{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:49:38Z","timestamp":1770338978970,"version":"3.49.0"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T00:00:00Z","timestamp":1746489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007637","name":"German University in Cairo","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007637","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. This raises serious ethical and privacy concerns. The communication overhead of transporting a large number of data needed to train a global model and the diverse nature of the data from different sources are serious limitations facing the development of people re-identification technologies. We address these challenges by proposing a novel three-step federated learning framework. First, we investigate the impact of data augmentation techniques on the model generalizability and explore the effectiveness of different backbone networks. Second, we use reinforcement learning-based Upper Confidence Bounds (UCB) as a client-selection strategy in the federated round that dynamically chooses devices similar to the current model state, ensuring the model is updated with relevant data and enables faster convergence. Finally, we introduce a feature-level attention mechanism focusing on discriminative features for re-identification. Extensive experiments were conducted on nine benchmark re-ID datasets. The proposed framework outperformed the federated re-ID baseline by 10% in rank-1 accuracy and achieved results comparable to the centralized approach, with a difference of 2%. This improvement over the previous state-of-the-art establishes a new benchmark for federated re-identification.<\/jats:p>","DOI":"10.1186\/s13677-025-00746-9","type":"journal-article","created":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T12:57:48Z","timestamp":1746536268000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Client aware adaptive federated learning using UCB-based reinforcement for people re-identification"],"prefix":"10.1186","volume":"14","author":[{"given":"Dinah","family":"Waref","sequence":"first","affiliation":[]},{"given":"Yomna","family":"Alayary","sequence":"additional","affiliation":[]},{"given":"Nadeen","family":"Fathallah","sequence":"additional","affiliation":[]},{"given":"Mohamed\u00a0A.","family":"Abd\u00a0El\u00a0Ghany","sequence":"additional","affiliation":[]},{"given":"Mohammed\u00a0A.-M.","family":"Salem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,6]]},"reference":[{"key":"746_CR1","doi-asserted-by":"publisher","unstructured":"Palumbo G, Carneiro D, Alves V (2024)\u00a0Objective metrics for ethical AI: a systematic literature review. Int J Data Sci Anal. https:\/\/doi.org\/10.1007\/s41060-024-00541-w","DOI":"10.1007\/s41060-024-00541-w"},{"key":"746_CR2","doi-asserted-by":"crossref","unstructured":"Gamal A, Shoukry N, Salem MAM (2021) Long-term person re-identification model with a strong feature extractor. In: 2021 Tenth International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, Cairo, pp 74\u201379","DOI":"10.1109\/ICICIS52592.2021.9694212"},{"issue":"6","key":"746_CR3","doi-asserted-by":"publisher","first-page":"2835","DOI":"10.3390\/app12062835","volume":"12","author":"N Shoukry","year":"2022","unstructured":"Shoukry N, Abd El Ghany MA, Salem MAM (2022) Multi-modal long-term person re-identification using physical soft bio-metrics and body figure. Appl Sci 12(6):2835","journal-title":"Appl Sci"},{"key":"746_CR4","doi-asserted-by":"publisher","unstructured":"Voigt P, Von\u00a0dem\u00a0Bussche A (2017) The EU General Data Protection Regulation (GDPR): A Practical Guide. 