapter Eight-Edge platforms, frameworks and applications. Adv. Comput. 127 (2022), 237--258.","journal-title":"Adv. Comput."},{"key":"e_1_3_2_1_23_1","volume-title":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT). IEEE, 225--230","author":"Shrivastava Atul Lal","year":"2021","unstructured":"Atul Lal Shrivastava and Rajendra Kumar Dwivedi . 2021 . Designing A Secure Vehicular Internet of Things (IoT) using Blockchain: A Review . In 2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT). IEEE, 225--230 . Atul Lal Shrivastava and Rajendra Kumar Dwivedi. 2021. Designing A Secure Vehicular Internet of Things (IoT) using Blockchain: A Review. In 2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT). IEEE, 225--230."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873186"},{"key":"e_1_3_2_1_25_1","volume-title":"A survey on digital twins: architecture, enabling technologies, security and privacy, and future prospects","author":"Wang Yuntao","year":"2023","unstructured":"Yuntao Wang , Zhou Su , Shaolong Guo , Minghui Dai , Tom H Luan , and Yiliang Liu . 2023. A survey on digital twins: architecture, enabling technologies, security and privacy, and future prospects . IEEE Internet of Things Journal ( 2023 ). Yuntao Wang, Zhou Su, Shaolong Guo, Minghui Dai, Tom H Luan, and Yiliang Liu. 2023. A survey on digital twins: architecture, enabling technologies, security and privacy, and future prospects. IEEE Internet of Things Journal (2023)."},{"key":"e_1_3_2_1_26_1","volume-title":"An overview of internet of vehicles. China communications 11, 10","author":"Yang Fangchun","year":"2014","unstructured":"Fangchun Yang , Shangguang Wang , Jinglin Li , Zhihan Liu , and Qibo Sun . 2014. An overview of internet of vehicles. China communications 11, 10 ( 2014 ), 1--15. Fangchun Yang, Shangguang Wang, Jinglin Li, Zhihan Liu, and Qibo Sun. 2014. An overview of internet of vehicles. China communications 11, 10 (2014), 1--15."}],"event":{"name":"RACS '23: International Conference on Research in Adaptive and Convergent Systems","location":"Gdansk Poland","acronym":"RACS '23","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599957.3606250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3599957.3606250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:13Z","timestamp":1750178833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599957.3606250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,6]]},"references-count":26,"alternative-id":["10.1145\/3599957.3606250","10.1145\/3599957"],"URL":"https:\/\/doi.org\/10.1145\/3599957.3606250","relation":{},"subject":[],"published":{"date-parts":[[2023,8,6]]},"assertion":[{"value":"2023-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}