{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T22:04:43Z","timestamp":1761775483544,"version":"build-2065373602"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"the Jiangsu Province Postgraduate Practice and Innovation Program Project","award":["SJCX25_2192"],"award-info":[{"award-number":["SJCX25_2192"]}]},{"name":"Jiangsu Province Universities Natural Science Research Major Project","award":["23KJA520003"],"award-info":[{"award-number":["23KJA520003"]}]},{"name":"Jiangsu Province Postgraduate Practice and Innovation Program Project","award":["SJCX25_2190"],"award-info":[{"award-number":["SJCX25_2190"]}]},{"name":"Huaian Science and Technology Plan Project Natural Science Research","award":["HAB2024048"],"award-info":[{"award-number":["HAB2024048"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s44443-025-00256-3","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T16:21:00Z","timestamp":1758730860000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DMAFL: Effective defense against malicious attacker federated learning framework via blockchain and TFHE"],"prefix":"10.1007","volume":"37","author":[{"given":"Chunhua","family":"Jin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3651-5143","authenticated-orcid":false,"given":"Jiahao","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wanru","family":"Lu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chenfeng","family":"Luo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junyi","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guanhua","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhonghao","family":"Zhai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"key":"256_CR1","doi-asserted-by":"publisher","unstructured":"Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V (2020) How to backdoor federated learning. In: International conference on artificial intelligence and statistics. PMLR, pp 2938\u20132948. https:\/\/doi.org\/10.48550\/arXiv.1807.00459","DOI":"10.48550\/arXiv.1807.00459"},{"key":"256_CR2","doi-asserted-by":"publisher","first-page":"109893","DOI":"10.1016\/j.compeleceng.2024.109893","volume":"121","author":"S Basak","year":"2025","unstructured":"Basak S, Chatterjee K (2025) Dpad: Data poisoning attack defense mechanism for federated learning-based system. Comput Electr Eng 121:109893. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109893","journal-title":"Comput Electr Eng"},{"key":"256_CR3","doi-asserted-by":"publisher","unstructured":"Bhargava S, Stamp M (2025) Robustness of selected learning models under label-flipping attack. arXiv:2501.12516. https:\/\/doi.org\/10.48550\/arXiv.2501.12516","DOI":"10.48550\/arXiv.2501.12516"},{"key":"256_CR4","doi-asserted-by":"publisher","first-page":"103761","DOI":"10.1016\/j.adhoc.2025.103761","volume":"170","author":"S Cao","year":"2025","unstructured":"Cao S, Liu S, Yang Y, Du W, Zhan Z, Wang D, Zhang W (2025) A hybrid and efficient federated learning for privacy preservation in iot devices. Ad Hoc Netw 170:103761. https:\/\/doi.org\/10.1016\/j.adhoc.2025.103761","journal-title":"Ad Hoc Netw"},{"key":"256_CR5","doi-asserted-by":"publisher","unstructured":"Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. In: OsDI 99:173\u2013186. https:\/\/doi.org\/10.5555\/296806.296824","DOI":"10.5555\/296806.296824"},{"key":"256_CR6","doi-asserted-by":"publisher","unstructured":"Chai Z, Chen Y, Anwar A, Zhao L, Cheng Y, Rangwala H (2021) Fedat: A high-performance and communication-efficient federated learning system with asynchronous tiers. In: Proceedings of the international conference for high performance computing, networking, storage and analysis, pp 1\u201316. https:\/\/doi.org\/10.1145\/3458817.3476211","DOI":"10.1145\/3458817.3476211"},{"key":"256_CR7","doi-asserted-by":"publisher","unstructured":"Cheon JH, Kim A, Kim M, Song Y (2017a) Homomorphic encryption for arithmetic of approximate numbers. In: Advances in Cryptology\u2013ASIACRYPT 