{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:14:50Z","timestamp":1773522890860,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00754-3","type":"journal-article","created":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T18:02:16Z","timestamp":1695924136000},"page":"649-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["MLChain: a privacy-preserving model learning framework using blockchain"],"prefix":"10.1007","volume":"23","author":[{"given":"Vidhi","family":"Bansal","sequence":"first","affiliation":[]},{"given":"Niyati","family":"Baliyan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7168-1216","authenticated-orcid":false,"given":"Mohona","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"754_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical Report Manubot (2019)"},{"key":"754_CR2","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","volume":"14","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. 505 Int. J. Web Grid Serv. 14, 352\u2013375 (2018)","journal-title":"505 Int. J. Web Grid Serv."},{"key":"754_CR3","unstructured":"Kuo, T.-T., Ohno-Machado, L.: Modelchain: decentralized privacy-preserving healthcare predictive modeling framework on private blockchain networks. arXiv:1802.01746 (2018)"},{"key":"754_CR4","doi-asserted-by":"publisher","first-page":"3001","DOI":"10.1007\/s13369-020-04989-3","volume":"46","author":"IA Omar","year":"2020","unstructured":"Omar, I.A., Jayaraman, R., Salah, K., Yaqoob, I., Ellahham, S.: Applications of blockchain technology in clinical trials: review and open challenges. Arabian J. Sci. Eng. 46, 3001\u20133015 (2020)","journal-title":"Arabian J. Sci. Eng."},{"key":"754_CR5","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.giq.2017.09.007","volume":"34","author":"S Yu\u00f8lnes","year":"2017","unstructured":"Yu\u00f8lnes, S., Ubacht, J., Janssen, M.: Blockchain in government: benefits and implications of distributed ledger technology for information sharing. Gov. Inf. Q. 34, 355\u2013364 (2017)","journal-title":"Gov. Inf. Q."},{"key":"754_CR6","doi-asserted-by":"publisher","first-page":"110891","DOI":"10.1016\/j.jss.2020.110891","volume":"174","author":"A Vacca","year":"2021","unstructured":"Vacca, A., Di Sorbo, A., Visaggio, C.A., Canfora, G.: A systematic literature review of blockchain and smart contract development: techniques, tools, and open challenges. J. Syst. Softw. 174, 110891 (2021). https:\/\/doi.org\/10.1016\/j.jss.2020.110891","journal-title":"J. Syst. Softw."},{"key":"754_CR7","doi-asserted-by":"publisher","first-page":"A19","DOI":"10.2308\/ciia-52540","volume":"13","author":"M Liu","year":"2019","unstructured":"Liu, M., Wu, K., Xu, J.J.: How will blockchain technology impact auditing and accounting: permissionless versus permissioned blockchain. Current Issues Audit. 13, A19\u2013A29 (2019)","journal-title":"Current Issues Audit."},{"key":"754_CR8","doi-asserted-by":"crossref","unstructured":"Mingxiao, D., Xiaofeng, M., Zhe, Z., Xiangwei, W., Qijun, C.: A review on consensus algorithm of blockchain. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2567\u20132572. IEEE (2017)","DOI":"10.1109\/SMC.2017.8123011"},{"key":"754_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/2.108052","volume":"25","author":"TY Woo","year":"1992","unstructured":"Woo, T.Y., Lam, S.S.: Authentication for distributed systems. Computer 25, 39\u201352 (1992)","journal-title":"Computer"},{"key":"754_CR10","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TGE.1977.6498972","volume":"15","author":"PH Swain","year":"1977","unstructured":"Swain, P.H., Hauska, H.: The decision tree classifier: design and potential. IEEE Trans. Geosci. Electron. 15, 142\u2013147 (1977)","journal-title":"IEEE Trans. Geosci. Electron."},{"key":"754_CR11","first-page":"130","volume":"27","author":"Y-Y Song","year":"2015","unstructured":"Song, Y.-Y., Ying, L.: Decision tree methods: applications for classification and prediction. Shanghai Arch. Psychiatry 27, 130 (2015)","journal-title":"Shanghai Arch. Psychiatry"},{"key":"754_CR12","unstructured":"Wright, R.E.: Logistic regression (1995)"},{"key":"754_CR13","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"754_CR14","unstructured":"Langley, P., Iba, W., Thompson, K. et al.: An analysis of Bayesian classifiers. In: Aaai pp. 223\u2013228. Citeseer volume 90, (1992)"},{"key":"754_CR15","doi-asserted-by":"crossref","unstructured":"Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Proceedings of the 5th Annual Workshop on Computational Learning Theory, pp. 144\u2013152 (1992)","DOI":"10.1145\/130385.130401"},{"key":"754_CR16","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1136\/amiajnl-2012-000862","volume":"19","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Jiang, X., Kim, J., Ohno-Machado, L.: G rid Binary LO gistic RE gression (GLORE): building shared models without sharing data. J. Am. Med. Inf. Assoc. 