{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:21:38Z","timestamp":1760710898503,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811908514"},{"type":"electronic","value":"9789811908521"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0852-1_19","type":"book-chapter","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:02:53Z","timestamp":1646816573000},"page":"243-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Towards Convergence of Blockchain and Self-sovereign Identity for Privacy-Preserving Secure Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4570-0946","authenticated-orcid":false,"given":"Rakib Ul","family":"Haque","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0929-6499","authenticated-orcid":false,"given":"A. S. M. Touhidul","family":"Hasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6128-5001","authenticated-orcid":false,"given":"Apubra","family":"Daria","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5814-8460","authenticated-orcid":false,"given":"Qiang","family":"Qu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8040-0308","authenticated-orcid":false,"given":"Qingshan","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,10]]},"reference":[{"issue":"4","key":"19_CR1","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"issue":"11","key":"19_CR2","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.3390\/biology10111174","volume":"10","author":"S Akter","year":"2021","unstructured":"Akter, S., Shamrat, F.M., Chakraborty, S., Karim, A., Azam, S.: COVID-19 detection using deep learning algorithm on chest X-ray images. Biology 10(11), 1174 (2021)","journal-title":"Biology"},{"key":"19_CR3","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-74575-2_3","volume-title":"Artificial Intelligence and Blockchain for Future Cybersecurity Applications","author":"RU Haque","year":"2021","unstructured":"Haque, R.U., Hasan, A.S.M.T.: Privacy-preserving multivariant regression analysis over blockchain-based encrypted IoMT data. In: Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., Romdhani, I. (eds.) Artificial Intelligence and Blockchain for Future Cybersecurity Applications. SBD, vol. 90, pp. 45\u201359. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-74575-2_3"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Haque, R.U., Hasan, A.S.M.: Overview of Blockchain-Based Privacy Preserving Machine Learning for IoMT, Big Data Intelligence for Smart Applications, Studies in Computational Intelligence, eBook ISBN 978-3-030-87954-9 (2022). https:\/\/doi.org\/10.1007\/978-3-030-87954-9","DOI":"10.1007\/978-3-030-87954-9"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"165184","DOI":"10.1109\/ACCESS.2021.3129491","volume":"9","author":"S Akter","year":"2021","unstructured":"Akter, S., et al.: Comprehensive performance assessment of deep learning models in early prediction and risk identification of chronic kidney disease. IEEE Access 9, 165184\u2013165206 (2021)","journal-title":"IEEE Access"},{"key":"19_CR6","unstructured":"Bonawitz, K., et al.: Towards federated learning at scale: system design. arXiv preprint arXiv:1902.01046 (2019)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Optimizing federated learning on non-IID data with reinforcement learning. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"19_CR8","unstructured":"Bhagoji, A.N., et al. :Analyzing federated learning through an adversarial lens. In: International Conference on Machine Learning. PMLR (2019)"},{"key":"19_CR9","unstructured":"Tobin, A., Reed, D.: The inevitable rise of self-sovereign identity. In: The Sovrin Foundation, 29 September 2016"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"issue":"3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer, M., et al.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183\u2013187 (2017)","journal-title":"Bus. Inf. Syst. Eng."},{"issue":"4","key":"19_CR12","first-page":"32","volume":"3","author":"P Coelho","year":"2018","unstructured":"Coelho, P., Z\u00faquete, A., Gomes, H.: Federation of attribute providers for user self-sovereign identity. J. Inf. Syst. Eng. Manage. 3(4), 32 (2018)","journal-title":"J. Inf. Syst. Eng. Manage."},{"issue":"5","key":"19_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MS.2020.2992783","volume":"37","author":"Y Liu","year":"2020","unstructured":"Liu, Y., et al.: Design pattern as a service for Blockchain-based self-sovereign identity. IEEE Softw. 37(5), 30\u201336 (2020)","journal-title":"IEEE Softw."},{"issue":"3","key":"19_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li, T., et al.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50\u201360 (2020)","journal-title":"IEEE Signal Process. Mag."},{"key":"19_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854","volume":"149","author":"L Li","year":"2020","unstructured":"Li, L., et al.: A review of applications in federated learning. Comput. Ind. Eng. 149, 106854 (2020)","journal-title":"Comput. Ind. Eng."},{"issue":"1","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41666-020-00082-4","volume":"5","author":"J Xu","year":"2021","unstructured":"Xu, J., et al.: Federated learning for healthcare informatics. J. Healthcare Inform. Res. 5(1), 1\u201319 (2021)","journal-title":"J. Healthcare Inform. Res."},{"key":"19_CR17","unstructured":"Preukschat, A., Reed, D.: Self-sovereign Identity: Decentralized Digital Identity and Verifiable Credential. Manning Publications, 8 June 2021. ISBN-10: 1617296597, ISBN-13: 978\u20131617296598"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"191850","DOI":"10.1109\/ACCESS.2020.3030642","volume":"8","author":"A Rasool","year":"2020","unstructured":"Rasool, A., Tao, R., Kamyab, M., Hayat, S.: GAWA-a feature selection method for hybrid sentiment classification. IEEE Access 8, 191850\u2013191861 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3030642","journal-title":"IEEE Access"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Rasool, A., Jiang, Q., Qu, Q., Ji, C.: WRS: a novel word-embedding method for real-time sentiment with integrated LSTM-CNN model. In: 2021 IEEE International Conference on Real-time Computing and Robotics (RCAR), pp. 590\u2013595. IEEE, July 2021","DOI":"10.1109\/RCAR52367.2021.9517671"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0852-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:07:22Z","timestamp":1646816842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0852-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811908514","9789811908521"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0852-1_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"221","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}