{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T14:25:56Z","timestamp":1764771956806,"version":"3.46.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05695-1","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T16:00:39Z","timestamp":1760716839000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unique explainable federated learning approach for detecting model poisoning attacks to secure systems"],"prefix":"10.1007","volume":"28","author":[{"given":"Muhmmad","family":"Fizan","sequence":"first","affiliation":[]},{"given":"Alaa","family":"Awad Abdellatif","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Asad","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Zubair","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xuefeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jichuan","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Qasim Mehmood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"5695_CR1","doi-asserted-by":"crossref","unstructured":"Qi, Y.,\u00a0Liu, G.: Semi-flchain: Toward secure and efficient semi-supervised federated learning for iot using blockchain, in 2023 IEEE 5th International Conference on Power, Intelligent Computing and Systems (ICPICS), pp.\u00a0971\u2013978, IEEE, (2023)","DOI":"10.1109\/ICPICS58376.2023.10235479"},{"key":"5695_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3546841","author":"MM Rashid","year":"2025","unstructured":"Rashid, M.M., Xiang, Y., Uddin, M.P., Tang, J., Sood, K., Gao, L.: Trustworthy and fair federated learning via reputation-based consensus and adaptive incentives. IEEE Transactions on Information Forensics and Security (2025). https:\/\/doi.org\/10.1109\/TIFS.2025.3546841","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5695_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3474469","author":"A Kuznietsov","year":"2024","unstructured":"Kuznietsov, A., Gyevnar, B., Wang, C., Peters, S., Albrecht, S.V.: Explainable ai for safe and trustworthy autonomous driving: a systematic review. IEEE Transactions on Intelligent Transportation Systems (2024). https:\/\/doi.org\/10.1109\/TITS.2024.3474469","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"3","key":"5695_CR4","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1109\/COMST.2024.3361451","volume":"26","author":"Y Wan","year":"2024","unstructured":"Wan, Y., Qu, Y., Ni, W., Xiang, Y., Gao, L., Hossain, E.: Data and model poisoning backdoor attacks on wireless federated learning, and the defense mechanisms: A comprehensive survey. IEEE Communications Surveys & Tutorials 26(3), 1861\u20131897 (2024)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"5695_CR5","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/LWC.2022.3141120","volume":"11","author":"N Razmi","year":"2022","unstructured":"Razmi, N., Matthiesen, B., Dekorsy, A., Popovski, P.: Ground-assisted federated learning in leo satellite constellations. IEEE Wireless Communications Letters 11(4), 717\u2013721 (2022)","journal-title":"IEEE Wireless Communications Letters"},{"key":"5695_CR6","unstructured":"So, J.,\u00a0Hsieh, K.,\u00a0Arzani, B.,\u00a0Noghabi, S.,\u00a0Avestimehr, S.,\u00a0Chandra, R.: Fedspace: An efficient federated learning framework at satellites and ground stations, arXiv preprint arXiv:2202.01267, (2022)"},{"issue":"10","key":"5695_CR7","doi-asserted-by":"publisher","first-page":"11297","DOI":"10.1007\/s10462-023-10417-3","volume":"56","author":"D Sirohi","year":"2023","unstructured":"Sirohi, D., Kumar, N., Rana, P.S., Tanwar, S., Iqbal, R., Hijjii, M.: Federated learning for 6g-enabled secure communication systems: a comprehensive survey. Artif. Intell. Rev. 56(10), 11297\u201311389 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"5695_CR8","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.comcom.2024.07.014","volume":"225","author":"M Savoia","year":"2024","unstructured":"Savoia, M., Prezioso, E., Mele, V., Piccialli, F.: Eco-fl: Enhancing federated learning sustainability in edge computing through energy-efficient client selection. Comput. Commun. 225, 156\u2013170 (2024)","journal-title":"Comput. Commun."