19, 758\u2013764 (2012)","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"754_CR17","doi-asserted-by":"publisher","first-page":"3238","DOI":"10.1093\/bioinformatics\/btt559","volume":"29","author":"W Jiang","year":"2013","unstructured":"Jiang, W., Li, P., Wang, S., Wu, Y., Xue, M., Ohno-Machado, L., Jiang, X.: Webglore: a web service for grid logistic regression. Bioinformatics 29, 3238\u20133240 (2013)","journal-title":"Bioinformatics"},{"key":"754_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1186\/s12911-016-0316-1","volume":"16","author":"H Shi","year":"2016","unstructured":"Shi, H., Jiang, C., Dai, W., Jiang, X., Tang, Y., Ohno-Machado, L., Wang, S.: Secure multi-pArty computation grid LOgistic REgression (SMAC-GLORE). BMC Med. Inform. Decis. Mak. 16, 175\u2013187 (2016)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"754_CR19","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.jbi.2013.03.008","volume":"46","author":"S Wang","year":"2013","unstructured":"Wang, S., Jiang, X., Wu, Y., Cui, L., Cheng, S., Ohno-Machado, L.: Expectation propagation logistic regression (explorer): distributed privacy-preserving online model learning. J. Biomed. Inf. 46, 480\u2013496 (2013)","journal-title":"J. Biomed. Inf."},{"key":"754_CR20","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1093\/jamia\/ocv146","volume":"23","author":"Y Li","year":"2016","unstructured":"Li, Y., Jiang, X., Wang, S., Xiong, H., Ohno-Machado, L.: Vertical grid logistic regression (vertigo). J. Am. Med. Inform. Assoc. 23, 570\u2013579 (2016)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"754_CR21","doi-asserted-by":"publisher","first-page":"103291","DOI":"10.1016\/j.jbi.2019.103291","volume":"99","author":"L Huang","year":"2019","unstructured":"Huang, L., Shea, A.L., Qian, H., Masurkar, A., Deng, H., Liu, D.: Patient clustering improves efficiency of federated machine learning to predict mortality and hospital stay time using distributed electronic medical records. J. Biomed. Inform. 99, 103291 (2019)","journal-title":"J. Biomed. Inform."},{"key":"754_CR22","unstructured":"Wang, S., Chang, T.-H.: Federated clustering via matrix factorization models: from model averaging to gradient sharing. arXiv:2002.04930, (2020)"},{"key":"754_CR23","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: Secureml: A system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338. IEEE (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"754_CR24","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321 (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"754_CR25","doi-asserted-by":"publisher","first-page":"3003","DOI":"10.1109\/TIFS.2019.2911169","volume":"14","author":"TT Phuong","year":"2019","unstructured":"Phuong, T.T., et al.: Privacy-preserving deep learning via weight transmission. IEEE Trans. Inf. Forensics Secur. 14, 3003\u20133015 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"754_CR26","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S., et al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13, 1333\u20131345 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"754_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.ijmedinf.2018.01.007","volume":"112","author":"TS Brisimi","year":"2018","unstructured":"Brisimi, T.S., Chen, R., Mela, T., Olshevsky, A., Paschalidis, I.C., Shi, W.: Federated learning of predictive models from federated electronic health records. Int. J Med. Inform. 112, 59\u201367 (2018)","journal-title":"Int. J Med. Inform."},{"key":"754_CR28","doi-asserted-by":"crossref","unstructured":"Duan, M., Liu, D., Chen, X., Tan, Y., Ren, J., Qiao, L., Liang, L.: Astraea: Self-balancing federated learning for improving classification accuracy of mobile deep learning applications. In: 2019 IEEE 37th International Conference on Computer Design (ICCD), pp. 246\u2013254. IEEE (2019)","DOI":"10.1109\/ICCD46524.2019.00038"},{"key":"754_CR29","unstructured":"Xie, M., Long, G., Shen, T., Zhou, T., Wang, X., Jiang, J.: Multi-center federated learning. arXiv:2005.01026, (2020)"},{"key":"754_CR30","doi-asserted-by":"crossref","unstructured":"Kim, Y., Hakim, E. A., Haraldson, J., Eriksson, H., Silva Jr., J. M.B.D., Fischione, C.: Dynamic clustering in federated learning. arXiv:2012.03788 (2020)","DOI":"10.1109\/ICC42927.2021.9500877"},{"key":"754_CR31","unstructured":"Choudhury, O., Gkoulalas-Divanis, A., Salonidis, T., Sylla, I., Park, Y., Hsu, G., Das, A.: Differential privacyenabled federated learning for sensitive health data. arXiv:1910.02578, (2019)"},{"issue":"9","key":"754_CR32","doi-asserted-by":"publisher","first-page":"63229","DOI":"10.1109\/ACCESS.2021.3075203","volume":"23","author":"N Bouacida","year":"2021","unstructured":"Bouacida, N., Mohapatra, P.: Vulnerabilities in federated learning. IEEE Access 23(9), 63229\u201349 (2021)","journal-title":"IEEE Access"},{"key":"754_CR33","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1093\/jamia\/ocz214","volume":"27","author":"T-T Kuo","year":"2020","unstructured":"Kuo, T.