With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge...With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.展开更多
This study investigated the role of intentional self-regulation and the moderating role of peer relationship in the relationship between teacher-student relationship and learning engagement.The study sample comprised ...This study investigated the role of intentional self-regulation and the moderating role of peer relationship in the relationship between teacher-student relationship and learning engagement.The study sample comprised 540 Chinese senior secondary school students between the ages of 15–18(51.67%boys;Mage=16.56 years;SDage=0.90).They completed surveys on the Teacher-Student Relationship Scale,the Selection,Optimization,and Compensation(SOC)Scale,the Peer Relationship Scale for Children and Adolescents,and the Learning Engagement Scale.The results following regression analysis showed that teacher-student relationship predicted higher learning engagement among senior secondary school students.Intentional self-regulation partially mediated the link between teacher-student relationship and learning engagement for higher learning engagement.Peer relationship moderated the relationships between teacher-student relationship and learning engagement and moderated the relationship between teacher-student relationship and intentional self-regulation for higher learning engagement.Thesefindings imply learning engagement can be enhanced by optimizing teacher-student relationship and strengthening intentional self-regulation interventions.展开更多
The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Syst...The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Systems(IDS)often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems.To address these challenges,we propose an innovative privacy-preserving approach leveraging Federated Learning(FL)for distributed intrusion detection.Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates,ensuring enhanced privacy and scalability without compromising detection accuracy.Key innovations of this research include the integration of advanced deep learning techniques for real-time threat detection with minimal latency and a novel model to fortify the system’s resilience against diverse cyber-attacks such as Distributed Denial of Service(DDoS)and malware injections.Our evaluation on three benchmark IoT datasets demonstrates significant improvements:achieving 92.78%accuracy on NSL-KDD,91.47%on BoT-IoT,and 92.05%on UNSW-NB15.The precision,recall,and F1-scores for all datasets consistently exceed 91%.Furthermore,the communication overhead was reduced to 85 MB for NSL-KDD,105 MB for BoT-IoT,and 95 MB for UNSW-NB15—substantially lower than traditional centralized IDS approaches.This study contributes to the domain by presenting a scalable,secure,and privacy-preserving solution tailored to the unique characteristics of IoT environments.The proposed framework is adaptable to dynamic and heterogeneous settings,with potential applications extending to other privacy-sensitive domains.Future work will focus on enhancing the system’s efficiency and addressing emerging challenges such as model poisoning attacks in federated environments.展开更多
The Tactile Internet of Things(TIoT)promises transformative applications—ranging from remote surgery to industrial robotics—by incorporating haptic feedback into traditional IoT systems.Yet TIoT’s stringent require...The Tactile Internet of Things(TIoT)promises transformative applications—ranging from remote surgery to industrial robotics—by incorporating haptic feedback into traditional IoT systems.Yet TIoT’s stringent requirements for ultra-low latency,high reliability,and robust privacy present significant challenges.Conventional centralized Federated Learning(FL)architectures struggle with latency and privacy constraints,while fully distributed FL(DFL)faces scalability and non-IID data issues as client populations expand and datasets become increasingly heterogeneous.To address these limitations,we propose a Clustered Distributed Federated Learning(CDFL)architecture tailored for a 6G-enabled TIoT environment.Clients are grouped into clusters based on data similarity and/or geographical proximity,enabling local intra-cluster aggregation before inter-cluster model sharing.This hierarchical,peer-to-peer approach reduces communication overhead,mitigates non-IID effects,and eliminates single points of failure.By offloading aggregation to the network edge and leveraging dynamic clustering,CDFL enhances both computational and communication efficiency.Extensive analysis and simulation demonstrate that CDFL outperforms both centralized FL and DFL as the number of clients grows.Specifically,CDFL demonstrates up to a 30%reduction in training time under highly heterogeneous data distributions,indicating faster convergence.It also reduces communication overhead by approximately 40%compared to DFL.These improvements and enhanced network performance metrics highlight CDFL’s effectiveness for practical TIoT deployments.These results validate CDFL as a scalable,privacy-preserving solution for next-generation TIoT applications.展开更多
In Internet of Vehicles,VehicleInfrastructure-Cloud cooperation supports diverse intelligent driving and intelligent transportation applications.Federated Learning(FL)is the emerging computation paradigm to provide ef...In Internet of Vehicles,VehicleInfrastructure-Cloud cooperation supports diverse intelligent driving and intelligent transportation applications.Federated Learning(FL)is the emerging computation paradigm to provide efficient and privacypreserving collaborative learning.However,in Io V environment,federated learning faces the challenges introduced by high mobility of vehicles and nonIndependently Identically Distribution(non-IID)of data.High mobility causes FL clients quit and the communication offline.The non-IID data leads to slow and unstable convergence of global model and single global model's weak adaptability to clients with different localization characteristics.Accordingly,this paper proposes a personalized aggregation strategy for hierarchical Federated Learning in Io V environment,including Fed SA(Special Asynchronous Federated Learning with Self-adaptive Aggregation)for low-level FL between a Road Side Unit(RSU)and the vehicles within its coverage,and Fed Att(Federated Learning with Attention Mechanism)for high-level FL between a cloud server and multiple RSUs.Agents self-adaptively obtain model aggregation weight based on Advantage Actor-Critic(A2C)algorithm.Experiments show the proposed strategy encourages vehicles to participate in global aggregation,and outperforms existing methods in training performance.展开更多
With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connectio...With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives.展开更多
