{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T11:52:44Z","timestamp":1776167564042,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007314","name":"Minnan Normal University","doi-asserted-by":"publisher","award":["KJ18024"],"award-info":[{"award-number":["KJ18024"]}],"id":[{"id":"10.13039\/501100007314","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2023J01920"],"award-info":[{"award-number":["2023J01920"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.adhoc.2026.104225","type":"journal-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:08:40Z","timestamp":1773929320000},"page":"104225","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["AFCG: A privacy-preserving federated learning framework against chained malicious attacks for vehicular networks"],"prefix":"10.1016","volume":"187","author":[{"given":"Hui","family":"Huang","sequence":"first","affiliation":[]},{"given":"Qilei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yanhua","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2026.104225_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107628","article-title":"An intelligent UAV based data aggregation algorithm for 5G-enabled internet of things","volume":"185","author":"Wang","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.adhoc.2026.104225_b2","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/TIFS.2022.3221899","article-title":"LSFL: A lightweight and secure federated learning scheme for edge computing","volume":"18","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.adhoc.2026.104225_b3","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2022.3174394","article-title":"PFLF: Privacy-preserving federated learning framework for edge computing","volume":"17","author":"Zhou","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.adhoc.2026.104225_b4","doi-asserted-by":"crossref","unstructured":"M. Abadi, A. Chu, I. Goodfellow, H.B. McMahan, I. Mironov, K. Talwar, L. Zhang, Deep learning with differential privacy, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 308\u2013318.","DOI":"10.1145\/2976749.2978318"},{"key":"10.1016\/j.adhoc.2026.104225_b5","doi-asserted-by":"crossref","unstructured":"D. Chaum, C. Cr\u00e9peau, I. Damgard, Multiparty unconditionally secure protocols, in: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, 1988, pp. 11\u201319.","DOI":"10.1145\/62212.62214"},{"key":"10.1016\/j.adhoc.2026.104225_b6","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/TIFS.2022.3169918","article-title":"ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning","volume":"17","author":"Ma","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.adhoc.2026.104225_b7","series-title":"2017 IEEE Symposium on Security and Privacy","first-page":"19","article-title":"Secureml: A system for scalable privacy-preserving machine learning","author":"Mohassel","year":"2017"},{"issue":"8","key":"10.1016\/j.adhoc.2026.104225_b8","doi-asserted-by":"crossref","first-page":"6178","DOI":"10.1109\/JIOT.2020.3022911","article-title":"Privacy-preserving federated learning framework based on chained secure multiparty computing","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2026.104225_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103685","article-title":"FLAV: Federated Learning for Autonomous Vehicle privacy protection","volume":"166","author":"Cui","year":"2025","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"10.1016\/j.adhoc.2026.104225_b10","doi-asserted-by":"crossref","first-page":"4861","DOI":"10.1109\/TNSM.2024.3393246","article-title":"Mchain-SFFL: Multi-chain aggregation privacy preserving for server-free federated learning","volume":"21","author":"Cui","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.adhoc.2026.104225_b11","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2021.103561","article-title":"Privacy-preserving Byzantine-robust federated learning","volume":"80","author":"Ma","year":"2022","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.adhoc.2026.104225_b12","series-title":"Secure federated learning against model poisoning attacks via client filtering","author":"Yaldiz","year":"2023"},{"key":"10.1016\/j.adhoc.2026.104225_b13","series-title":"International Symposium on Emerging Information Security and Applications","first-page":"20","article-title":"Federated learning poison attack detection scheme based on gradient similarity","author":"Zhao","year":"2024"},{"issue":"4","key":"10.1016\/j.adhoc.2026.104225_b14","doi-asserted-by":"crossref","first-page":"6722","DOI":"10.1109\/JIOT.2023.3312348","article-title":"Traffic sign recognition using optimized federated learning in internet of vehicles","volume":"11","author":"Lian","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2026.104225_b15","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/OJCS.2020.2992630","article-title":"Federated learning for vehicular internet of things: Recent advances and open issues","volume":"1","author":"Du","year":"2020","journal-title":"IEEE Open J. Comput. Soc."},{"issue":"2","key":"10.1016\/j.adhoc.2026.104225_b16","first-page":"70","article-title":"A survey of the social internet of vehicles: Secure data issues, solutions, and federated learning","volume":"15","author":"Xing","year":"2022","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104225_b17","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.dcan.2022.12.018","article-title":"A credibility-aware swarm-federated deep learning framework in internet of vehicles","volume":"10","author":"Wang","year":"2024","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.adhoc.2026.104225_b18","article-title":"Scenario-aware clustered federated learning for vehicle trajectory prediction with non-IID data","author":"Tao","year":"2024","journal-title":"Proc. Inst. Mech. Eng. D"},{"key":"10.1016\/j.adhoc.2026.104225_b19","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.future.2023.08.021","article-title":"Federated discrete reinforcement learning for automatic guided vehicle control","volume":"150","author":"Sierra-Garcia","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104225_b20","article-title":"Privacy-preserving vehicle assignment in the parking space sharing system","volume":"2020","author":"Fu","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"9","key":"10.1016\/j.adhoc.2026.104225_b21","doi-asserted-by":"crossref","first-page":"9355","DOI":"10.1109\/TVT.2021.3098170","article-title":"FedParking: A federated learning based parking space estimation with parked vehicle assisted edge computing","volume":"70","author":"Huang","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"10.1016\/j.adhoc.2026.104225_b22","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MNET.011.2000552","article-title":"Making a case for federated learning in the internet of vehicles and intelligent transportation systems","volume":"35","author":"Manias","year":"2021","journal-title":"IEEE Netw."