{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:49:58Z","timestamp":1774964998086,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:00:00Z","timestamp":1772668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T00:00:00Z","timestamp":1772668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100014103","name":"Key Research and Development Program of Shandong Province","doi-asserted-by":"crossref","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Key Research and Development Project","award":["Guike AB25069120"],"award-info":[{"award-number":["Guike AB25069120"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62272042"],"award-info":[{"award-number":["62272042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"DOI":"10.1007\/s12083-025-02193-4","type":"journal-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T11:51:54Z","timestamp":1772711514000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TCFL: Trapdoor homomorphic encryption based federated learning aggregator with filter"],"prefix":"10.1007","volume":"19","author":[{"given":"Xiaodong","family":"Shen","sequence":"first","affiliation":[]},{"given":"Yu","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,5]]},"reference":[{"key":"2193_CR1","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-Efficient Learning of Deep Networks from Decentralized Data. In: AISTATS, vol 54 (PMLR), pp 1273\u20131282"},{"key":"2193_CR2","unstructured":"Zhu L, Liu Z, Han S (2019) Deep leakage from gradients. In: NeurIPS, pp 14747\u201314756"},{"key":"2193_CR3","unstructured":"Dimitrov DI, Balunovic M, Konstantinov N, Vechev MT (2022) Data leakage in federated averaging. Trans Mach Learn Res 2022"},{"key":"2193_CR4","unstructured":"Geiping J, Bauermeister H, Dr\u00f6ge H, Moeller M (2020) Inverting gradients - how easy is it to break privacy in federated learning?. In: NeurIPS"},{"key":"2193_CR5","doi-asserted-by":"publisher","unstructured":"Melis L, Song C, Cristofaro ED, Shmatikov V (2019) Exploiting Unintended Feature Leakage in Collaborative Learning. In: IEEE symposium on security and privacy (IEEE), pp 691\u2013706. https:\/\/doi.org\/10.1109\/SP.2019.00029","DOI":"10.1109\/SP.2019.00029"},{"key":"2193_CR6","doi-asserted-by":"publisher","first-page":"10708","DOI":"10.1109\/ACCESS.2023.3238823","volume":"11","author":"G Xia","year":"2023","unstructured":"Xia G, Chen J, Yu C, Ma J (2023) Poisoning attacks in federated learning: A survey. IEEE Access 11:10708\u201310722. https:\/\/doi.org\/10.1109\/ACCESS.2023.3238823","journal-title":"IEEE Access"},{"key":"2193_CR7","doi-asserted-by":"publisher","unstructured":"Bonawitz KA, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: CCS (ACM), pp 1175\u20131191. https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"},{"key":"2193_CR8","unstructured":"Blanchard P, Mhamdi EME, Guerraoui R, Stainer J (2017) Machine learning with adversaries: byzantine tolerant gradient descent. In: NIPS, pp 119\u2013129"},{"key":"2193_CR9","unstructured":"Yin D, Chen Y, Ramchandran K, Bartlett PL (2018) Byzantine-robust distributed learning: towards optimal statistical rates. In: ICML, proceedings of machine learning research, vol 80 (PMLR), pp 5636\u20135645"},{"key":"2193_CR10","doi-asserted-by":"crossref","unstructured":"Cao X, Fang M, Liu J, Gong NZ (2021) FLTrust: byzantine-robust federated learning via trust bootstrapping. In: NDSS (The Internet Society)","DOI":"10.14722\/ndss.2021.24434"},{"key":"2193_CR11","unstructured":"Pan X, Zhang M, Wu D, Xiao Q, Ji S, Yang M (2020) Justinian\u2019s GAAvernor: robust distributed learning with gradient aggregation agent. In: USENIX Security (USENIX Association), pp 1641\u20131658"},{"issue":"5","key":"2193_CR12","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong LT, Aono Y, Hayashi T, Wang L, Moriai S (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333\u20131345. https:\/\/doi.org\/10.1109\/TIFS.2017.2787987","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2193_CR13","doi-asserted-by":"publisher","unstructured":"Yin X, Zhu Y, Hu J (2021) A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions. ACM Comput Surv 54(6):131:1\u2013131:36. https:\/\/doi.org\/10.1145\/3460427","DOI":"10.1145\/3460427"},{"key":"2193_CR14","doi-asserted-by":"crossref","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1310\u20131321","DOI":"10.1145\/2810103.2813687"},{"key":"2193_CR15","unstructured":"Zhang C, Li S, Xia J, Wang W, Yan F, Liu Y (2020) BatchCrypt: efficient homomorphic encryption for cross-silo federated learning. In: USENIX ATC (USENIX Association), pp 493\u2013506"},{"key":"2193_CR16","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/TIFS.2022.3169918","volume":"17","author":"Z