1st Ed. Springer International Publishing, Cham. https:\/\/doi.org\/10.1007\/978-3-319-57959-7","DOI":"10.1007\/978-3-319-57959-7"},{"key":"746_CR5","doi-asserted-by":"publisher","first-page":"102402","DOI":"10.1016\/j.cose.2021.102402","volume":"110","author":"N Truong","year":"2021","unstructured":"Truong N, Sun K, Wang S, Guitton F, Guo Y (2021) Privacy preservation in federated learning: An insightful survey from the gdpr perspective. Comput Secur 110:102402","journal-title":"Comput Secur"},{"issue":"3","key":"746_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s41060-018-0108-z","volume":"6","author":"J von Hein","year":"2018","unstructured":"von Hein J, Bizer A (2018) Social media and the protection of privacy: Current gaps and future directions in european private international law. Int J Data Sci Analytics 6(3):233\u2013239","journal-title":"Int J Data Sci Analytics"},{"key":"746_CR7","unstructured":"Harvey J Adam\u00a0LaPlace (2021) Exposing.ai. https:\/\/exposing.ai. Accessed 19 Apr 2024"},{"key":"746_CR8","unstructured":"McMahan HB, Moore E, Ramage D, y\u00a0Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data.\u00a0In: The International Conference on Artificial Intelligence and Statistics, vol. 54. JMLR: W&CP, Fort Lauderdale, pp 1273\u20131282"},{"key":"746_CR9","doi-asserted-by":"crossref","unstructured":"Waref D, Salem M (2022) Split federated learning for emotion detection. In: 2022 4th Novel Intelligent and Leading Emerging Sciences Conference (NILES).\u00a0IEEE, Giza, pp 112\u2013115","DOI":"10.1109\/NILES56402.2022.9942417"},{"key":"746_CR10","doi-asserted-by":"crossref","unstructured":"Abdelgaber YE, Ahmed YA, Salem MAM, Salem MAG (2023) Federated learning for resource management in edge computing. In: 2023 Eleventh International Conference on Intelligent Computing and Information Systems (ICICIS). IEEE, pp 102\u2013109","DOI":"10.1109\/ICICIS58388.2023.10413933"},{"issue":"4","key":"746_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s41060-023-00442-4","volume":"17","author":"M Harasic","year":"2024","unstructured":"Harasic M, Keese FS, Mattern D, Paschke A (2024) Recent advances and future challenges in federated recommender systems. Int J Data Sci Analytics 17(4):337\u2013357","journal-title":"Int J Data Sci Analytics"},{"issue":"3","key":"746_CR12","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s41060-022-00331-2","volume":"16","author":"I Varlamis","year":"2023","unstructured":"Varlamis I, Sardianos C, Chronis C, Dimitrakopoulos G, Himeur Y, Alsalemi A, Bensaali F, Amira A (2023) Using big data and federated learning for generating energy efficiency recommendations. Int J Data Sci Analytics 16(3):353\u2013369","journal-title":"Int J Data Sci Analytics"},{"key":"746_CR13","doi-asserted-by":"publisher","unstructured":"D\u00fcsing C, Cimiano P, Paa\u00dfen B (2024)\u00a0Leveraging Local Data Sampling Strategies to Improve Federated Learning (Extended Abstract). In: 11th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2024. IEEE, San Diego, 2024, pp. 1\u20132. https:\/\/doi.org\/10.1109\/DSAA61799.2024.10722778","DOI":"10.1109\/DSAA61799.2024.10722778"},{"key":"746_CR14","doi-asserted-by":"publisher","first-page":"104394","DOI":"10.1016\/j.imavis.2022.104394","volume":"119","author":"Z Ming","year":"2022","unstructured":"Ming Z, Zhu M, Wang X, Zhu J, Cheng J, Gao C, Yang Y, Wei X (2022) Deep learning-based person re-identification methods: A survey and outlook of recent works. Image Vis Comput 119:104394","journal-title":"Image Vis Comput"},{"key":"746_CR15","doi-asserted-by":"publisher","first-page":"45556","DOI":"10.1109\/ACCESS.2020.2978344","volume":"8","author":"H Wang","year":"2020","unstructured":"Wang H, Du H, Zhao Y, Yan J (2020) A comprehensive overview of person re-identification approaches. IEEE Access 8:45556\u201345583","journal-title":"IEEE Access"},{"issue":"4","key":"746_CR16","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.imavis.2014.02.001","volume":"32","author":"A Bedagkar-Gala","year":"2014","unstructured":"Bedagkar-Gala A, Shah SK (2014) A survey of approaches and trends in person re-identification. Image Vis Comput 32(4):270\u2013286","journal-title":"Image Vis Comput"},{"issue":"4","key":"746_CR17","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TCSVT.2019.2898940","volume":"30","author":"Q Leng","year":"2019","unstructured":"Leng Q, Ye M, Tian Q (2019) A survey of open-world person re-identification. IEEE Trans Circ Syst Video Technol 