The Internet of Unmanned Aerial Vehicles(I-UAVs)is expected to execute latency-sensitive tasks,but limited by co-channel interference and malicious jamming.In the face of unknown prior environmental knowledge,defendin...The Internet of Unmanned Aerial Vehicles(I-UAVs)is expected to execute latency-sensitive tasks,but limited by co-channel interference and malicious jamming.In the face of unknown prior environmental knowledge,defending against jamming and interference through spectrum allocation becomes challenging,especially when each UAV pair makes decisions independently.In this paper,we propose a cooperative multi-agent reinforcement learning(MARL)-based anti-jamming framework for I-UAVs,enabling UAV pairs to learn their own policies cooperatively.Specifically,we first model the problem as a modelfree multi-agent Markov decision process(MAMDP)to maximize the long-term expected system throughput.Then,for improving the exploration of the optimal policy,we resort to optimizing a MARL objective function with a mutual-information(MI)regularizer between states and actions,which can dynamically assign the probability for actions frequently used by the optimal policy.Next,through sharing their current channel selections and local learning experience(their soft Q-values),the UAV pairs can learn their own policies cooperatively relying on only preceding observed information and predicting others’actions.Our simulation results show that for both sweep jamming and Markov jamming patterns,the proposed scheme outperforms the benchmarkers in terms of throughput,convergence and stability for different numbers of jammers,channels and UAV pairs.展开更多
Efficient resource management within Internet of Things(IoT)environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities.This study introduces a neural network-ba...Efficient resource management within Internet of Things(IoT)environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities.This study introduces a neural network-based model that uses Long-Short-Term Memory(LSTM)to optimize resource allocation under dynam-ically changing conditions.Designed to monitor the workload on individual IoT nodes,the model incorporates long-term data dependencies,enabling adaptive resource distribution in real time.The training process utilizes Min-Max normalization and grid search for hyperparameter tuning,ensuring high resource utilization and consistent performance.The simulation results demonstrate the effectiveness of the proposed method,outperforming the state-of-the-art approaches,including Dynamic and Efficient Enhanced Load-Balancing(DEELB),Optimized Scheduling and Collaborative Active Resource-management(OSCAR),Convolutional Neural Network with Monarch Butterfly Optimization(CNN-MBO),and Autonomic Workload Prediction and Resource Allocation for Fog(AWPR-FOG).For example,in scenarios with low system utilization,the model achieved a resource utilization efficiency of 95%while maintaining a latency of just 15 ms,significantly exceeding the performance of comparative methods.展开更多
Background:With the global popularity of short videos,particularly among young people,short video addiction has become a worrying phenomenon that poses significant risks to individual health and adaptability.Self-regu...Background:With the global popularity of short videos,particularly among young people,short video addiction has become a worrying phenomenon that poses significant risks to individual health and adaptability.Self-regulated learning(SRL)strategies are key factors in predicting learning outcomes.This study,based on the SRL theory,uses short video addiction as the independent variable,SRL strategies as the mediating variable,and learning well-being as the outcome variable,aiming to reveal the relationships among short video addiction,self-regulated learning,and learning well-being among Chinese college students.Methods:Using a cross-sectional study design and applying the snowball sampling technique,an online survey was administered to Chinese undergraduate students.A total of 706 valid questionnaires were collected,with an effective response rate of 85.7%.The average age of the participants was 20.5 years.Results:The results of structural equation modeling indicate that 7 hypotheses were supported.Short video addiction was negatively correlated with self-regulated learning strategies(preparatory,performance,and appraisal strategy),while SRL strategies were positively correlated with learning well-being.Additionally,short video addiction had a mediating effect on learning well-being through the three types of SRL strategies.The three types of SRL strategies explained 39%of the variance in learning well-being.Conclusion:Previous research has typically focused on the impact of self-regulated learning strategies on media addiction or problematic media use.This study,based on the SRL model,highlights the negative issues caused by short video addiction and emphasizes the importance of cultivating self-regulation abilities and media literacy.Short video addiction stems from failures in trait self-regulation,which naturally impairs the ability to effectively engage in self-regulation during the learning process.This study confirms and underscores that the SRL model can serve as an effective theoretical framework for helping students prevent short video addiction,engage in high-quality learning,and consequently enhance their learning well-being.展开更多
This study explored the nature and use of technology-based self-regulated learning(SRL)strategies among the Chinese university students.A total of 20 undergraduate students in China's Mainland were invited to part...This study explored the nature and use of technology-based self-regulated learning(SRL)strategies among the Chinese university students.A total of 20 undergraduate students in China's Mainland were invited to participate in a focus group interview.The students reported using four types of technology-based SRL strategies including cognitive,meta-cognitive,social behavioral,and motivational regulation strategies.Among the strategies,technology-based vocabulary learning was reported to be a dominant strategy by the students.This study opens a new window to understanding how English as a foreign language(EFL)students utilize different strategies to learn English in technology-based learning context.展开更多
Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead...Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations.展开更多
High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency...High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.展开更多
To provide diversified services in the intelligent transportation systems,smart vehicles will generate unprecedented amounts of data every day.Due to data security and user privacy issues,Federated Learning(FL)is cons...To provide diversified services in the intelligent transportation systems,smart vehicles will generate unprecedented amounts of data every day.Due to data security and user privacy issues,Federated Learning(FL)is considered a potential solution to ensure privacy-preserving in data sharing.However,there are still many challenges to applying the traditional synchronous FL directly in the Internet of Vehicles(Io V),such as unreliable communications and malicious attacks.In this paper,we propose a Directed Acyclic Graph(DAG)based Swarm Learning(DSL),which integrates edge computing,FL,and blockchain technologies to provide secure data sharing and model training in Io Vs.To deal with the high mobility of vehicles,the dynamic vehicle association algorithm is introduced,which could optimize the connections between vehicles and road side units to improve the training efficiency.Moreover,to enhance the anti-attack property of the DSL algorithm,a malicious attack detection method is adopted,which could recognize malicious vehicles by the site confirmation rate.Furthermore,an accuracy-based reward mechanism is developed to promote vehicles to participate in the model training with honest behaviors.Finally,simulation results demonstrate that the proposed DSL algorithm could achieve better performance in terms of model accuracy,convergence rates and security compared with existing algorithms.展开更多
