{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T07:10:46Z","timestamp":1770102646010,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272199"],"award-info":[{"award-number":["62272199"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Major Project of Tibetan Autonomous Region of China","award":["XZ202201ZD0006G"],"award-info":[{"award-number":["XZ202201ZD0006G"]}]},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving","award":["2023B1212060036"],"award-info":[{"award-number":["2023B1212060036"]}]},{"name":"Guangdong Hong Kong Joint Laboratory for Data Security and Privacy Protection","award":["2023B1212120007"],"award-info":[{"award-number":["2023B1212120007"]}]},{"name":"National Joint Engineering Research Center of Network Security Detection and Protection Technology"},{"name":"Engineering Research Center of Trustworthy AI, Ministry of Education"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05900-1","type":"journal-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T18:42:45Z","timestamp":1770057765000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RPCFL: a byzantine-robust and privacy-preserving clustered federated learning framework"],"prefix":"10.1007","volume":"29","author":[{"given":"Pei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wuzheng","family":"Tan","sequence":"additional","affiliation":[]},{"given":"YiJian","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Hailong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Linlin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"key":"5900_CR1","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282 (2017). PMLR"},{"issue":"3","key":"5900_CR2","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.1109\/COMST.2020.2986024","volume":"22","author":"WYB Lim","year":"2020","unstructured":"Lim, W.Y.B., Luong, N.C., Hoang, D.T., Jiao, Y., Liang, Y.-C., Yang, Q., Niyato, D., Miao, C.: Federated learning in mobile edge networks: A comprehensive survey. IEEE communications surveys & tutorials 22(3), 2031\u20132063 (2020)","journal-title":"IEEE communications surveys & tutorials"},{"key":"5900_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128019","author":"B Liu","year":"2024","unstructured":"Liu, B., Lv, N., Guo, Y., Li, Y.: Recent advances on federated learning: A systematic survey. Neurocomputing (2024). https:\/\/doi.org\/10.1016\/j.neucom.2024.128019","journal-title":"Neurocomputing"},{"key":"5900_CR4","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.future.2023.09.008","volume":"150","author":"P Qi","year":"2024","unstructured":"Qi, P., Chiaro, D., Guzzo, A., Ianni, M., Fortino, G., Piccialli, F.: Model aggregation techniques in federated learning: A comprehensive survey. Futur. Gener. Comput. Syst. 150, 272\u2013293 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5900_CR5","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Zaheer, M., Sanjabi, M., Talwalkar, A., Smith, V.: Federated optimization in heterogeneous networks. Proceedings of Machine learning and systems 2, 429\u2013450 (2020)","journal-title":"Proceedings of Machine learning and systems"},{"issue":"8","key":"5900_CR6","doi-asserted-by":"publisher","first-page":"3710","DOI":"10.1109\/TNNLS.2020.3015958","volume":"32","author":"F Sattler","year":"2020","unstructured":"Sattler, F., M\u00fcller, K.-R., Samek, W.: Clustered federated learning: Model-agnostic distributed multitask optimization under privacy constraints. IEEE transactions on neural networks and learning systems 32(8), 3710\u20133722 (2020)","journal-title":"IEEE transactions on neural networks and learning systems"},{"issue":"11","key":"5900_CR7","first-page":"2661","volume":"33","author":"M Duan","year":"2021","unstructured":"Duan, M., Liu, D., Ji, X., Wu, Y., Liang, L., Chen, X., Tan, Y., Ren, A.: Flexible clustered federated learning for client-level data distribution shift. IEEE Trans. Parallel Distrib. Syst. 33(11), 2661\u20132674 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"5900_CR8","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s11280-022-01046-x","volume":"26","author":"G Long","year":"2023","unstructured":"Long, G., Xie, M., Shen, T., Zhou, T., Wang, X., Jiang, J.: Multi-center federated learning: clients clustering for better personalization. World Wide Web 26(1), 481\u2013500 (2023)","journal-title":"World Wide Web"},{"key":"5900_CR9","first-page":"19586","volume":"33","author":"A Ghosh","year":"2020","unstructured":"Ghosh, A., Chung, J., Yin, D., Ramchandran, K.: An efficient framework for clustered federated learning. Adv. Neural. Inf. Process. Syst. 33, 19586\u201319597 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"5900_CR10","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. Advances in neural information processing systems 32 (2019)"},{"key":"5900_CR11","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De\u00a0Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706 (2019). IEEE","DOI":"10.1109\/SP.2019.00029"},{"key":"5900_CR12","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy: A survey of results. In: International Conference on Theory and Applications of Models of Computation, pp. 1\u201319 (2008). Springer","DOI":"10.1007\/978-3-540-79228-4_1"},{"issue":"5","key":"5900_CR13","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5900_CR14","doi-asserted-by":"crossref","unstructured":"Hesamifard, E., Takabi, H., Ghasemi, M., Wright, R.N.: Privacy-preserving machine learning as a service. Proceedings on Privacy Enhancing Technologies (2018)","DOI":"10.1515\/popets-2018-0024"},{"issue":"2","key":"5900_CR15","first-page":"1364","volume":"19","author":"G Xu","year":"2020","unstructured":"Xu, G., Li, H., Zhang, Y., Xu, S., Ning, J., Deng, R.H.: Privacy-preserving federated deep learning with irregular users. IEEE Trans. Dependable Secure Comput. 19(2), 1364\u20131381 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5900_CR16","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A., Seth, K.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191 (2017)","DOI":"10.1145\/3133956.3133982"},{"key":"5900_CR17","doi-asserted-by":"crossref","unstructured":"Dong, Y., Xiaojun, C., Jing, W., Kaiyun, L., Wang, W.: Meteor: improved secure 3-party neural network inference with reducing online communication costs. In: Proceedings of the ACM Web Conference 2023, pp. 2087\u20132098 (2023)","DOI":"10.1145\/3543507.3583272"},{"key":"5900_CR18","doi-asserted-by":"crossref","unstructured":"Fereidooni, H., Marchal, S., Miettinen, M., Mirhoseini, A., M\u00f6llering, H., Nguyen, T.D., Rieger, P., Sadeghi, A.-R., Schneider, T., Yalame, H., : Safelearn: Secure aggregation for private federated learning. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 56\u201362 (2021). IEEE","DOI":"10.1109\/SPW53761.2021.00017"},{"issue":"4","key":"5900_CR19","doi-asserted-by":"publisher","first-page":"3453","DOI":"10.1109\/JIOT.2022.3228893","volume":"10","author":"J Shu","year":"2022","unstructured":"Shu, J., Yang, T., Liao, X., Chen, F., Xiao, Y., Yang, K., Jia, X.: Clustered federated multitask learning on non-iid data with enhanced privacy. IEEE Internet Things J. 10(4), 3453\u20133467 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5900_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3435476","author":"Z Chen","year":"2024","unstructured":"Chen, Z., Yu, S., Chen, F., Wang, F., Liu, X., Deng, R.H.: Lightweight privacy-preserving cross-cluster federated learning with heterogeneous data. IEEE Transactions on Information Forensics and Security (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3435476","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5900_CR21","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to $$\\{$$Byzantine-Robust$$\\}$$ federated learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1605\u20131622 (2020)"},{"key":"5900_CR22","doi-asserted-by":"crossref","unstructured":"Cao, X., Fang, M., Liu, J., Gong, N.Z.: Fltrust: Byzantine-robust federated learning via trust bootstrapping. arXiv preprint arXiv:2012.13995 (2020)","DOI":"10.14722\/ndss.2021.24434"},{"key":"5900_CR23","doi-asserted-by":"crossref","unstructured":"Lycklama, H., Burkhalter, L., Viand, A., K\u00fcchler, N., Hithnawi, A.: Rofl: Robustness of secure federated learning. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 453\u2013476 (2023). IEEE","DOI":"10.1109\/SP46215.2023.10179400"},{"key":"5900_CR24","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/TIFS.2022.3221899","volume":"18","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Wu, L., Ma, C., Li, J., Wang, J., Wang, Q., Yu, S.: Lsfl: A lightweight and secure federated learning scheme for edge computing. IEEE Trans. Inf. Forensics Secur. 18, 365\u2013379 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5900_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3370938","author":"Y Zhong","year":"2024","unstructured":"Zhong, Y., Tan, W., Xu, Z., Chen, S., Weng, J., Weng, J.: Wvfl: Weighted verifiable secure aggregation in federated learning. IEEE Internet of Things Journal (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3370938","journal-title":"IEEE Internet of Things Journal"},{"key":"5900_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3434660","author":"Y Chen","year":"2024","unstructured":"Chen, Y., Tan, W., Zhong, Y., Kang, Y., Yang, A., Weng, J.: Byzantine-robust and privacy-preserving federated learning with irregular participants. IEEE Internet of Things Journal (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3434660","journal-title":"IEEE Internet of Things Journal"},{"key":"5900_CR27","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., Ma, C., Yang, H.H., Farokhi, F., Jin, S., Quek, T.Q., Poor, H.V.: Federated learning with differential privacy: Algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5900_CR28","doi-asserted-by":"crossref","unstructured":"Liu, C., Chakraborty, S., Verma, D.: Secure model fusion for distributed learning using partial homomorphic encryption. Policy-Based Autonomic Data Governance, 154\u2013179 (2019)","DOI":"10.1007\/978-3-030-17277-0_9"},{"issue":"11","key":"5900_CR29","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"5900_CR30","doi-asserted-by":"crossref","unstructured":"Bell, J.H., Bonawitz, K.A., Gasc\u00f3n, A., Lepoint, T., Raykova, M.: Secure single-server aggregation with (poly) logarithmic overhead. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1253\u20131269 (2020)","DOI":"10.1145\/3372297.3417885"},{"key":"5900_CR31","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhao, D., Tao, L., Wang, K., Qiao, S., Zeng, X., Tan, C.W.: A credible and fair federated learning framework based on blockchain. IEEE Transactions on Artificial Intelligence (2024)","DOI":"10.1109\/TAI.2024.3355362"},{"key":"5900_CR32","unstructured":"Smith, V., Chiang, C.-K., Sanjabi, M., Talwalkar, A.S.: Federated multi-task learning. Advances in neural information processing systems 30 (2017)"},{"key":"5900_CR33","doi-asserted-by":"publisher","DOI":"10.31577\/cai_2024_1_1","author":"L Chen","year":"2024","unstructured":"Chen, L., Zhang, W., Dong, C., Huang, Z., Nie, Y., Hou, Z., Qiao, S., Tan, C.W.: Feddrl: Trustworthy federated learning model fusion method based on staged reinforcement learning. Computing and Informatics (2024). https:\/\/doi.org\/10.31577\/cai_2024_1_1","journal-title":"Computing and Informatics"},{"key":"5900_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/e26010096","author":"L Chen","year":"2024","unstructured":"Chen, L., Zhang, W., Dong, C., Zhao, D., Zeng, X., Qiao, S., Zhu, Y., Tan, C.W.: Fedtkd: A trustworthy heterogeneous federated learning based on adaptive knowledge distillation. Entropy (2024). https:\/\/doi.org\/10.3390\/e26010096","journal-title":"Entropy"},{"key":"5900_CR35","doi-asserted-by":"crossref","unstructured":"Briggs, C., Fan, Z., Andras, P.: Federated learning with hierarchical clustering of local updates to improve training on non-iid data. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20139 (2020). IEEE","DOI":"10.1109\/IJCNN48605.2020.9207469"},{"key":"5900_CR36","doi-asserted-by":"crossref","unstructured":"Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Annual International Cryptology Conference, pp. 420\u2013432 (1991). Springer","DOI":"10.1007\/3-540-46766-1_34"},{"key":"5900_CR37","doi-asserted-by":"crossref","unstructured":"Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G., Asai, K.: Secure division protocol and applications to privacy-preserving chi-squared tests. In: 2018 International Symposium on Information Theory and Its Applications (ISITA), pp. 530\u2013534 (2018). IEEE","DOI":"10.23919\/ISITA.2018.8664337"},{"key":"5900_CR38","volume-title":"k-means++: The advantages of careful seeding","author":"D Arthur","year":"2006","unstructured":"Arthur, D., Vassilvitskii, S.: k-means++: The advantages of careful seeding. Technical report, Stanford (2006)"},{"issue":"2","key":"5900_CR39","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in pcm. IEEE Trans. Inf. Theory 28(2), 129\u2013137 (1982)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5900_CR40","unstructured":"Ma, J., Zheng, Y., Feng, J., Zhao, D., Wu, H., Fang, W., Tan, J., Yu, C., Zhang, B., Wang, L.: $$\\{$$SecretFlow-SPU$$\\}$$: A performant and $$\\{$$User-Friendly$$\\}$$ framework for $$\\{$$Privacy-Preserving$$\\}$$ machine learning. In: 2023 USENIX Annual Technical Conference (USENIX ATC 23), pp. 17\u201333 (2023)"},{"issue":"11","key":"5900_CR41","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"5900_CR42","doi-asserted-by":"crossref","unstructured":"Cohen, G., Afshar, S., Tapson, J., Van\u00a0Schaik, A.: Emnist: Extending mnist to handwritten letters. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 2921\u20132926 (2017). IEEE","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"5900_CR43","unstructured":"Blanchard, P., El\u00a0Mhamdi, E.M., Guerraoui, R., Stainer, J.: Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in neural information processing systems 30 (2017)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05900-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05900-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05900-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T18:42:49Z","timestamp":1770057769000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05900-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,2]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5900"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05900-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,2]]},"assertion":[{"value":"12 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}}],"article-number":"125"}}