30(4):1092\u20131108","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"1","key":"746_CR18","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1038\/s41598-024-51767-4","volume":"14","author":"S Akan","year":"2024","unstructured":"Akan S, Varl\u0131 S, Bhuiyan MAN (2024) An enhanced swin transformer for soccer player reidentification. Sci Rep 14(1):1139","journal-title":"Sci Rep"},{"key":"746_CR19","doi-asserted-by":"crossref","unstructured":"Gao Z, Wei S, Guan W, Zhu L, Wang M, Chen S (2023) Identity-guided collaborative learning for cloth-changing person reidentification. IEEE Trans Pattern Anal Mach Intell 46(5):2819\u20132837","DOI":"10.1109\/TPAMI.2023.3334741"},{"key":"746_CR20","unstructured":"Zhang X, Luo H, Fan X, Xiang W, Sun Y, Xiao Q, Jiang W, Zhang C, Sun J (2017)\u00a0AlignedReID: Surpassing human-level performance in person re-identification. arXiv preprint arXiv:1711.08184. https:\/\/arxiv.org\/abs\/1711.08184"},{"key":"746_CR21","doi-asserted-by":"publisher","unstructured":"Yang W, Li D, Chen X, Huang K (2020) Bottom-up foreground-aware feature fusion for person search. In: Proceedings of the 28th ACM International Conference on Multimedia, Seattle, WA, USA. pp 3404\u2013341 https:\/\/doi.org\/10.1145\/3394171.3413991","DOI":"10.1145\/3394171.3413991"},{"key":"746_CR22","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.neunet.2023.11.003","volume":"169","author":"E Ning","year":"2024","unstructured":"Ning E, Wang Y, Wang C, Zhang H, Ning X (2024) Enhancement, integration, expansion: Activating representation of detailed features for occluded person re-identification. Neural Netw 169:532\u2013541","journal-title":"Neural Netw"},{"key":"746_CR23","doi-asserted-by":"publisher","unstructured":"Islam A, Tsun MTK, Theng LB, Chua C (2024) Region-based convolutional neural networks for occluded person re-identification. Int J Adv Intell Inform 10(1):49-63. https:\/\/doi.org\/10.26555\/ijain.v10i1.1125","DOI":"10.26555\/ijain.v10i1.1125"},{"key":"746_CR24","doi-asserted-by":"crossref","unstructured":"Zhu K, Guo H, Zhang S, Wang Y, Liu J, Wang J, Tang M (2023) Aaformer: Auto-aligned transformer for person re-identification. IEEE Trans Neural Netw Learn Syst 35(12):17307\u201317317","DOI":"10.1109\/TNNLS.2023.3301856"},{"key":"746_CR25","unstructured":"Lavi B, Ullah I, Fatan M, Rocha A (2020)\u00a0Survey on reliable deep learning-based person re-identification models: Are we there yet? arXiv preprint arXiv:2005.00355. https:\/\/arxiv.org\/abs\/2005.00355"},{"key":"746_CR26","doi-asserted-by":"publisher","first-page":"104030","DOI":"10.1016\/j.cviu.2024.104030","volume":"244","author":"Y Wang","year":"2024","unstructured":"Wang Y, Zhang P, Wang D, Lu H (2024) Other tokens matter: Exploring global and local features of vision transformers for object re-identification. Comp Vision Image Underst 244:104030","journal-title":"Comp Vision Image Underst"},{"key":"746_CR27","doi-asserted-by":"publisher","unstructured":"Dai Y, Gieseke F, Oehmcke S, Wu Y, Barnard K (2021) Attentional feature fusion. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision (WACV), Waikoloa, pp 3560\u20133569. https:\/\/doi.org\/10.1109\/WACV48630.2021.00360","DOI":"10.1109\/WACV48630.2021.00360"},{"key":"746_CR28","doi-asserted-by":"publisher","first-page":"104921","DOI":"10.1016\/j.imavis.2024.104921","volume":"143","author":"X Zhuang","year":"2024","unstructured":"Zhuang X, Wei D, Liang D, Jiang L (2024) Feature attention fusion network for occluded person re-identification. Image Vis Comput 143:104921","journal-title":"Image Vis Comput"},{"key":"746_CR29","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.neucom.2022.04.043","volume":"492","author":"H Saribas","year":"2022","unstructured":"Saribas H, Cevikalp H, K\u00f6p\u00fckl\u00fc O, Uzun B (2022) Trat: Tracking by attention using spatio-temporal features. Neurocomputing 492:150\u2013161","journal-title":"Neurocomputing"},{"key":"746_CR30","doi-asserted-by":"publisher","unstructured":"Zheng Z, Yang X, Yu Z, Zheng L, Yang Y, Kautz J (2019) Joint discriminative and