2017: 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23. Springer, pp 409\u2013437. https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"256_CR8","doi-asserted-by":"publisher","unstructured":"Cheon JH, Kim A, Kim M, Song Y (2017b) Homomorphic encryption for arithmetic of approximate numbers. In: International conference on the theory and application of cryptology and information security. Springer, pp 409\u2013437. https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"256_CR9","doi-asserted-by":"publisher","unstructured":"Cui L, Su X, Zhou Y, Liu J (2022) Optimal rate adaption in federated learning with compressed communications. In: IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, pp 1459\u20131468. https:\/\/doi.org\/10.1109\/INFOCOM48880.2022.9796982","DOI":"10.1109\/INFOCOM48880.2022.9796982"},{"key":"256_CR10","doi-asserted-by":"publisher","unstructured":"El-Kabid A, El-Mhamdi E-M (2025) Approaching the harm of gradient attacks while only flipping labels. arXiv:2503.00140. https:\/\/doi.org\/10.48550\/arXiv.2503.00140","DOI":"10.48550\/arXiv.2503.00140"},{"issue":"110","key":"256_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5555\/3648699.3648809","volume":"24","author":"Y Fraboni","year":"2023","unstructured":"Fraboni Y, Vidal R, Kameni L, Lorenzi M (2023) A general theory for federated optimization with asynchronous and heterogeneous clients updates. J Mach Learn Res 24(110):1\u201343. https:\/\/doi.org\/10.5555\/3648699.3648809","journal-title":"J Mach Learn Res"},{"key":"256_CR12","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","volume":"134","author":"S Gao","year":"2024","unstructured":"Gao S, Liu J, Iu HH-C, Erkan U, Zhou S, Wu R, Tang X (2024a) Development of a video encryption algorithm for critical areas using 2d extended schaffer function map and neural networks. Appl Math Model 134:520\u2013537. https:\/\/doi.org\/10.1016\/j.apm.2024.06.016","journal-title":"Appl Math Model"},{"key":"256_CR13","doi-asserted-by":"publisher","first-page":"114958","DOI":"10.1016\/j.chaos.2024.114958","volume":"183","author":"S Gao","year":"2024","unstructured":"Gao S, Iu HH-C, Mou J, Erkan U, Liu J, Wu R, Tang X (2024b) Temporal action segmentation for video encryption. Chaos Soliton Fract 183:114958. https:\/\/doi.org\/10.1016\/j.chaos.2024.114958","journal-title":"Chaos Soliton Fract"},{"key":"256_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3545868","author":"S Gao","year":"2025","unstructured":"Gao S, Iu HH-C, Erkan U, Simsek C, Toktas A, Cao Y, Wu R, Mou J, Li Q, Wang C (2025a) A 3d memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption. IEEE Trans Circuits Syst Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2025.3545868","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"256_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3540097","author":"S Gao","year":"2025","unstructured":"Gao S, Zhang Z, Iu HH-C, Ding S, Mou J, Erkan U, Toktas A, Li Q, Wang C, Cao Y (2025b) A parallel color image encryption algorithm based on a 2d logistic-rulkov neuron map. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2025.3540097","journal-title":"IEEE Internet Things J"},{"key":"256_CR16","doi-asserted-by":"publisher","unstructured":"Gao S, Ding S, Ho-Ching\u00a0Iu H, Erkan U, Toktas A, Simsek C, Wu R, Xu X, Cao Y, Mou J (2025c) A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos An Interdisciplinary Journal of Nonlinear Science 35(7). https:\/\/doi.org\/10.1063\/5.0270220","DOI":"10.1063\/5.0270220"},{"key":"256_CR17","doi-asserted-by":"publisher","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing, pp 169\u2013178. https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"256_CR18","doi-asserted-by":"publisher","unstructured":"Ghodsi Z, Javaheripi M, Sheybani N, Zhang X, Huang K, Koushanfar F (2023) zprobe: Zero peek robustness checks for federated learning. