Skip Content
You are currently on the new version of our website. Access the old version .

Journal of Sensor and Actuator Networks, Volume 12, Issue 1

2023 February - 18 articles

Cover Story: Federated learning (FL), a potential machine learning paradigm, is designed to ensure user data privacy while training the model. However, the original FL is still vulnerable to many kinds of attacks, such as gradient leaking issues in membership inference attacks, which will significantly hinder the landing application of FL. Therefore, designing a trustworthy federation learning (TFL) is essential to eliminate users’ anxiety. We aim to provide a well-researched picture of the security and privacy issues in FL that can bridge the gap to TFL. Thus, this paper summarizes the challenges and critical technologies to build TFL. We also point out promising research directions for realizing the TFL that deserve attention in the future. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (18)

  • Editorial
  • Open Access
8 Citations
4,323 Views
3 Pages

Cyber-Physical Systems: Security Threats and Countermeasures

  • Mohammad Hammoudeh,
  • Gregory Epiphaniou and
  • Pedro Pinto

The recent proliferation of sensors and actuators, which is related to the Internet of Things (IoT), provide smart living to the general public in many data-critical areas, from homes and healthcare to power grids and transport [...]

  • Article
  • Open Access
5 Citations
2,546 Views
19 Pages

Device-to-device (D2D) communication will play a meaningful role in future wireless networks and standards, since it ensures ultra-low latency for communication among near devices. D2D transmissions can take place together with the actual cellular co...

  • Article
  • Open Access
4 Citations
2,810 Views
18 Pages

One of the challenges in securing wireless sensor networks (WSNs) is the key distribution; that is, a single shared key must first be known to a pair of communicating nodes before they can proceed with the secure encryption and decryption of the data...

  • Article
  • Open Access
4 Citations
4,198 Views
30 Pages

In decentralized environments, such as mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs), traditional reputation management systems are not viable due to their dependence on a central authority that is both accessible and trustworth...

  • Article
  • Open Access
15 Citations
6,517 Views
18 Pages

Building Trusted Federated Learning: Key Technologies and Challenges

  • Depeng Chen,
  • Xiao Jiang,
  • Hong Zhong and
  • Jie Cui

Federated learning (FL) provides convenience for cross-domain machine learning applications and has been widely studied. However, the original FL is still vulnerable to poisoning and inference attacks, which will hinder the landing application of FL....

  • Article
  • Open Access
10 Citations
7,905 Views
20 Pages

Currently, many governments are gearing up to promote the development of smart cities in their countries. A smart city is an urban area using different types of sensors to collect data, which will then be used to manage assets and resources efficient...

  • Article
  • Open Access
3 Citations
4,782 Views
35 Pages

This work solves the problem of identification of the machine code architecture in cyberphysical devices. A basic systematization of the Executable and Linkable Format and Portable Executable formats of programs, as well as the analysis mechanisms us...

  • Article
  • Open Access
8 Citations
3,273 Views
16 Pages

An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things

  • Tahir Ali Shah,
  • Insaf Ullah,
  • Muhammad Asghar Khan,
  • Pascal Lorenz and
  • Nisreen Innab

As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcome...

  • Article
  • Open Access
7 Citations
5,045 Views
17 Pages

Loitering Detection Using Spatial-Temporal Information for Intelligent Surveillance Systems on a Vision Sensor

  • Wahyono,
  • Agus Harjoko,
  • Andi Dharmawan,
  • Faisal Dharma Adhinata,
  • Gamma Kosala and
  • Kang-Hyun Jo

As one of the essential modules in intelligent surveillance systems, loitering detection plays an important role in reducing theft incidents by analyzing human behavior. This paper introduces a novel strategy for detecting the loitering activities of...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708