Ma","year":"2022","unstructured":"Ma Z, Ma J, Miao Y, Li Y, Deng RH (2022) Shieldfl: Mitigating model poisoning attacks in privacy-preserving federated learning. IEEE Trans Inf Forensics Secur 17:1639\u20131654. https:\/\/doi.org\/10.1109\/TIFS.2022.3169918","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"2193_CR17","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1109\/TIFS.2016.2573770","volume":"11","author":"X Liu","year":"2016","unstructured":"Liu X, Deng RH, Choo KR, Weng J (2016) An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans Inf Forensics Secur 11(11):2401\u20132414. https:\/\/doi.org\/10.1109\/TIFS.2016.2573770","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"2193_CR18","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1145\/362342.362367","volume":"16","author":"C Bron","year":"1973","unstructured":"Bron C, Kerbosch J (1973) Finding all cliques of an undirected graph (algorithm 457). Commun ACM 16(9):575\u2013576","journal-title":"Commun ACM"},{"key":"2193_CR19","doi-asserted-by":"publisher","unstructured":"Xu J, Huang S, Song L, Lan T (2022) Byzantine-robust federated learning through collaborative malicious gradient filtering. In: ICDCS (IEEE), pp 1223\u20131235. https:\/\/doi.org\/10.1109\/ICDCS54860.2022.00120","DOI":"10.1109\/ICDCS54860.2022.00120"},{"key":"2193_CR20","unstructured":"Yu H, Jin R, Yang S (2019) On the linear speedup analysis of communication efficient momentum SGD for distributed non-convex optimization. In: ICML, proceedings of machine learning research, vol 97 (PMLR), pp 7184\u20137193"},{"key":"2193_CR21","unstructured":"Li X, Huang K, Yang W, Wang S, Zhang Z (2020) On the convergence of FedAvg on Non-IID Data. In: ICLR (OpenReview.net)"},{"key":"2193_CR22","doi-asserted-by":"publisher","unstructured":"Bresson E, Catalano D, Pointcheval D (2003) A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: ASIACRYPT, lecture notes in computer science, vol 2894 (Springer), pp 37\u201354. https:\/\/doi.org\/10.1007\/978-3-540-40061-5_3","DOI":"10.1007\/978-3-540-40061-5_3"},{"issue":"11","key":"2193_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun ACM"},{"key":"2193_CR24","unstructured":"Akinyele JA, Green M, Rubin AD (2012) Charm: a framework for rapidly prototyping cryptosystems. In: NDSS (The Internet Society)"},{"key":"2193_CR25","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-Efficient Learning of Deep Networks from Decentralized Data. In: AISTATS, proceedings of machine learning research, vol 54 (PMLR), pp 1273\u20131282"},{"issue":"7","key":"2193_CR26","doi-asserted-by":"publisher","first-page":"2168","DOI":"10.1109\/JSAC.2020.3041404","volume":"39","author":"J So","year":"2021","unstructured":"So J, G\u00fcler B, Avestimehr AS (2021) Byzantine-resilient secure federated learning. IEEE J Sel Areas Commun 39(7):2168\u20132181. https:\/\/doi.org\/10.1109\/JSAC.2020.3041404","journal-title":"IEEE J Sel Areas Commun"},{"key":"2193_CR27","unstructured":"Xie C, Huang K, Chen P, Li B (2020) DBA: distributed backdoor attacks against federated learning. In: ICLR (OpenReview.net)"},{"key":"2193_CR28","unstructured":"Fang M, Cao X, Jia J, Gong NZ(2020) Local model poisoning attacks to byzantine-robust federated learning. In: USENIX Security (USENIX Association), pp 1605\u20131622"},{"key":"2193_CR29","unstructured":"Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V (2020) How to backdoor federated learning. In: AISTATS, proceedings of machine learning research, vol 108 (PMLR), pp 2938\u20132948"},{"key":"2193_CR30","doi-asserted-by":"publisher","first-page":"4574","DOI":"10.1109\/TIFS.2021.3108434","volume":"16","author":"X Liu","year":"2021","unstructured":"Liu X, Li H, Xu G, Chen Z, Huang X, Lu R (2021) Privacy-enhanced federated learning against poisoning adversaries. IEEE Trans Inf Forensics Secur 16:4574\u20134588. https:\/\/doi.org\/10.1109\/TIFS.2021.3108434","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02193-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02193-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02193-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T12:54:24Z","timestamp":1774961664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02193-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,5]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["2193"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02193-4","relation":{},"ISSN":["1936-6450"],"issn-type":[{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,5]]},"assertion":[{"value":"15 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"58"}}