generative learning for person re-identification. In: proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp 2138\u20132147. https:\/\/doi.org\/10.1109\/CVPR.2019.00224","DOI":"10.1109\/CVPR.2019.00224"},{"issue":"9","key":"746_CR31","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.1109\/TMM.2019.2957928","volume":"22","author":"F Yang","year":"2019","unstructured":"Yang F, Zhong Z, Luo Z, Lian S, Li S (2019) Leveraging virtual and real person for unsupervised person re-identification. IEEE Trans Multimedia 22(9):2444\u20132453","journal-title":"IEEE Trans Multimedia"},{"key":"746_CR32","doi-asserted-by":"publisher","unstructured":"Chen H, Wang Y, Lagadec B, Dantcheva A, Bremond F (2021) Joint generative and contrastive learning for unsupervised person re-identification. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR), 2021, virtual, pp 2004\u20132013. https:\/\/doi.org\/10.1109\/CVPR46437.2021.00204","DOI":"10.1109\/CVPR46437.2021.00204"},{"key":"746_CR33","doi-asserted-by":"crossref","unstructured":"Khaldi K, Nguyen VD, Mantini P, Shah S (2024) Unsupervised person re-identification in aerial imagery. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. pp 260\u2013269","DOI":"10.1109\/WACVW60836.2024.00034"},{"key":"746_CR34","doi-asserted-by":"publisher","unstructured":"Li H, Ye M, Zhang M, Du B (2024) All in one framework for multimodal re-identification in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, pp 17459\u201317469. https:\/\/doi.org\/10.1109\/CVPR52733.2024.01653","DOI":"10.1109\/CVPR52733.2024.01653"},{"key":"746_CR35","doi-asserted-by":"crossref","unstructured":"Sun W, Jiang X, Dou S, Li D, Miao D, Deng C, Zhao C (2023) Invisible backdoor attack with dynamic triggers against person re-identification. IEEE Trans Inf Forensic Security 19:307-319.","DOI":"10.1109\/TIFS.2023.3322659"},{"key":"746_CR36","doi-asserted-by":"publisher","unstructured":"Kansal K, Wong Y, Kankanhalli M (2024) Privacy-Enhancing Person Re-identification Framework \u2013 A Dual-Stage Approach. 2024 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV). Waikoloa, 2024, pp. 8528\u20138537. https:\/\/doi.org\/10.1109\/WACV57701.2024.00835","DOI":"10.1109\/WACV57701.2024.00835"},{"key":"746_CR37","doi-asserted-by":"publisher","first-page":"107818","DOI":"10.1016\/j.compeleceng.2022.107818","volume":"99","author":"FA KhoKhar","year":"2022","unstructured":"KhoKhar FA, Shah JH, Khan MA, Sharif M, Tariq U, Kadry S (2022) A review on federated learning towards image processing. Comput Electr Eng 99:107818","journal-title":"Comput Electr Eng"},{"key":"746_CR38","doi-asserted-by":"publisher","first-page":"104468","DOI":"10.1016\/j.engappai.2021.104468","volume":"106","author":"A Blanco-Justicia","year":"2021","unstructured":"Blanco-Justicia A, Domingo-Ferrer J, Mart\u00ednez S, S\u00e1nchez D, Flanagan A, Tan KE (2021) Achieving security and privacy in federated learning systems: Survey, research challenges and future directions. Eng Appl Artif Intell 106:104468","journal-title":"Eng Appl Artif Intell"},{"key":"746_CR39","doi-asserted-by":"publisher","first-page":"106854","DOI":"10.1016\/j.cie.2020.106854","volume":"149","author":"L Li","year":"2020","unstructured":"Li L, Fan Y, Tse M, Lin KY (2020) A review of applications in federated learning. Comput Ind Eng 149:106854","journal-title":"Comput Ind Eng"},{"key":"746_CR40","unstructured":"Himeur Y, Varlamis I, Kheddar H, Amira A, Atalla S, Singh Y, Mansoor W (2023)\u00a0Federated learning for computer vision. arXiv preprint arXiv:2308.13558. https:\/\/arxiv.org\/abs\/2308.13558"},{"key":"746_CR41","doi-asserted-by":"crossref","unstructured":"Pham QV, Dev K, Maddikunta PKR, Gadekallu TR, Huynh-The T, et\u00a0al (2022) Fusion of federated learning and industrial internet of things: A survey. Computer Networks 212:109048","DOI":"10.1016\/j.comnet.2022.109048"},{"issue":"7","key":"746_CR42","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3390\/drones7070413","volume":"7","author":"C Dong","year":"2023","unstructured":"Dong C, Zhou J, An Q, Jiang F, Chen S, Pan