The purpose of this paper is to argue the effectiveness of self-regulated learning in English education in Chinese college classroom instruction. A study is given to show whether the introduction of self-regulated lea...The purpose of this paper is to argue the effectiveness of self-regulated learning in English education in Chinese college classroom instruction. A study is given to show whether the introduction of self-regulated learning can help improve Chinese college students' English learning, and help them perform better in the National English test-CET-4 (College English Test Level-4,).展开更多
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machin...Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machine learning applications in the Internet of Things(IoT).However,implementing FL across large-scale distributed fog networks presents significant challenges in maintaining privacy,preventing collusion attacks,and ensuring robust data aggregation.To address these challenges,we propose an Efficient Privacy-preserving and Robust Federated Learning(EPRFL)scheme for fog computing scenarios.Specifically,we first propose an efficient secure aggregation strategy based on the improved threshold homomorphic encryption algorithm,which is not only resistant to model inference and collusion attacks,but also robust to fog node dropping.Then,we design a dynamic gradient filtering method based on cosine similarity to further reduce the communication overhead.To minimize training delays,we develop a dynamic task scheduling strategy based on comprehensive score.Theoretical analysis demonstrates that EPRFL offers robust security and low latency.Extensive experimental results indicate that EPRFL outperforms similar strategies in terms of privacy preserving,model performance,and resource efficiency.展开更多
The rapid advancements in distributed generation technologies,the widespread adoption of distributed energy resources,and the integration of 5G technology have spurred sharing economy businesses within the electricity...The rapid advancements in distributed generation technologies,the widespread adoption of distributed energy resources,and the integration of 5G technology have spurred sharing economy businesses within the electricity sector.Revolutionary technologies such as blockchain,5G connectivity,and Internet of Things(IoT)devices have facilitated peer-to-peer distribution and real-time response to fluctuations in supply and demand.Nevertheless,sharing electricity within a smart community presents numerous challenges,including intricate design considerations,equitable allocation,and accurate forecasting due to the lack of well-organized temporal parameters.To address these challenges,this proposed system is focused on sharing extra electricity within the smart community.The working of the proposed system is composed of five main phases.In phase 1,we develop a model to forecast the energy consumption of the appliances using the Long Short-Term Memory(LSTM)integrated with the attention module.In phase 2,based on the predicted energy consumption,we designed a smart scheduler with attention-induced Genetic Algorithm(GA)to schedule the appliances to reduce energy consumption.In phase 3,a dynamic Feed-in Tariff(dFIT)algorithm makes real-time tariff adjustments using LSTM for demand prediction and SHapley Additive exPlanations(SHAP)values to improve model transparency.In phase 4,the energy saved from solar systems and smart scheduling is shared with the community grid.Finally,in phase 5,SDP security ensures the integrity and confidentiality of shared energy data.To evaluate the performance of energy sharing and scheduling for houses with and without solar support,we simulated the above phases using data obtained from the energy consumption of 17 household appliances in our IoT laboratory.Finally,the simulation results show that the proposed scheme reduces energy consumption and ensures secure and efficient distribution with peers,promoting a more sustainable energy management and resilient smart community.展开更多
The rapid advancement of technology has paved the way for innovative approaches to education.Artificial intelligence(AI),the Internet of Things(IoT),and cloud computing are three transformative technologies reshaping ...The rapid advancement of technology has paved the way for innovative approaches to education.Artificial intelligence(AI),the Internet of Things(IoT),and cloud computing are three transformative technologies reshaping how education is delivered,accessed,and experienced.These technologies enable personalized learning,optimize teaching processes,and make educational resources more accessible to learners worldwide.This paper examines the integration of these technologies into smart education systems,highlighting their applications,benefits,and challenges,and exploring their potential to bridge gaps in educational equity and inclusivity.展开更多
Federated Learning(FL)has become a popular training paradigm in recent years.However,stragglers are critical bottlenecks in an Internet of Things(IoT)network while training.These nodes produce stale updates to the ser...Federated Learning(FL)has become a popular training paradigm in recent years.However,stragglers are critical bottlenecks in an Internet of Things(IoT)network while training.These nodes produce stale updates to the server,which slow down the convergence.In this paper,we studied the impact of the stale updates on the global model,which is observed to be significant.To address this,we propose a weighted averaging scheme,FedStrag,that optimizes the training with stale updates.The work is focused on training a model in an IoT network that has multiple challenges,such as resource constraints,stragglers,network issues,device heterogeneity,etc.To this end,we developed a time-bounded asynchronous FL paradigm that can train a model on the continuous iflow of data in the edge-fog-cloud continuum.To test the FedStrag approach,a model is trained with multiple stragglers scenarios on both Independent and Identically Distributed(IID)and non-IID datasets on Raspberry Pis.The experiment results suggest that the FedStrag outperforms the baseline FedAvg in all possible cases.展开更多