-T., Kim, J., Gabriel, R.A.: Privacy-preserving model learning on a blockchain network-of networks. J. Am. Med. Inform. Assoc. 27, 343\u2013354 (2020)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"754_CR34","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1093\/jamia\/ocy180","volume":"26","author":"T-T Kuo","year":"2019","unstructured":"Kuo, T.-T., Gabriel, R.A., Ohno-Machado, L.: Fair compute loads enabled by blockchain: sharing models by alternating client and server roles. J. Am. Med. Inform. Assoc. 26, 392\u2013403 (2019)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"754_CR35","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1093\/jamia\/ocaa023","volume":"27","author":"T-T Kuo","year":"2020","unstructured":"Kuo, T.-T., Gabriel, R.A., Cidambi, K.R., Ohno-Machado, L.: Ex pectation p ropagation logistic regression on permissioned block chain (explorerchain): decentralized online healthcare\/genomics predictive model learning. J. Am. Med. Inform. Assoc. 27, 747\u2013756 (2020)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"8","key":"754_CR36","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1093\/oxfordjournals.eurheartj.a015035","volume":"17","author":"RL Kennedy","year":"1996","unstructured":"Kennedy, R.L., Fraser, H.S., McStay, L.N., Harrison, R.F.: Early diagnosis of acute myocardial infarction using clinical and electrocardiographic data at presentation: derivation and evaluation of logistic regression models. Eur. Heart J. 17(8), 1181\u201391 (1996)","journal-title":"Eur. Heart J."},{"key":"754_CR37","unstructured":"Dua, D., Graff, C.: UCI machine learning repository. URL:http:\/\/archive.ics.uci.edu\/ml (2017)"},{"issue":"2","key":"754_CR38","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSEC.2020.3039941","volume":"19","author":"MS Jere","year":"2020","unstructured":"Jere, M.S., Farnan, T., Koushanfar, F.: A taxonomy of attacks on federated learning. IEEE Secur. Privacy 19(2), 20\u20138 (2020)","journal-title":"IEEE Secur. Privacy"},{"issue":"9","key":"754_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3560816","volume":"55","author":"W Issa","year":"2023","unstructured":"Issa, W., Moustafa, N., Turnbull, B., Sohrabi, N., Tari, Z.: Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput. Surv. 55(9), 1\u201343 (2023)","journal-title":"ACM Comput. Surv."},{"key":"754_CR40","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1, 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"754_CR41","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"2017","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Routledge, Milton Park (2017)"},{"key":"754_CR42","unstructured":"Daemen, J., Rijmen, V.: Aes proposal: Rijndael, (1999)"},{"key":"754_CR43","unstructured":"Standard, D.E., et al.: Data encryption standard. Federal Information Processing Standards Publication, 112 (1999)"},{"issue":"6","key":"754_CR44","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.1109\/LCOMM.2019.2921755","volume":"24","author":"H Kim","year":"2019","unstructured":"Kim, H., Park, J., Bennis, M., Kim, S.L.: Blockchained on-device federated learning. IEEE Commun. Lett. 24(6), 1279\u20131283 (2019)","journal-title":"IEEE Commun. Lett."},{"key":"754_CR45","doi-asserted-by":"crossref","unstructured":"Short, A.R., Leligou, H.C., Papoutsidakis, M., Theocharis, E.: Using blockchain technologies to improve security in federated learning systems. In: 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 1183-1188. IEEE (2020 Jul 13)","DOI":"10.1109\/COMPSAC48688.2020.00-96"},{"issue":"6","key":"754_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3460427","volume":"54","author":"X Yin","year":"2021","unstructured":"Yin, X., Zhu, Y., Hu, J.: A comprehensive survey of privacy-preserving federated learning: a taxonomy, review, and future directions. ACM Comput. Surv. (CSUR) 54(6), 1\u201336 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"15","key":"754_CR47","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"17","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., Ma, C., Yang, H.H., Farokhi, F., Jin, S., Quek, T.Q., Poor, H.V.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 17(15), 3454\u201369 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"754_CR48","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106-115. IEEE (2006, April)","DOI":"10.1109\/ICDE.2007.367856"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00754-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00754-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00754-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T01:15:47Z","timestamp":1705972547000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00754-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,28]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["754"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00754-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,28]]},"assertion":[{"value":"28 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}