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 4860\u20134870. https:\/\/doi.org\/10.1109\/ICCV51070.2023.00448","DOI":"10.1109\/ICCV51070.2023.00448"},{"key":"256_CR19","doi-asserted-by":"publisher","unstructured":"Guo H, Wang H, Song T, Hua Y, Lv Z, Jin X, Xue Z, Ma R, Guan H (2021) Siren: Byzantine-robust federated learning via proactive alarming. In: Proceedings of the ACM symposium on cloud computing, pp 47\u201360. https:\/\/doi.org\/10.1145\/3472883.3486990","DOI":"10.1145\/3472883.3486990"},{"key":"256_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3186006","author":"H Guo","year":"2022","unstructured":"Guo H, Li W, Nejad M, Shen C-C (2022) A hybrid blockchain-edge architecture for electronic health record management with attribute-based cryptographic mechanisms. IEEE Trans Netw Serv Manage. https:\/\/doi.org\/10.1109\/TNSM.2022.3186006","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"256_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3318990","author":"H Guo","year":"2023","unstructured":"Guo H, Meese C, Li W, Shen C-C, Nejad M (2023) B 2 sfl: A bi-level blockchained architecture for secure federated learning-based traffic prediction. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2023.3318990","journal-title":"IEEE Trans Serv Comput"},{"issue":"6","key":"256_CR22","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/TII.2021.3085960","volume":"18","author":"B Jia","year":"2021","unstructured":"Jia B, Zhang X, Liu J, Zhang Y, Huang K, Liang Y (2021) Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in iiot. IEEE Trans Industr Inf 18(6):4049\u20134058. https:\/\/doi.org\/10.1109\/TII.2021.3085960","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"256_CR23","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.jksuci.2023.01.007","volume":"35","author":"P Jia","year":"2023","unstructured":"Jia P, Zhang J, Zhao B, Li H, Liu X (2023) Privacy-preserving association rule mining via multi-key fully homomorphic encryption. J King Saud Univ - Comput Inf Sci 35(2):641\u2013650. https:\/\/doi.org\/10.1016\/j.jksuci.2023.01.007","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"256_CR24","doi-asserted-by":"publisher","unstructured":"Kazmi SHA, Qamar F, Hassan R, Nisar K, Al-Betar MA (2024) Security of federated learning in 6g era: a review on conceptual techniques and software platforms used for research and analysis. Comput Netw 110358. https:\/\/doi.org\/10.1016\/j.comnet.2024.110358","DOI":"10.1016\/j.comnet.2024.110358"},{"key":"256_CR25","doi-asserted-by":"publisher","first-page":"107818","DOI":"10.1016\/j.compeleceng.2022.107818","volume":"99","author":"FA KhoKhar","year":"2022","unstructured":"KhoKhar FA, Shah JH, Khan MA, Sharif M, Tariq U, Kadry S (2022) A review on federated learning towards image processing. Comput Electr Eng 99:107818. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107818","journal-title":"Comput Electr Eng"},{"key":"256_CR26","doi-asserted-by":"publisher","unstructured":"Kuang W, Qian B, Li Z, Chen D, Gao D, Pan X, Xie Y, Li Y, Ding B, Zhou J (2023) Federatedscope-llm: A comprehensive package for fine-tuning large language models in federated learning. arXiv:2309.00363. https:\/\/doi.org\/10.1145\/3637528.3671573","DOI":"10.1145\/3637528.3671573"},{"issue":"2","key":"256_CR27","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/s10479-022-04535-4","volume":"345","author":"S Kumar","year":"2025","unstructured":"Kumar S, Sharma D, Rao S, Lim WM, Mangla SK (2025) Past, present, and future of sustainable finance: insights from big data analytics through machine learning of scholarly research. Ann Oper Res 345(2):1061\u20131104. https:\/\/doi.org\/10.1007\/s10479-022-04535-4","journal-title":"Ann Oper Res"},{"key":"256_CR28","doi-asserted-by":"publisher","unstructured":"Lee S, Zhang T, Avestimehr AS (2023) Layer-wise adaptive model aggregation for scalable federated learning. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, pp 8491\u20138499. https:\/\/doi.org\/10.1609\/aaai.v37i7.26023","DOI":"10.1609\/aaai.v37i7.26023"},{"key":"256_CR29","doi-asserted-by":"publisher","first-page":"429","DOI":"10.48550\/arXiv.1812.06127","volume":"2","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2020) Federated optimization in heterogeneous networks. Proc Mach Learn Syst 2:429\u2013450. https:\/\/doi.org\/10.48550\/arXiv.1812.06127","journal-title":"Proc Mach Learn Syst"},{"issue":"4","key":"256_CR30","doi-asserted-by":"publisher","first-page":"4521","DOI":"10.1109\/TPAMI.2022.3195956","volume":"45","author":"B Li","year":"2022","unstructured":"Li B, Fan L, Gu H, Li J, Yang Q (2022) Fedipr: Ownership verification for federated deep neural network models. IEEE Trans Pattern Anal Mach Intell 45(4):4521\u20134536. https:\/\/doi.org\/10.1109\/TPAMI.2022.3195956","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"256_CR31","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TCSII.2023.3300330","volume":"71","author":"Q Li","year":"2023","unstructured":"Li Q, Ma B, Wang X, Wang C, Gao S (2023) Image steganography in color conversion. IEEE Trans Circuits Syst II Express Briefs 71(1):106\u2013110. https:\/\/doi.org\/10.1109\/TCSII.2023.3300330","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"256_CR32","doi-asserted-by":"publisher","unstructured":"Li Y, Xia C, Li C, Li X, Wang T (2025) Flssm: A federated learning storage security model with homomorphic encryption. arXiv:2504.11088. https:\/\/doi.org\/10.48550\/arXiv.2504.11088","DOI":"10.48550\/arXiv.2504.11088"},{"key":"256_CR33","doi-asserted-by":"publisher","unstructured":"Madi A, Stan O, Mayoue A, Grivet-S\u00e9bert A, Gouy-Pailler C, Sirdey R (2021) A secure federated learning framework using homomorphic encryption and verifiable computing. In: 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/RDAAPS48126.2021.9452005","DOI":"10.1109\/RDAAPS48126.2021.9452005"},{"key":"256_CR34","doi-asserted-by":"publisher","first-page":"112405","DOI":"10.1016\/j.asoc.2024.112405","volume":"167","author":"GK Mahato","year":"2024","unstructured":"Mahato GK, Banerjee A, Chakraborty SK, Gao X-Z (2024) Privacy preserving verifiable federated learning scheme using blockchain and homomorphic encryption. Appl Soft Comput 167:112405. https:\/\/doi.org\/10.1016\/j.asoc.2024.112405","journal-title":"Appl Soft Comput"},{"key":"256_CR35","doi-asserted-by":"publisher","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR, pp 1273\u20131282. https:\/\/doi.org\/10.48550\/arXiv.1602.05629","DOI":"10.48550\/arXiv.1602.05629"},{"key":"256_CR36","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri V, Parizi RM, Pouriyeh S, Huang Y, Dehghantanha A, Srivastava G (2021) A survey on security and privacy of federated learning. Futur Gener Comput Syst 115:619\u2013640. https:\/\/doi.org\/10.1016\/j.future.2020.10.007","journal-title":"Futur Gener Comput Syst"},{"key":"256_CR37","doi-asserted-by":"publisher","unstructured":"Pathade C, Patil S (2025) Securing genomic data against inference attacks in federated learning environments. arXiv:2505.07188. https:\/\/doi.org\/10.48550\/arXiv.2505.07188","DOI":"10.48550\/arXiv.2505.07188"},{"key":"256_CR38","doi-asserted-by":"publisher","unstructured":"Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In: Annual international cryptology conference. Springer, pp 129\u2013140. https:\/\/doi.org\/10.1007\/3-540-46766-1_9","DOI":"10.1007\/3-540-46766-1_9"},{"key":"256_CR39","doi-asserted-by":"publisher","unstructured":"Perazzone J, Wang S, Ji M, Chan KS (2022) Communication-efficient device scheduling for federated learning using stochastic optimization. In: IEEE INFOCOM 2022-IEEE conference on computer communications. IEEE, pp 1449\u20131458. https:\/\/doi.org\/10.1109\/INFOCOM48880.2022.9796818","DOI":"10.1109\/INFOCOM48880.2022.9796818"},{"key":"256_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2022.03.003","volume":"133","author":"N Rodr\u00edguez-Barroso","year":"2022","unstructured":"Rodr\u00edguez-Barroso