The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital applications.With the development of IoT devices,huge amounts of information,including users’private...The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital applications.With the development of IoT devices,huge amounts of information,including users’private data,are generated.IoT systems face major security and data privacy challenges owing to their integral features such as scalability,resource constraints,and heterogeneity.These challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data,creating an attractive opportunity for cyberattacks.To address these challenges,artificial intelligence(AI)techniques,such as machine learning(ML)and deep learning(DL),are utilized to build an intrusion detection system(IDS)that helps to secure IoT systems.Federated learning(FL)is a decentralized technique that can help to improve information privacy and performance by training the IDS on discrete linked devices.FL delivers an effectual tool to defend user confidentiality,mainly in the field of IoT,where IoT devices often obtain privacy-sensitive personal data.This study develops a Privacy-Enhanced Federated Learning for Intrusion Detection using the Chameleon Swarm Algorithm and Artificial Intelligence(PEFLID-CSAAI)technique.The main aim of the PEFLID-CSAAI method is to recognize the existence of attack behavior in IoT networks.First,the PEFLIDCSAAI technique involves data preprocessing using Z-score normalization to transformthe input data into a beneficial format.Then,the PEFLID-CSAAI method uses the Osprey Optimization Algorithm(OOA)for the feature selection(FS)model.For the classification of intrusion detection attacks,the Self-Attentive Variational Autoencoder(SA-VAE)technique can be exploited.Finally,the Chameleon Swarm Algorithm(CSA)is applied for the hyperparameter finetuning process that is involved in the SA-VAE model.A wide range of experiments were conducted to validate the execution of the PEFLID-CSAAI model.The simulated outcomes demonstrated that the PEFLID-CSAAI technique outperformed other recent models,highlighting its potential as a valuable tool for future applications in healthcare devices and small engineering systems.展开更多
The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the ...The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the capability to make intelligent decisions.As a distributed learning paradigm,federated learning(FL)has emerged as a preferred solution in IoV.Compared to traditional centralized machine learning,FL reduces communication overhead and improves privacy protection.Despite these benefits,FL still faces some security and privacy concerns,such as poisoning attacks and inference attacks,prompting exploration into blockchain integration to enhance its security posture.This paper introduces a novel blockchain-enabled federated learning(BCFL)scheme with differential privacy(DP)tailored for IoV.In order to meet the performance demanding IoV environment,the proposed methodology integrates a consortium blockchain with Practical Byzantine Fault Tolerance(PBFT)consensus,which offers superior efficiency over the conventional public blockchains.In addition,the proposed approach utilizes the Differentially Private Stochastic Gradient Descent(DP-SGD)algorithm in the local training process of FL for enhanced privacy protection.Experiment results indicate that the integration of blockchain elevates the security level of FL in that the proposed approach effectively safeguards FL against poisoning attacks.On the other hand,the additional overhead associated with blockchain integration is also limited to a moderate level to meet the efficiency criteria of IoV.Furthermore,by incorporating DP,the proposed approach is shown to have the(ε-δ)privacy guarantee while maintaining an acceptable level of model accuracy.This enhancement effectively mitigates the threat of inference attacks on private information.展开更多
基金supported by the Shandong Province Science and Technology Project(2023TSGC0509,2022TSGC2234)Qingdao Science and Technology Plan Project(23-1-5-yqpy-2-qy)Open Topic Grants of Anhui Province Key Laboratory of Intelligent Building&Building Energy Saving,Anhui Jianzhu University(IBES2024KF08).
文摘With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.
文摘This study investigated the role of intentional self-regulation and the moderating role of peer relationship in the relationship between teacher-student relationship and learning engagement.The study sample comprised 540 Chinese senior secondary school students between the ages of 15–18(51.67%boys;Mage=16.56 years;SDage=0.90).They completed surveys on the Teacher-Student Relationship Scale,the Selection,Optimization,and Compensation(SOC)Scale,the Peer Relationship Scale for Children and Adolescents,and the Learning Engagement Scale.The results following regression analysis showed that teacher-student relationship predicted higher learning engagement among senior secondary school students.Intentional self-regulation partially mediated the link between teacher-student relationship and learning engagement for higher learning engagement.Peer relationship moderated the relationships between teacher-student relationship and learning engagement and moderated the relationship between teacher-student relationship and intentional self-regulation for higher learning engagement.Thesefindings imply learning engagement can be enhanced by optimizing teacher-student relationship and strengthening intentional self-regulation interventions.
基金supported and funded by the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2025).
文摘The rapid proliferation of Internet of Things(IoT)devices has heightened security concerns,making intrusion detection a pivotal challenge in safeguarding these networks.Traditional centralized Intrusion Detection Systems(IDS)often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems.To address these challenges,we propose an innovative privacy-preserving approach leveraging Federated Learning(FL)for distributed intrusion detection.Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates,ensuring enhanced privacy and scalability without compromising detection accuracy.Key innovations of this research include the integration of advanced deep learning techniques for real-time threat detection with minimal latency and a novel model to fortify the system’s resilience against diverse cyber-attacks such as Distributed Denial of Service(DDoS)and malware injections.Our evaluation on three benchmark IoT datasets demonstrates significant improvements:achieving 92.78%accuracy on NSL-KDD,91.47%on BoT-IoT,and 92.05%on UNSW-NB15.The precision,recall,and F1-scores for all datasets consistently exceed 91%.Furthermore,the communication overhead was reduced to 85 MB for NSL-KDD,105 MB for BoT-IoT,and 95 MB for UNSW-NB15—substantially lower than traditional centralized IDS approaches.This study contributes to the domain by presenting a scalable,secure,and privacy-preserving solution tailored to the unique characteristics of IoT environments.The proposed framework is adaptable to dynamic and heterogeneous settings,with potential applications extending to other privacy-sensitive domains.Future work will focus on enhancing the system’s efficiency and addressing emerging challenges such as model poisoning attacks in federated environments.