L, Liu X (2023) Optimizing performance in federated person re-identification through benchmark evaluation for blockchain-integrated smart uav delivery systems. Drones 7(7):413","journal-title":"Drones"},{"key":"746_CR43","doi-asserted-by":"publisher","unstructured":"Ji S, Tan Y, Saravirta T, Yang Z, Liu Y, Vasankari L, Pan S, Long G, Walid A (2024) Emerging trends in federated learning: From model fusion to federated x learning. Int J Mach Learn Cyber 15:3769\u20133790. https:\/\/doi.org\/10.1007\/s13042-024-02119-1","DOI":"10.1007\/s13042-024-02119-1"},{"issue":"1s","key":"746_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3531013","volume":"19","author":"W Zhuang","year":"2023","unstructured":"Zhuang W, Gan X, Wen Y, Zhang S (2023) Optimizing performance of federated person re-identification: Benchmarking and analysis. ACM Trans Multimedia Comput Commun Appl 19(1s):1\u201318","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"746_CR45","doi-asserted-by":"publisher","unstructured":"Zhuang W, Wen Y, Zhang X, Gan X, Yin D, Zhou D, Zhang S, Yi S (2020) Performance optimization of federated person re-identification via benchmark analysis. In: Proceedings of the 28th ACM International Conference on Multimedia, Virtual Event, Seattle, pp 955\u2013963. https:\/\/doi.org\/10.1145\/3394171.3413814","DOI":"10.1145\/3394171.3413814"},{"key":"746_CR46","doi-asserted-by":"crossref","unstructured":"Weng J, Hu K, Yao T, Wang J, Wang Z (2022) Robust knowledge adaptation for federated unsupervised person reid. In: 2022 International Conference on Digital Image Computing: Techniques and Applications (DICTA).\u00a0IEEE, Sydney, pp 1\u20138","DOI":"10.1109\/DICTA56598.2022.10034631"},{"key":"746_CR47","unstructured":"Li Y, Wang X, Zeng R, Donta PK, Murturi I, Huang M, Dustdar S (2023)\u00a0Federated domain generalization: A survey. arXiv preprint arXiv:2306.01334. https:\/\/arxiv.org\/abs\/2306.01334"},{"key":"746_CR48","doi-asserted-by":"crossref","unstructured":"Zhang C, Liu X, Xiang M, Yao A, Fan X, Li G (2023) Fed4reid: Federated learning with data augmentation for person re-identification service in edge computing. In: 2023 IEEE International Conference on Web Services (ICWS). IEEE, Chicago,\u00a0pp 64\u201370","DOI":"10.1109\/ICWS60048.2023.00021"},{"key":"746_CR49","doi-asserted-by":"publisher","unstructured":"Yang F, Zhong Z, Luo Z, He Y, Li S, Sebe N (2024) Diversity-authenticity co-constrained stylization for federated domain generalization in person re-identification.\u00a0In: Proceedings of the AAAI Conference on Artificial Intelligence, vol 38. AAAI Press, Vancouver, pp 6477\u20136485. https:\/\/doi.org\/10.1609\/aaai.v38i6.28468","DOI":"10.1609\/aaai.v38i6.28468"},{"key":"746_CR50","doi-asserted-by":"publisher","first-page":"103969","DOI":"10.1016\/j.cviu.2024.103969","volume":"241","author":"F Liu","year":"2024","unstructured":"Liu F, Ye M, Du B (2024) Domain generalized federated learning for person re-identification. Comput Vis Image Underst 241:103969","journal-title":"Comput Vis Image Underst"},{"key":"746_CR51","unstructured":"Yang F, Zhong Z, Luo Z, Li S, Sebe N (2022)\u00a0Federated and generalized person re-identification through domain and feature hallucinating. arXiv preprint arXiv:2203.02689. https:\/\/arxiv.org\/abs\/2203.02689"},{"key":"746_CR52","unstructured":"Zhou T, Konukoglu E (2023) Fedfa: Federated feature augmentation. In: The Eleventh International Conference on Learning Representations, Kigali. https:\/\/openreview.net\/pdf?id=U9yFP90jU0"},{"key":"746_CR53","doi-asserted-by":"publisher","unstructured":"Tang B, Xu X, Dai F, Wang S (2023) Person re-identification withmodel-contrastive federated learning in edge-cloud environment. Intell Autom Soft Comput 38(1):35\u201355. https:\/\/doi.org\/10.32604\/iasc.2023.036715","DOI":"10.32604\/iasc.2023.036715"},{"issue":"1","key":"746_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.31577\/cai_2024_1_1","volume":"43","author":"L Chen","year":"2024","unstructured":"Chen L, Zhang W, Dong C, Huang Z, Nie Y, Hou Z, Qiao S, Tan CW (2024) Feddrl: Trustworthy federated learning model fusion method based on staged reinforcement learning. Comput Inform 43(1):1\u201337","journal-title":"Comput Inform"},{"key":"746_CR55","unstructured":"Ghari PM, Shen Y (2024)\u00a0Budgeted online model selection and fine-tuning via federated learning. arXiv preprint arXiv:2401.10478. https:\/\/arxiv.org\/abs\/2401.10478"},{"key":"746_CR56","doi-asserted-by":"crossref","unstructured":"Abbasi A, Dong F, Wang X, Leung H, Zhou J, Drew S (2024) Fedgreen: Carbon-aware federated learning with model size adaptation. IEEE International Conference on Communication Workshops (ICC Workshops), Denver, pp. 1352\u20131358","DOI":"10.1109\/ICCWorkshops59551.2024.10615720"},{"issue":"19","key":"746_CR57","doi-asserted-by":"publisher","first-page":"7244","DOI":"10.3390\/s22197244","volume":"22","author":"R Sun","year":"2022","unstructured":"Sun R, Li Y, Shah T, Sham RW, Szydlo T, Qian B, Thakker D, Ranjan R (2022) Fedmsa: a model selection and adaptation system for federated learning. Sensors 22(19):7244","journal-title":"Sensors"},{"key":"746_CR58","doi-asserted-by":"publisher","unstructured":"Ilhan F, Su G, Liu L (2023) Scalefl: Resource-adaptive federated learning with heterogeneous clients. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. IEEE CVPR, Vancouver, pp 24532\u201324541. https:\/\/doi.org\/10.1109\/CVPR52729.2023.02350","DOI":"10.1109\/CVPR52729.2023.02350"},{"key":"746_CR59","doi-asserted-by":"publisher","unstructured":"Quentin P, Swan S, Hugo W, L\u00e9o R, Siba H, Antoun Y (2023) Balancing accuracy and training time in federated learning for violence detection in surveillance videos: A study of neural network architectures.\u00a0J Comput Sci Technol 39:1029-1039.\u00a0https:\/\/doi.org\/10.1007\/s11390-024-3702-7","DOI":"10.1007\/s11390-024-3702-7"},{"key":"746_CR60","doi-asserted-by":"publisher","unstructured":"Liu Y, Huang A, Luo Y, Huang H, Liu Y, Chen Y, Feng L, Chen T, Yu H, Yang Q (2020) Fedvision: An online visual object detection platform powered by federated learning.\u00a0In: Proceedings of the AAAI conference on artificial intelligence, EAAI 2020, vol 34. AAAI Press, New York, pp 13172\u201313179. https:\/\/doi.org\/10.1609\/aaai.v34i08.7021","DOI":"10.1609\/aaai.v34i08.7021"},{"issue":"1","key":"746_CR61","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1186\/s13677-024-00614-y","volume":"13","author":"M Shaheen","year":"2024","unstructured":"Shaheen M, Farooq MS, Umer T (2024) Ai-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost. J Cloud Comput 13(1):52","journal-title":"J Cloud Comput"},{"issue":"1","key":"746_CR62","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1186\/s13677-023-00535-2","volume":"12","author":"W Gu","year":"2023","unstructured":"Gu W, Zhang Y (2023) Fedeem: a fairness-based asynchronous federated learning mechanism. J Cloud Comput 12(1):154","journal-title":"J Cloud Comput"},{"key":"746_CR63","doi-asserted-by":"publisher","unstructured":"Emara S, Liu D, Wang F, Li B (2024) Cascade: Enhancing reinforcement learning with curriculum federated learning and interference avoidance-a case study in adaptive bitrate selection. IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Vancouver, pp. 01-06. https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS61880.2024.10620892","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620892"},{"key":"746_CR64","doi-asserted-by":"publisher","unstructured":"Chen W, Zhou X (2021) Ucbfed: Using reinforcement learning method to tackle the federated optimization problem. In: IFIP International Conference on Distributed Applications and Interoperable Systems, vol 12718. Springer, Cham, pp 99\u2013105. https:\/\/doi.org\/10.1007\/978-3-030-78198-9_7","DOI":"10.1007\/978-3-030-78198-9_7"},{"key":"746_CR65","unstructured":"Sutton RS (2018) Reinforcement learning: an introduction. A Bradford Book. Cambridge, 262039249."