},{"key":"5695_CR9","unstructured":"Chen, S.,\u00a0Wu, S.,\u00a0Cui, T.: User selection for federated learning in a wireless environment: A process to minimize the negative effect of training data correlation and improve performance, IEEE Vehicular Technology Magazine, (2022)"},{"key":"5695_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3449092","author":"H Zhang","year":"2024","unstructured":"Zhang, H., Ti, N., Wang, D., Du, X., Wang, Q., Xia, W.: Quality-aware incentive mechanism for efficient federated learning in mobile crowdsensing. IEEE Transactions on Vehicular Technology (2024). https:\/\/doi.org\/10.1109\/TVT.2024.3449092","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"5695_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3423673","author":"S Wang","year":"2024","unstructured":"Wang, S., Morabito, R., Hosseinalipour, S., Chiang, M., Brinton, C.G.: Device sampling and resource optimization for federated learning in cooperative edge networks. IEEE\/ACM Transactions on Networking (2024). https:\/\/doi.org\/10.1109\/TNET.2024.3423673","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"5695_CR12","doi-asserted-by":"crossref","unstructured":"Mrad, I.,\u00a0Samara, L., Abdellatif, A.A.,\u00a0Al-Abbasi, A.,\u00a0Hamila, R.,\u00a0Erbad, A.: Federated learning for uav swarms under class imbalance and power consumption constraints, in 2021 IEEE Global Communications Conference (GLOBECOM), pp.\u00a001\u201306, IEEE, (2021)","DOI":"10.1109\/GLOBECOM46510.2021.9685143"},{"key":"5695_CR13","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.future.2021.10.016","volume":"128","author":"AA Abdellatif","year":"2022","unstructured":"Abdellatif, A.A., Mhaisen, N., Mohamed, A., Erbad, A., Guizani, M., Dawy, Z., Nasreddine, W.: Communication-efficient hierarchical federated learning for iot heterogeneous systems with imbalanced data. Future Generation Computer Systems 128, 406\u2013419 (2022)","journal-title":"Future Generation Computer Systems"},{"key":"5695_CR14","doi-asserted-by":"crossref","unstructured":"Wang, Y.,\u00a0Kantarci, B.: A novel reputation-aware client selection scheme for federated learning within mobile environments, in 2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp.\u00a01\u20136, IEEE, (2020)","DOI":"10.1109\/CAMAD50429.2020.9209263"},{"issue":"1","key":"5695_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/TDSC.2021.3126323","volume":"20","author":"C Hahn","year":"2021","unstructured":"Hahn, C., Kim, H., Kim, M., Hur, J.: Versa: Verifiable secure aggregation for cross-device federated learning. IEEE Trans. Dependable Secure Comput. 20(1), 36\u201352 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"5695_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3540199","volume":"18","author":"C-I Fan","year":"2022","unstructured":"Fan, C.-I., Hsu, Y.-W., Shie, C.-H., Tseng, Y.-F.: Id-based multireceiver homomorphic proxy re-encryption in federated learning. ACM Transactions on Sensor Networks 18(4), 1\u201325 (2022)","journal-title":"ACM Transactions on Sensor Networks"},{"key":"5695_CR17","doi-asserted-by":"crossref","unstructured":"Zitouni, M.,\u00a0Guilley, S.,\u00a0Mokrane, F.: Identity-based encryption from the tate pairing on genus two curves, (2023)","DOI":"10.21203\/rs.3.rs-3238767\/v1"},{"key":"5695_CR18","doi-asserted-by":"crossref","unstructured":"Bao, X.,\u00a0Su, C.,\u00a0Xiong, Y.,\u00a0Huang, W.,\u00a0Hu, Y.: Flchain: A blockchain for auditable federated learning with trust and incentive, in 2019 5th International Conference on Big Data Computing and Communications (BIGCOM), pp.\u00a0151\u2013159, IEEE, (2019)","DOI":"10.1109\/BIGCOM.2019.00030"},{"key":"5695_CR19","doi-asserted-by":"crossref","unstructured":"Muddamsetty, S.M., Mohammad, N.J., Moeslund, T.B.: Sidu: similarity difference and uniqueness method for explainable ai, in 2020 IEEE International Conference on Image Processing (ICIP), pp.\u00a03269\u20133273, IEEE, (2020)","DOI":"10.1109\/ICIP40778.2020.9190952"},{"key":"5695_CR20","doi-asserted-by":"crossref","unstructured":"Campos, E.M.,\u00a0Gonzalez-Vidal, A., Hern\u00e1ndez-Ramos, J.L.,\u00a0Skarmeta, A.: Fedrdf: A robust and dynamic aggregation function against poisoning attacks in federated learning, IEEE Transactions on Emerging Topics in Computing, (2024)","DOI":"10.1109\/TETC.2024.3474484"},{"key":"5695_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Z.,\u00a0Cao, X.,\u00a0Jia, J., Gong, N.Z.: Fldetector: Defending federated learning against model poisoning attacks via detecting malicious clients, in Proceedings of the 28th ACM SIGKDD conference on knowledge discovery and data mining, pp.