基金supported by the Deanship of Scientific Research(DSR),King Abdulaziz University,Jeddah,under grant No.GPIP:2040-611-2024。
文摘The Tactile Internet of Things(TIoT)promises transformative applications—ranging from remote surgery to industrial robotics—by incorporating haptic feedback into traditional IoT systems.Yet TIoT’s stringent requirements for ultra-low latency,high reliability,and robust privacy present significant challenges.Conventional centralized Federated Learning(FL)architectures struggle with latency and privacy constraints,while fully distributed FL(DFL)faces scalability and non-IID data issues as client populations expand and datasets become increasingly heterogeneous.To address these limitations,we propose a Clustered Distributed Federated Learning(CDFL)architecture tailored for a 6G-enabled TIoT environment.Clients are grouped into clusters based on data similarity and/or geographical proximity,enabling local intra-cluster aggregation before inter-cluster model sharing.This hierarchical,peer-to-peer approach reduces communication overhead,mitigates non-IID effects,and eliminates single points of failure.By offloading aggregation to the network edge and leveraging dynamic clustering,CDFL enhances both computational and communication efficiency.Extensive analysis and simulation demonstrate that CDFL outperforms both centralized FL and DFL as the number of clients grows.Specifically,CDFL demonstrates up to a 30%reduction in training time under highly heterogeneous data distributions,indicating faster convergence.It also reduces communication overhead by approximately 40%compared to DFL.These improvements and enhanced network performance metrics highlight CDFL’s effectiveness for practical TIoT deployments.These results validate CDFL as a scalable,privacy-preserving solution for next-generation TIoT applications.
基金supported by the National Natural Science Foundation of China under Grant 61931005Beijing Natural Science Foundation under Grant L202018the Key Laboratory of Internet of Vehicle Technical Innovation and Testing(CAICT),Ministry of Industry and Information Technology under Grant No.KL-2023-001。
文摘In Internet of Vehicles,VehicleInfrastructure-Cloud cooperation supports diverse intelligent driving and intelligent transportation applications.Federated Learning(FL)is the emerging computation paradigm to provide efficient and privacypreserving collaborative learning.However,in Io V environment,federated learning faces the challenges introduced by high mobility of vehicles and nonIndependently Identically Distribution(non-IID)of data.High mobility causes FL clients quit and the communication offline.The non-IID data leads to slow and unstable convergence of global model and single global model's weak adaptability to clients with different localization characteristics.Accordingly,this paper proposes a personalized aggregation strategy for hierarchical Federated Learning in Io V environment,including Fed SA(Special Asynchronous Federated Learning with Self-adaptive Aggregation)for low-level FL between a Road Side Unit(RSU)and the vehicles within its coverage,and Fed Att(Federated Learning with Attention Mechanism)for high-level FL between a cloud server and multiple RSUs.Agents self-adaptively obtain model aggregation weight based on Advantage Actor-Critic(A2C)algorithm.Experiments show the proposed strategy encourages vehicles to participate in global aggregation,and outperforms existing methods in training performance.
基金the research result of the 2022 Municipal Education Commission Science and Technology Research Plan Project“Research on the Technology of Detecting Double-Surface Cracks in Concrete Lining of Highway Tunnels Based on Image Blast”(KJQN02202403)the first batch of school-level classroom teaching reform projects“Principles Applications of Embedded Systems”(23JG2166)the school-level reform research project“Continuous Results-Oriented Practice Research Based on BOPPPS Teaching Model-Taking the‘Programming Fundamentals’Course as an Example”(22JG332).
文摘With the rapid development of modern information technology,the Internet of Things(IoT)has been integrated into various fields such as social life,industrial production,education,and medical care.Through the connection of various physical devices,sensors,and machines,it realizes information intercommunication and remote control among devices,significantly enhancing the convenience and efficiency of work and life.However,the rapid development of the IoT has also brought serious security problems.IoT devices have limited resources and a complex network environment,making them one of the important targets of network intrusion attacks.Therefore,from the perspective of deep learning,this paper deeply analyzes the characteristics and key points of IoT intrusion detection,summarizes the application advantages of deep learning in IoT intrusion detection,and proposes application strategies of typical deep learning models in IoT intrusion detection so as to improve the security of the IoT architecture and guarantee people’s convenient lives.
基金supported in part by the National Natural Science Foundation of China under Grants 62001225,62071236,62071234 and U22A2002in part by the Major Science and Technology plan of Hainan Province under Grant ZDKJ2021022+1 种基金in part by the Scientific Research Fund Project of Hainan University under Grant KYQD(ZR)-21008in part by the Key Technologies R&D Program of Jiangsu(Prospective and Key Technologies for Industry)under Grants BE2023022 and BE2023022-2.