},{"issue":"4","key":"10.1016\/j.adhoc.2026.104225_b23","doi-asserted-by":"crossref","first-page":"3347","DOI":"10.1109\/TKDE.2021.3124599","article-title":"A survey on federated learning systems: Vision, hype and reality for data privacy and protection","volume":"35","author":"Li","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.adhoc.2026.104225_b24","series-title":"Icassp 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing","first-page":"2927","article-title":"Private fl-gan: Differential privacy synthetic data generation based on federated learning","author":"Xin","year":"2020"},{"key":"10.1016\/j.adhoc.2026.104225_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103715","article-title":"Efficient federated learning privacy preservation method with heterogeneous differential privacy","volume":"139","author":"Ling","year":"2024","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104225_b26","article-title":"Masking and homomorphic encryption-combined secure aggregation for privacy-preserving federated learning","volume":"14","author":"Park","year":"2025","journal-title":"Electron. (2079-9292)"},{"issue":"22","key":"10.1016\/j.adhoc.2026.104225_b27","doi-asserted-by":"crossref","first-page":"4478","DOI":"10.3390\/electronics13224478","article-title":"Secure and flexible privacy-preserving federated learning based on multi-key fully homomorphic encryption","volume":"13","author":"Shen","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.adhoc.2026.104225_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100903","article-title":"Homomorphic federated learning schemes enabled pedestrian and vehicle detection system","volume":"23","author":"Mohammed","year":"2023","journal-title":"Internet Things"},{"issue":"1","key":"10.1016\/j.adhoc.2026.104225_b29","doi-asserted-by":"crossref","DOI":"10.1049\/ise2\/4632786","article-title":"Using homomorphic proxy re-encryption to enhance security and privacy of federated learning-based intelligent connected vehicles","volume":"2025","author":"Bai","year":"2025","journal-title":"IET Inf. Secur."},{"issue":"12","key":"10.1016\/j.adhoc.2026.104225_b30","doi-asserted-by":"crossref","first-page":"10861","DOI":"10.1002\/int.22987","article-title":"Federated learning-based trajectory prediction model with privacy preserving for intelligent vehicle","volume":"37","author":"Han","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"10.1016\/j.adhoc.2026.104225_b31","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.comcom.2024.05.009","article-title":"Privacy enhanced data aggregation based on federated learning in internet of vehicles (IoV)","volume":"223","author":"Mun","year":"2024","journal-title":"Comput. Commun."},{"key":"10.1016\/j.adhoc.2026.104225_b32","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.future.2020.12.003","article-title":"Privacy-preserving blockchain-based federated learning for traffic flow prediction","volume":"117","author":"Qi","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"10.1016\/j.adhoc.2026.104225_b33","doi-asserted-by":"crossref","first-page":"69","DOI":"10.23919\/JCC.2023.03.006","article-title":"Federated learning with blockchain for privacy-preserving data sharing in Internet of vehicles","volume":"20","author":"Jiang","year":"2023","journal-title":"China Commun."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104225_b34","article-title":"Blockchain-enabled federated learning with differential privacy for internet of vehicles","volume":"81","author":"Cui","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"10.1016\/j.adhoc.2026.104225_b35","series-title":"2022 IEEE 42nd International Conference on Distributed Computing Systems","first-page":"1223","article-title":"Byzantine-robust federated learning through collaborative malicious gradient filtering","author":"Xu","year":"2022"},{"issue":"13","key":"10.1016\/j.adhoc.2026.104225_b36","doi-asserted-by":"crossref","first-page":"2926","DOI":"10.3390\/electronics12132926","article-title":"Better safe than sorry: Constructing byzantine-robust federated learning with synthesized trust","volume":"12","author":"Geng","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.adhoc.2026.104225_b37","series-title":"Shielding federated learning: Robust aggregation with adaptive client selection","author":"Wan","year":"2022"},{"key":"10.1016\/j.adhoc.2026.104225_b38","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1109\/TIFS.2023.3322328","article-title":"Lds-fl: Loss differential strategy based federated learning for privacy preserving","volume":"19","author":"Wang","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.adhoc.2026.104225_b39","series-title":"2015 IEEE Global Communications Conference","first-page":"1","article-title":"A lightweight anonymous authentication protocol using k-pseudonym set in wireless networks","author":"Li","year":"2015"},{"issue":"4","key":"10.1016\/j.adhoc.2026.104225_b40","doi-asserted-by":"crossref","first-page":"7116","DOI":"10.1109\/JIOT.2023.3314748","article-title":"Efficient Byzantine-robust and privacy-preserving federated learning on compressive domain","volume":"11","author":"Hu","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104225_b41","doi-asserted-by":"crossref","first-page":"351","DOI":"10.3390\/app14010351","article-title":"FLGQM: robust federated learning based on geometric and qualitative metrics","volume":"14","author":"Liu","year":"2023","journal-title":"Appl. Sci."}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870526000910?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870526000910?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T10:59:54Z","timestamp":1776164394000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870526000910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":41,"alternative-id":["S1570870526000910"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2026.104225","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"AFCG: A privacy-preserving federated learning framework against chained malicious attacks for vehicular networks","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2026.104225","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104225"}}