\u00a02545\u20132555, (2022)","DOI":"10.1145\/3534678.3539231"},{"key":"5695_CR22","unstructured":"Xu, J., Huang, S.-L.,\u00a0Song, L.,\u00a0Lan, T.: Signguard: Byzantine-robust federated learning through collaborative malicious gradient filtering, arXiv preprint arXiv:2109.05872, vol.\u00a05, (2021)"},{"issue":"1","key":"5695_CR23","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/TDSC.2021.3135422","volume":"20","author":"X Li","year":"2021","unstructured":"Li, X., Qu, Z., Zhao, S., Tang, B., Lu, Z., Liu, Y.: Lomar: A local defense against poisoning attack on federated learning. IEEE Trans. Dependable Secure Comput. 20(1), 437\u2013450 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"5695_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TNSE.2021.3053588","volume":"9","author":"N Mhaisen","year":"2021","unstructured":"Mhaisen, N., Abdellatif, A.A., Mohamed, A., Erbad, A., Guizani, M.: Optimal user-edge assignment in hierarchical federated learning based on statistical properties and network topology constraints. IEEE Transactions on Network Science and Engineering 9(1), 55\u201366 (2021)","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"5695_CR25","doi-asserted-by":"crossref","unstructured":"Hatefi, S.M.V.,\u00a0Dreyer, M.,\u00a0Achtibat, R.,\u00a0Wiegand, T.,\u00a0Samek, W.,\u00a0Lapuschkin, S.: Pruning by explaining revisited: Optimizing attribution methods to prune cnns and transformers\u201d in European Conference on Computer Vision, pp.\u00a0152\u2013169, Springer, (2024)","DOI":"10.1007\/978-3-031-92648-8_10"},{"key":"5695_CR26","unstructured":"Hahn, C.,\u00a0Kim, H.,\u00a0Kim, M.,\u00a0Hur, J.: Versa: Verifiable secure aggregation for cross-device federated learning, IEEE Transactions on Dependable and Secure Computing, (2021)"},{"issue":"6","key":"5695_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3675392","volume":"57","author":"B Chander","year":"2025","unstructured":"Chander, B., John, C., Warrier, L., Gopalakrishnan, K.: Toward trustworthy artificial intelligence (tai) in the context of explainability and robustness. ACM Comput. Surv. 57(6), 1\u201349 (2025)","journal-title":"ACM Comput. Surv."},{"issue":"5","key":"5695_CR28","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1631\/FITEE.2300181","volume":"25","author":"K Yan","year":"2024","unstructured":"Yan, K., Shu, N., Wu, T., Liu, C., Yang, P.: A survey of energy-efficient strategies for federated learning inmobile edge computing. Frontiers of Information Technology & Electronic Engineering 25(5), 645\u2013663 (2024)","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"5695_CR29","unstructured":"Ashwin R.J.: Ashwinrj\/federated-learning-pytorch: Implementation of communication-efficient learning of deep networks from decentralized data. Available at https:\/\/github.com\/AshwinRJ\/Federated-Learning-PyTorch (2022\/11\/12)"},{"key":"5695_CR30","unstructured":"Artificially intelligent tools for naturally creative humans. Available at https:\/\/deepai.org\/dataset\/mnist (2022\/11\/12)"},{"issue":"3","key":"5695_CR31","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., et al.: Imagenet large scale visual recognition challenge. International Journal of Computer Vision 115(3), 211\u2013252 (2015)","journal-title":"International Journal of Computer Vision"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05695-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05695-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05695-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T14:14:38Z","timestamp":1764771278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05695-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":31,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5695"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05695-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"22 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1021"}}