文摘The Internet of Unmanned Aerial Vehicles(I-UAVs)is expected to execute latency-sensitive tasks,but limited by co-channel interference and malicious jamming.In the face of unknown prior environmental knowledge,defending against jamming and interference through spectrum allocation becomes challenging,especially when each UAV pair makes decisions independently.In this paper,we propose a cooperative multi-agent reinforcement learning(MARL)-based anti-jamming framework for I-UAVs,enabling UAV pairs to learn their own policies cooperatively.Specifically,we first model the problem as a modelfree multi-agent Markov decision process(MAMDP)to maximize the long-term expected system throughput.Then,for improving the exploration of the optimal policy,we resort to optimizing a MARL objective function with a mutual-information(MI)regularizer between states and actions,which can dynamically assign the probability for actions frequently used by the optimal policy.Next,through sharing their current channel selections and local learning experience(their soft Q-values),the UAV pairs can learn their own policies cooperatively relying on only preceding observed information and predicting others’actions.Our simulation results show that for both sweep jamming and Markov jamming patterns,the proposed scheme outperforms the benchmarkers in terms of throughput,convergence and stability for different numbers of jammers,channels and UAV pairs.
基金funding of the Deanship of Graduate Studies and Scientific Research,Jazan University,Saudi Arabia,through Project Number:ISP-2024.
文摘Efficient resource management within Internet of Things(IoT)environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities.This study introduces a neural network-based model that uses Long-Short-Term Memory(LSTM)to optimize resource allocation under dynam-ically changing conditions.Designed to monitor the workload on individual IoT nodes,the model incorporates long-term data dependencies,enabling adaptive resource distribution in real time.The training process utilizes Min-Max normalization and grid search for hyperparameter tuning,ensuring high resource utilization and consistent performance.The simulation results demonstrate the effectiveness of the proposed method,outperforming the state-of-the-art approaches,including Dynamic and Efficient Enhanced Load-Balancing(DEELB),Optimized Scheduling and Collaborative Active Resource-management(OSCAR),Convolutional Neural Network with Monarch Butterfly Optimization(CNN-MBO),and Autonomic Workload Prediction and Resource Allocation for Fog(AWPR-FOG).For example,in scenarios with low system utilization,the model achieved a resource utilization efficiency of 95%while maintaining a latency of just 15 ms,significantly exceeding the performance of comparative methods.
基金supported by Fundamental Research Funds for the Central Universities in China(Grant Number:2022NTSS52)First-Class Education Discipline Development of Beijing Normal University:Excellence Action Project(Grant Number:YLXKPYXSDW202408)Beijing Institute of Education 2024 Youth Research Projects“Research on the Transformation of Training Aimed at Improving the Work of School Principals in the Capital”(Grant Number:QZ2024-02).
文摘Background:With the global popularity of short videos,particularly among young people,short video addiction has become a worrying phenomenon that poses significant risks to individual health and adaptability.Self-regulated learning(SRL)strategies are key factors in predicting learning outcomes.This study,based on the SRL theory,uses short video addiction as the independent variable,SRL strategies as the mediating variable,and learning well-being as the outcome variable,aiming to reveal the relationships among short video addiction,self-regulated learning,and learning well-being among Chinese college students.Methods:Using a cross-sectional study design and applying the snowball sampling technique,an online survey was administered to Chinese undergraduate students.A total of 706 valid questionnaires were collected,with an effective response rate of 85.7%.The average age of the participants was 20.5 years.Results:The results of structural equation modeling indicate that 7 hypotheses were supported.Short video addiction was negatively correlated with self-regulated learning strategies(preparatory,performance,and appraisal strategy),while SRL strategies were positively correlated with learning well-being.Additionally,short video addiction had a mediating effect on learning well-being through the three types of SRL strategies.The three types of SRL strategies explained 39%of the variance in learning well-being.Conclusion:Previous research has typically focused on the impact of self-regulated learning strategies on media addiction or problematic media use.This study,based on the SRL model,highlights the negative issues caused by short video addiction and emphasizes the importance of cultivating self-regulation abilities and media literacy.Short video addiction stems from failures in trait self-regulation,which naturally impairs the ability to effectively engage in self-regulation during the learning process.This study confirms and underscores that the SRL model can serve as an effective theoretical framework for helping students prevent short video addiction,engage in high-quality learning,and consequently enhance their learning well-being.
文摘This study explored the nature and use of technology-based self-regulated learning(SRL)strategies among the Chinese university students.A total of 20 undergraduate students in China's Mainland were invited to participate in a focus group interview.The students reported using four types of technology-based SRL strategies including cognitive,meta-cognitive,social behavioral,and motivational regulation strategies.Among the strategies,technology-based vocabulary learning was reported to be a dominant strategy by the students.This study opens a new window to understanding how English as a foreign language(EFL)students utilize different strategies to learn English in technology-based learning context.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant 62071179.
文摘Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations.