},{"issue":"1","key":"746_CR66","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1186\/s13677-023-00553-0","volume":"12","author":"Z Wang","year":"2023","unstructured":"Wang Z, Chen S, Bai L, Gao J, Tao J, Bond RR, Mulvenna MD (2023) Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing. J Cloud Comput 12(1):174","journal-title":"J Cloud Comput"},{"issue":"1","key":"746_CR67","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1186\/s13677-023-00515-6","volume":"12","author":"D Zhang","year":"2023","unstructured":"Zhang D, Sun W, Zheng ZA, Chen W, He S (2023) Adaptive device sampling and deadline determination for cloud-based heterogeneous federated learning. J Cloud Comput 12(1):153","journal-title":"J Cloud Comput"},{"key":"746_CR68","doi-asserted-by":"publisher","unstructured":"Nagalapatti L, Mittal RS, Narayanam R (2022) Is your data relevant? Dynamic selection of relevant data for federated learning. In: Proceedings of the AAAI Conference on Artificial Intelligence,\u00a0vol 36. EAAI 2022 Virtual Event, AAAI Press, pp 7859\u20137867. https:\/\/doi.org\/10.1609\/aaai.v36i7.20755","DOI":"10.1609\/aaai.v36i7.20755"},{"issue":"8","key":"746_CR69","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.3390\/math12081148","volume":"12","author":"P Xie","year":"2024","unstructured":"Xie P, Gao X, Li F, Xing L, Zhang Y, Sun H (2024) Communication-efficient zeroth-order adaptive optimization for federated learning. Mathematics 12(8):1148","journal-title":"Mathematics"},{"key":"746_CR70","doi-asserted-by":"crossref","unstructured":"Venkatesha Y, Kundu S, Panda P (2024)\u00a0Assortment of attention heads: Accelerating federated PEFT with head pruning and strategic client selection. SSRN Electronic Journal. https:\/\/ssrn.com\/abstract=4790569","DOI":"10.2139\/ssrn.4790569"},{"key":"746_CR71","doi-asserted-by":"publisher","first-page":"100793","DOI":"10.1016\/j.iot.2023.100793","volume":"22","author":"S Girija","year":"2023","unstructured":"Girija S, Baker T, Ahmed N, Khedr AM, Al Aghbari Z, Jha A, Sobolev K, Asl SA, Phan AH (2023) Attribute recognition for person re-identification using federated learning at all-in-edge. Internet Things 22:100793","journal-title":"Internet Things"},{"key":"746_CR72","doi-asserted-by":"publisher","unstructured":"Chen L, Zhao D, Tao L, Wang K, Qiao S, Zeng X, Tan CW (2024) A credible and fair federated learning framework based on blockchain. IEEE Trans Artif Intell 6(2):301\u2013316. https:\/\/doi.org\/10.1109\/TAI.2024.3355362","DOI":"10.1109\/TAI.2024.3355362"},{"issue":"2","key":"746_CR73","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1109\/TCSVT.2023.3281983","volume":"35","author":"L Zhang","year":"2023","unstructured":"Zhang L, Gao G, Zhang H (2023) Spatial-temporal federated learning for lifelong person re-identification on distributed edges. IEEE Trans Circ Syst Video Technol 35(2):1884\u20131896. https:\/\/doi.org\/10.1109\/TCSVT.2023.3281983","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"746_CR74","doi-asserted-by":"publisher","unstructured":"Zhuang W, Wen Y, Zhang S (2021) Joint optimization in edge-cloud continuum for federated unsupervised person re-identification. In: Proceedings of the 29th ACM International Conference on Multimedia, China. pp 433\u2013441. https:\/\/doi.org\/10.1145\/3474085.3475182","DOI":"10.1145\/3474085.3475182"},{"key":"746_CR75","doi-asserted-by":"publisher","unstructured":"Wu G, Gong S (2021) Decentralised learning from independent multi-domain labels for person re-identification. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol\u00a035.\u00a0AAAI Press, pp 2898\u20132906. https:\/\/doi.org\/10.1609\/aaai.v35i4.16396","DOI":"10.1609\/aaai.v35i4.16396"},{"key":"746_CR76","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"746_CR77","doi-asserted-by":"publisher","unstructured":"Liu Z, Mao H, Wu CY, Feichtenhofer C, Darrell T, Xie S (2022) A convnet for the 2020s. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern\u00a0recognition. IEEE CVPR, New Orleans, pp 11976\u201311986.