N, Mart\u00ednez-C\u00e1mara E, Luz\u00f3n MV, Herrera F (2022) Dynamic defense against byzantine poisoning attacks in federated learning. Futur Gener Comput Syst 133:1\u20139. https:\/\/doi.org\/10.1016\/j.future.2022.03.003","journal-title":"Futur Gener Comput Syst"},{"key":"256_CR41","unstructured":"R\u00fcckert M, Schneider M (2010) Estimating the security of lattice-based cryptosystems. Cryptology ePrint Archive, Paper 2010\/137. https:\/\/eprint.iacr.org\/2010\/137"},{"issue":"16","key":"256_CR42","doi-asserted-by":"publisher","first-page":"6002","DOI":"10.1002\/cpe.6002","volume":"34","author":"S Shen","year":"2022","unstructured":"Shen S, Zhu T, Wu D, Wang W, Zhou W (2022) From distributed machine learning to federated learning: in the view of data privacy and security. Concurr Comput Pract Exp 34(16):6002. https:\/\/doi.org\/10.1002\/cpe.6002","journal-title":"Concurr Comput Pract Exp"},{"issue":"8","key":"256_CR43","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10462-025-11170-5","volume":"58","author":"D Shenoy","year":"2025","unstructured":"Shenoy D, Bhat R, Krishna Prakasha K (2025) Exploring privacy mechanisms and metrics in federated learning. Artif Intell Rev 58(8):223. https:\/\/doi.org\/10.1007\/s10462-025-11170-5","journal-title":"Artif Intell Rev"},{"issue":"1","key":"256_CR44","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1038\/s41558-023-01890-3","volume":"14","author":"AJ Sietsma","year":"2024","unstructured":"Sietsma AJ, Ford JD, Minx JC (2024) The next generation of machine learning for tracking adaptation texts. Nat Clim Chang 14(1):31\u201339. https:\/\/doi.org\/10.1038\/s41558-023-01890-3","journal-title":"Nat Clim Chang"},{"key":"256_CR45","doi-asserted-by":"publisher","unstructured":"So J, Ali RE, G\u00fcler B, Jiao J, Avestimehr AS (2023) Securing secure aggregation: mitigating multi-round privacy leakage in federated learning. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, pp 9864\u20139873. https:\/\/doi.org\/10.1609\/aaai.v37i8.26177","DOI":"10.1609\/aaai.v37i8.26177"},{"key":"256_CR46","doi-asserted-by":"publisher","unstructured":"Tam P, Corrado R, Eang C, Kim S (2023) Applicability of deep reinforcement learning for efficient federated learning in massive iot communications. Appl Sci 13(5):3083. https:\/\/doi.org\/10.3390\/app13053083","DOI":"10.3390\/app13053083"},{"key":"256_CR47","doi-asserted-by":"publisher","unstructured":"Thomas R, Sujithra M, Senthilkumar B (2025) The role of ai and ml in shaping predictive analytics for modern business intelligence: techniques, challenges, and applications for data-driven decision-making. AI-Powered Business Intelligence for Modern Organizations, 51\u201378. https:\/\/doi.org\/10.4018\/979-8-3693-8844-0.ch003","DOI":"10.4018\/979-8-3693-8844-0.ch003"},{"key":"256_CR48","doi-asserted-by":"publisher","unstructured":"Wan W, Hu S, Li M, Lu J, Zhang L, Zhang LY, Jin H (2023) A four-pronged defense against byzantine attacks in federated learning. In: Proceedings of the 31st ACM international conference on multimedia, pp 7394\u20137402. https:\/\/doi.org\/10.1145\/3581783.3612474","DOI":"10.1145\/3581783.3612474"},{"key":"256_CR49","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3147792","author":"Z Wang","year":"2022","unstructured":"Wang Z, Xu H, Liu J, Xu Y, Huang H, Zhao Y (2022) Accelerating federated learning with cluster construction and hierarchical aggregation. IEEE Trans Mob Comput. https:\/\/doi.org\/10.1109\/TMC.2022.3147792","journal-title":"IEEE Trans Mob Comput"},{"key":"256_CR50","doi-asserted-by":"publisher","first-page":"110677","DOI":"10.1016\/j.asoc.2023.110677","volume":"146","author":"B Wang","year":"2023","unstructured":"Wang B, Li H, Guo Y, Wang J (2023) Ppflhe: A privacy-preserving federated learning scheme with homomorphic encryption for healthcare data. Appl Soft Comput 146:110677. https:\/\/doi.org\/10.1016\/j.asoc.2023.110677","journal-title":"Appl Soft Comput"},{"key":"256_CR51","doi-asserted-by":"publisher","unstructured":"Wang C, Chen S, Wu H, Guo Z, Xing M, Feng Z (2024) A trust enhancement model based on distributed learning and blockchain in service ecosystems. J King Saud Univ - Comput Inf Sci 102147. https:\/\/doi.org\/10.1016\/j.jksuci.2024.102147","DOI":"10.1016\/j.jksuci.2024.102147"},{"key":"256_CR52","doi-asserted-by":"publisher","unstructured":"Wang C, Zhang Q, Wang X, Zhou L, Li Q, Xia Z, Ma B, Shi Y-Q (2025a) Light-field image multiple reversible robust watermarking against geometric attacks. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2025.3576223","DOI":"10.1109\/TDSC.2025.3576223"},{"key":"256_CR53","doi-asserted-by":"publisher","unstructured":"Wang H, Cheng X, Wu H, Luo X, Ma B, Zong H, Zhang J, Wang J (2025b) A gan-based anti-forensics method by modifying the quantization table in jpeg header file. J Vis Commun Image Represent 104462. https:\/\/doi.org\/10.1016\/j.jvcir.2025.104462","DOI":"10.1016\/j.jvcir.2025.104462"},{"key":"256_CR54","doi-asserted-by":"publisher","unstructured":"Xiang K, Yang H, Hao M, Li S, Wang H, Ding Z, Jiang W, Zhang T (2025) The gradient puppeteer: Adversarial domination in gradient leakage attacks through model poisoning. arXiv:2502.04106. https:\/\/doi.org\/10.48550\/arXiv.2502.04106","DOI":"10.48550\/arXiv.2502.04106"},{"issue":"4","key":"256_CR55","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1007\/s10586-021-03399-w","volume":"25","author":"J Xu","year":"2022","unstructured":"Xu J, Lin J, Liang W, Li K-C (2022) Privacy preserving personalized blockchain reliability prediction via federated learning in iot environments. Clust Comput 25(4):2515\u20132526. https:\/\/doi.org\/10.1007\/s10586-021-03399-w","journal-title":"Clust Comput"},{"issue":"5","key":"256_CR56","doi-asserted-by":"publisher","first-page":"4309","DOI":"10.1109\/TDSC.2024.3350206","volume":"21","author":"R Xu","year":"2024","unstructured":"Xu R, Li B, Li C, Joshi JB, Ma S, Li J (2024) Tapfed: Threshold secure aggregation for privacy-preserving federated learning. IEEE Trans Dependable Secure Comput 21(5):4309\u20134323. https:\/\/doi.org\/10.1109\/TDSC.2024.3350206","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"256_CR57","doi-asserted-by":"publisher","first-page":"6693","DOI":"10.1109\/TIFS.2024.3420126","volume":"19","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Karimipour H, Srivastava G, Parizi RM (2024) A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans Inf Forensics Secur 19:6693\u20136708. https:\/\/doi.org\/10.1109\/TIFS.2024.3420126","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"256_CR58","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2025.3528569","author":"Z Zhang","year":"2025","unstructured":"Zhang Z, Wu L, Jin J, Wang E, Liu B, Han Q-L (2025) Secure federated learning for cloud-fog automation: vulnerabilities, challenges, solutions, and future directions. IEEE Trans Industr Inf. https:\/\/doi.org\/10.1109\/TII.2025.3528569","journal-title":"IEEE Trans Industr Inf"},{"key":"256_CR59","doi-asserted-by":"publisher","unstructured":"Zhu H, Ling Q (2022) Bridging differential privacy and byzantine-robustness via model aggregation. arXiv:2205.00107. https:\/\/doi.org\/10.48550\/arXiv.2205.00107","DOI":"10.48550\/arXiv.2205.00107"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00256-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00256-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00256-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T22:03:02Z","timestamp":1761775382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00256-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"references-count":59,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["256"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00256-3","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,9,24]]},"assertion":[{"value":"6 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"231"}}