基金supported in part by the National Natural Science Foundation of China(62371116 and 62231020)in part by the Science and Technology Project of Hebei Province Education Department(ZD2022164)+2 种基金in part by the Fundamental Research Funds for the Central Universities(N2223031)in part by the Open Research Project of Xidian University(ISN24-08)Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education(Guilin University of Electronic Technology,China,CRKL210203)。
文摘High-efficiency and low-cost knowledge sharing can improve the decision-making ability of autonomous vehicles by mining knowledge from the Internet of Vehicles(IoVs).However,it is challenging to ensure high efficiency of local data learning models while preventing privacy leakage in a high mobility environment.In order to protect data privacy and improve data learning efficiency in knowledge sharing,we propose an asynchronous federated broad learning(FBL)framework that integrates broad learning(BL)into federated learning(FL).In FBL,we design a broad fully connected model(BFCM)as a local model for training client data.To enhance the wireless channel quality for knowledge sharing and reduce the communication and computation cost of participating clients,we construct a joint resource allocation and reconfigurable intelligent surface(RIS)configuration optimization framework for FBL.The problem is decoupled into two convex subproblems.Aiming to improve the resource scheduling efficiency in FBL,a double Davidon–Fletcher–Powell(DDFP)algorithm is presented to solve the time slot allocation and RIS configuration problem.Based on the results of resource scheduling,we design a reward-allocation algorithm based on federated incentive learning(FIL)in FBL to compensate clients for their costs.The simulation results show that the proposed FBL framework achieves better performance than the comparison models in terms of efficiency,accuracy,and cost for knowledge sharing in the IoV.
基金supported in part by the National Natural Science Foundation of China(NSFC)under Grant 62371082,61831002,and 62001076in part by the Natural Science Foundation of Chongqing under Grant CSTB2023NSCQ-MSX0726 and cstc2020jcyj-msxmX0878。
文摘To provide diversified services in the intelligent transportation systems,smart vehicles will generate unprecedented amounts of data every day.Due to data security and user privacy issues,Federated Learning(FL)is considered a potential solution to ensure privacy-preserving in data sharing.However,there are still many challenges to applying the traditional synchronous FL directly in the Internet of Vehicles(Io V),such as unreliable communications and malicious attacks.In this paper,we propose a Directed Acyclic Graph(DAG)based Swarm Learning(DSL),which integrates edge computing,FL,and blockchain technologies to provide secure data sharing and model training in Io Vs.To deal with the high mobility of vehicles,the dynamic vehicle association algorithm is introduced,which could optimize the connections between vehicles and road side units to improve the training efficiency.Moreover,to enhance the anti-attack property of the DSL algorithm,a malicious attack detection method is adopted,which could recognize malicious vehicles by the site confirmation rate.Furthermore,an accuracy-based reward mechanism is developed to promote vehicles to participate in the model training with honest behaviors.Finally,simulation results demonstrate that the proposed DSL algorithm could achieve better performance in terms of model accuracy,convergence rates and security compared with existing algorithms.
文摘The purpose of this paper is to argue the effectiveness of self-regulated learning in English education in Chinese college classroom instruction. A study is given to show whether the introduction of self-regulated learning can help improve Chinese college students' English learning, and help them perform better in the National English test-CET-4 (College English Test Level-4,).
基金supported in part by the National Natural Science Foundation of China(62462053)the Science and Technology Foundation of Qinghai Province(2023-ZJ-731)+1 种基金the Open Project of the Qinghai Provincial Key Laboratory of Restoration Ecology in Cold Area(2023-KF-12)the Open Research Fund of Guangdong Key Laboratory of Blockchain Security,Guangzhou University。
文摘Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple parties.When combined with Fog Computing,FL offers enhanced capabilities for machine learning applications in the Internet of Things(IoT).However,implementing FL across large-scale distributed fog networks presents significant challenges in maintaining privacy,preventing collusion attacks,and ensuring robust data aggregation.To address these challenges,we propose an Efficient Privacy-preserving and Robust Federated Learning(EPRFL)scheme for fog computing scenarios.Specifically,we first propose an efficient secure aggregation strategy based on the improved threshold homomorphic encryption algorithm,which is not only resistant to model inference and collusion attacks,but also robust to fog node dropping.Then,we design a dynamic gradient filtering method based on cosine similarity to further reduce the communication overhead.To minimize training delays,we develop a dynamic task scheduling strategy based on comprehensive score.Theoretical analysis demonstrates that EPRFL offers robust security and low latency.Extensive experimental results indicate that EPRFL outperforms similar strategies in terms of privacy preserving,model performance,and resource efficiency.
基金Funded by Kuwait Foundation for the Advancement of Sciences(KFAS)under project code:PN23-15EM-1901.
文摘The rapid advancements in distributed generation technologies,the widespread adoption of distributed energy resources,and the integration of 5G technology have spurred sharing economy businesses within the electricity sector.Revolutionary technologies such as blockchain,5G connectivity,and Internet of Things(IoT)devices have facilitated peer-to-peer distribution and real-time response to fluctuations in supply and demand.Nevertheless,sharing electricity within a smart community presents numerous challenges,including intricate design considerations,equitable allocation,and accurate forecasting due to the lack of well-organized temporal parameters.To address these challenges,this proposed system is focused on sharing extra electricity within the smart community.The working of the proposed system is composed of five main phases.In phase 1,we develop a model to forecast the energy consumption of the appliances using the Long Short-Term Memory(LSTM)integrated with the attention module.In phase 2,based on the predicted energy consumption,we designed a smart scheduler with attention-induced Genetic Algorithm(GA)to schedule the appliances to reduce energy consumption.In phase 3,a dynamic Feed-in Tariff(dFIT)algorithm makes real-time tariff adjustments using LSTM for demand prediction and SHapley Additive exPlanations(SHAP)values to improve model transparency.In phase 4,the energy saved from solar systems and smart scheduling is shared with the community grid.Finally,in phase 5,SDP security ensures the integrity and confidentiality of shared energy data.To evaluate the performance of energy sharing and scheduling for houses with and without solar support,we simulated the above phases using data obtained from the energy consumption of 17 household appliances in our IoT laboratory.Finally,the simulation results show that the proposed scheme reduces energy consumption and ensures secure and efficient distribution with peers,promoting a more sustainable energy management and resilient smart community.