\u00a0https:\/\/doi.org\/10.1109\/CVPR52688.2022.01167","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"746_CR78","unstructured":"Mao A, Mohri M, Zhong Y (2023) Cross-entropy loss functions: Theoretical analysis and applications. In: International conference on Machine learning. PMLR, Honolulu, pp 23803\u201323828"},{"key":"746_CR79","doi-asserted-by":"publisher","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern\u00a0recognition. IEEE Computer Society, Boston, pp 815\u2013823.\u00a0https:\/\/doi.org\/10.1109\/CVPR.2015.7298682","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"746_CR80","doi-asserted-by":"crossref","unstructured":"Kryszkiewicz M (2014) The cosine similarity in terms of the euclidean distance. In: Encyclopedia of Business Analytics and Optimization. vol. IV. IGI Global, pp 2498\u20132508","DOI":"10.4018\/978-1-4666-5202-6.ch223"},{"key":"746_CR81","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1106\u20131114"},{"key":"746_CR82","doi-asserted-by":"crossref","unstructured":"Cheng DS, Cristani M, Stoppa M, Bazzani L, Murino V, et\u00a0al (2011) Custom pictorial structures for re-identification. In: Bmvc, vol\u00a01. Citeseer,\u00a0Dundee,\u00a0p\u00a06","DOI":"10.5244\/C.25.68"},{"key":"746_CR83","doi-asserted-by":"crossref","unstructured":"Wang T, Gong S, Zhu X, Wang S (2014) Person re-identification by video ranking. In: Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part IV 13. Springer, Berlin, pp 688\u2013703","DOI":"10.1007\/978-3-319-10593-2_45"},{"key":"746_CR84","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s11263-010-0347-5","volume":"90","author":"CC Loy","year":"2010","unstructured":"Loy CC, Xiang T, Gong S (2010) Time-delayed correlation analysis for multi-camera activity understanding. Int J Comput Vis 90:106\u2013129","journal-title":"Int J Comput Vis"},{"key":"746_CR85","doi-asserted-by":"crossref","unstructured":"Li W, Zhao R, Wang X (2013) Human reidentification with transferred metric learning. In: Computer Vision\u2013ACCV 2012: 11th Asian Conference on Computer Vision, Daejeon, Korea, November 5-9, 2012, Revised Selected Papers, Part I 11. Springer, Berlin, pp 31\u201344","DOI":"10.1007\/978-3-642-37331-2_3"},{"key":"746_CR86","doi-asserted-by":"publisher","unstructured":"Li W, Wang X (2013) Locally aligned feature transforms across views. In: Proceedings of the IEEE conference on computer vision and pattern recognition, IEEE Computer Society, Portland, pp 3594\u20133601. https:\/\/doi.org\/10.1109\/CVPR.2013.461","DOI":"10.1109\/CVPR.2013.461"},{"key":"746_CR87","doi-asserted-by":"publisher","unstructured":"Li W, Zhao R, Xiao T, Wang X (2014) Deepreid: Deep filter pairing neural network for person re-identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition. IEEE Computer Society, Columbus, pp 152\u2013159. https:\/\/doi.org\/10.1109\/CVPR.2014.27","DOI":"10.1109\/CVPR.2014.27"},{"key":"746_CR88","doi-asserted-by":"crossref","unstructured":"Hirzer M, Beleznai C, Roth PM, Bischof H (2011) Person re-identification by descriptive and discriminative classification. In: Image Analysis: 17th Scandinavian Conference, SCIA 2011, Ystad, Sweden, May 2011. Proceedings 17. Springer, Berlin, pp 91\u2013102","DOI":"10.1007\/978-3-642-21227-7_9"},{"key":"746_CR89","doi-asserted-by":"crossref","unstructured":"Gray D, Tao H (2008) Viewpoint invariant pedestrian recognition with an ensemble of localized features. In: Computer Vision\u2013ECCV 2008: 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part I 10. Springer, Berlin, pp 262\u2013275","DOI":"10.1007\/978-3-540-88682-2_21"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00746-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00746-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00746-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T12:58:06Z","timestamp":1746536286000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-025-00746-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,6]]},"references-count":89,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["746"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00746-9","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,6]]},"assertion":[{"value":"15 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"24"}}