文摘The rapid advancement of technology has paved the way for innovative approaches to education.Artificial intelligence(AI),the Internet of Things(IoT),and cloud computing are three transformative technologies reshaping how education is delivered,accessed,and experienced.These technologies enable personalized learning,optimize teaching processes,and make educational resources more accessible to learners worldwide.This paper examines the integration of these technologies into smart education systems,highlighting their applications,benefits,and challenges,and exploring their potential to bridge gaps in educational equity and inclusivity.
基金supported by SERB,India,through grant CRG/2021/003888financial support to UoH-IoE by MHRD,India(F11/9/2019-U3(A)).
文摘Federated Learning(FL)has become a popular training paradigm in recent years.However,stragglers are critical bottlenecks in an Internet of Things(IoT)network while training.These nodes produce stale updates to the server,which slow down the convergence.In this paper,we studied the impact of the stale updates on the global model,which is observed to be significant.To address this,we propose a weighted averaging scheme,FedStrag,that optimizes the training with stale updates.The work is focused on training a model in an IoT network that has multiple challenges,such as resource constraints,stragglers,network issues,device heterogeneity,etc.To this end,we developed a time-bounded asynchronous FL paradigm that can train a model on the continuous iflow of data in the edge-fog-cloud continuum.To test the FedStrag approach,a model is trained with multiple stragglers scenarios on both Independent and Identically Distributed(IID)and non-IID datasets on Raspberry Pis.The experiment results suggest that the FedStrag outperforms the baseline FedAvg in all possible cases.
基金funded by the Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia,under grant number NBU-FFR-2025-451-6.
文摘The Internet of Things(IoT)is emerging as an innovative phenomenon concerned with the development of numerous vital applications.With the development of IoT devices,huge amounts of information,including users’private data,are generated.IoT systems face major security and data privacy challenges owing to their integral features such as scalability,resource constraints,and heterogeneity.These challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data,creating an attractive opportunity for cyberattacks.To address these challenges,artificial intelligence(AI)techniques,such as machine learning(ML)and deep learning(DL),are utilized to build an intrusion detection system(IDS)that helps to secure IoT systems.Federated learning(FL)is a decentralized technique that can help to improve information privacy and performance by training the IDS on discrete linked devices.FL delivers an effectual tool to defend user confidentiality,mainly in the field of IoT,where IoT devices often obtain privacy-sensitive personal data.This study develops a Privacy-Enhanced Federated Learning for Intrusion Detection using the Chameleon Swarm Algorithm and Artificial Intelligence(PEFLID-CSAAI)technique.The main aim of the PEFLID-CSAAI method is to recognize the existence of attack behavior in IoT networks.First,the PEFLIDCSAAI technique involves data preprocessing using Z-score normalization to transformthe input data into a beneficial format.Then,the PEFLID-CSAAI method uses the Osprey Optimization Algorithm(OOA)for the feature selection(FS)model.For the classification of intrusion detection attacks,the Self-Attentive Variational Autoencoder(SA-VAE)technique can be exploited.Finally,the Chameleon Swarm Algorithm(CSA)is applied for the hyperparameter finetuning process that is involved in the SA-VAE model.A wide range of experiments were conducted to validate the execution of the PEFLID-CSAAI model.The simulated outcomes demonstrated that the PEFLID-CSAAI technique outperformed other recent models,highlighting its potential as a valuable tool for future applications in healthcare devices and small engineering systems.
基金supported in part by the Natural Science Foundation of Henan Province(Grant No.202300410510)the Consulting Research Project of Chinese Academy of Engineering(Grant No.2020YNZH7)+3 种基金the Key Scientific Research Project of Colleges and Universities in Henan Province(Grant Nos.23A520043 and 23B520010)the International Science and Technology Cooperation Project of Henan Province(Grant No.232102521004)the National Key Research and Development Program of China(Grant No.2020YFB1005404)the Henan Provincial Science and Technology Research Project(Grant No.212102210100).
文摘The rapid evolution of artificial intelligence(AI)technologies has significantly propelled the advancement of the Internet of Vehicles(IoV).With AI support,represented by machine learning technology,vehicles gain the capability to make intelligent decisions.As a distributed learning paradigm,federated learning(FL)has emerged as a preferred solution in IoV.Compared to traditional centralized machine learning,FL reduces communication overhead and improves privacy protection.Despite these benefits,FL still faces some security and privacy concerns,such as poisoning attacks and inference attacks,prompting exploration into blockchain integration to enhance its security posture.This paper introduces a novel blockchain-enabled federated learning(BCFL)scheme with differential privacy(DP)tailored for IoV.In order to meet the performance demanding IoV environment,the proposed methodology integrates a consortium blockchain with Practical Byzantine Fault Tolerance(PBFT)consensus,which offers superior efficiency over the conventional public blockchains.In addition,the proposed approach utilizes the Differentially Private Stochastic Gradient Descent(DP-SGD)algorithm in the local training process of FL for enhanced privacy protection.Experiment results indicate that the integration of blockchain elevates the security level of FL in that the proposed approach effectively safeguards FL against poisoning attacks.On the other hand,the additional overhead associated with blockchain integration is also limited to a moderate level to meet the efficiency criteria of IoV.Furthermore,by incorporating DP,the proposed approach is shown to have the(ε-δ)privacy guarantee while maintaining an acceptable level of model accuracy.This enhancement effectively mitigates the threat of inference attacks on private information.