{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:47:27Z","timestamp":1776876447472,"version":"3.51.2"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471139"],"award-info":[{"award-number":["62471139"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008462","name":"Fujian University of Technology","doi-asserted-by":"publisher","award":["GY-S24002"],"award-info":[{"award-number":["GY-S24002"]}],"id":[{"id":"10.13039\/501100008462","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115183","type":"journal-article","created":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T16:34:24Z","timestamp":1776011664000},"page":"115183","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["RFD-ML: Robust federated defense via meta-learning"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7435-3159","authenticated-orcid":false,"given":"Hongming","family":"Hou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0677-3667","authenticated-orcid":false,"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7084-4618","authenticated-orcid":false,"given":"Meirun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4165-8951","authenticated-orcid":false,"given":"Zhenhan","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5547-3919","authenticated-orcid":false,"given":"Xiucai","family":"Ye","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115183_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2023.100593","article-title":"A systematic review of federated learning incentive mechanisms and associated security challenges","volume":"50","author":"Ali","year":"2023","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.asoc.2026.115183_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103320","article-title":"Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IOT networks: a survey","volume":"152","author":"Ali","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.asoc.2026.115183_bib0015","series-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving federated learning","author":"Bonawitz","year":"2019"},{"key":"10.1016\/j.asoc.2026.115183_bib0020","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1137\/16M1080173","article-title":"Optimization methods for large-scale machine learning","volume":"60","author":"Bottou","year":"2018","journal-title":"SIAM Rev."},{"key":"10.1016\/j.asoc.2026.115183_bib0025","author":"Chen"},{"key":"10.1016\/j.asoc.2026.115183_bib0030","series-title":"ICC 2024 - IEEE International Conference on Communications","first-page":"5166","article-title":"Adaptive privacy budget allocation in federated learning: a multi-agent reinforcement learning approach","author":"Chen","year":"2024"},{"key":"10.1016\/j.asoc.2026.115183_bib0035","doi-asserted-by":"crossref","first-page":"3959","DOI":"10.3390\/electronics13193959","article-title":"AWDP-FL: an adaptive differential privacy federated learning framework","volume":"13","author":"Chen","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.asoc.2026.115183_bib0040","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.trb.2017.09.018","article-title":"A critical evaluation of the next generation simulation (NGSIM) vehicle trajectory dataset","volume":"105","author":"Coifman","year":"2017","journal-title":"Transp. Res. B Methodol."},{"key":"10.1016\/j.asoc.2026.115183_bib0045","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"10.1016\/j.asoc.2026.115183_bib0050","series-title":"Deep Learning","volume":"vol. 1","author":"Goodfellow","year":"2016"},{"key":"10.1016\/j.asoc.2026.115183_bib0055","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1049\/cit2.12187","article-title":"A federated learning scheme meets dynamic differential privacy","volume":"8","author":"Guo","year":"2023","journal-title":"CAAI Trans. Intell. Technol."},{"key":"10.1016\/j.asoc.2026.115183_bib0060","series-title":"2020 IEEE Globecom Workshops","first-page":"1","article-title":"Index-modulated circularly-shifted chirps for dual-function radar & communication systems","author":"Hoque","year":"2020"},{"key":"10.1016\/j.asoc.2026.115183_bib0065","series-title":"2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"77","article-title":"Sechannel: a secure and lightweight channel protection approach for tee systems","author":"Jiang","year":"2024"},{"key":"10.1016\/j.asoc.2026.115183_bib0070","series-title":"International Conference on Machine Learning","first-page":"5132","article-title":"Scaffold: stochastic controlled averaging for federated learning","author":"Karimireddy","year":"2020"},{"key":"10.1016\/j.asoc.2026.115183_bib0075","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"Li","year":"2020","journal-title":"Proc. Mach. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0080","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume":"33","author":"Lin","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0085","doi-asserted-by":"crossref","first-page":"4377","DOI":"10.1007\/s10115-024-02117-3","article-title":"Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning","volume":"66","author":"Liu","year":"2024","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0090","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.future.2023.11.001","article-title":"Adaptive asynchronous federated learning","volume":"152","author":"Lu","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0095","doi-asserted-by":"crossref","first-page":"8726","DOI":"10.1109\/TNNLS.2022.3216981","article-title":"Privacy and robustness in federated learning: attacks and defenses","volume":"35","author":"Lyu","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0100","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.asoc.2026.115183_bib0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2021.102994","article-title":"A new distributed architecture for evaluating ai-based security systems at the edge: network ton_iot datasets","volume":"72","author":"Moustafa","year":"2021","journal-title":"Sustain. Cities Soc."},{"key":"10.1016\/j.asoc.2026.115183_bib0110","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.future.2023.01.019","article-title":"Fedproc: prototypical contrastive federated learning on non-IID data","volume":"143","author":"Mu","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0115","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.future.2023.09.008","article-title":"Model aggregation techniques in federated learning: a comprehensive survey","volume":"150","author":"Qi","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0120","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1109\/JSTSP.2022.3224597","article-title":"FedBKD: heterogenous federated learning via bidirectional knowledge distillation for modulation classification in IOT-edge system","volume":"17","author":"Qi","year":"2022","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"10.1016\/j.asoc.2026.115183_bib0125","doi-asserted-by":"crossref","first-page":"3785","DOI":"10.1038\/s41467-023-38794-x","article-title":"Differentially private knowledge transfer for federated learning","volume":"14","author":"Qi","year":"2023","journal-title":"Nat. Commun."},{"key":"10.1016\/j.asoc.2026.115183_bib0130","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.101824","article-title":"Privacy protection in intelligent vehicle networking: a novel federated learning algorithm based on information fusion","volume":"98","author":"Qu","year":"2023","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.asoc.2026.115183_bib0135","doi-asserted-by":"crossref","first-page":"2868","DOI":"10.1109\/TIFS.2025.3546841","article-title":"Trustworthy and fair federated learning via reputation-based consensus and adaptive incentives","volume":"20","author":"Rashid","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115183_bib0140","author":"Reddi"},{"key":"10.1016\/j.asoc.2026.115183_bib0145","first-page":"1","article-title":"Advances and open challenges in federated foundation models","author":"Ren","year":"2025","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.asoc.2026.115183_bib0150","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1109\/TPDS.2025.3543368","article-title":"FedTune-SGM: a stackelberg-driven personalized federated learning strategy for edge networks","volume":"36","author":"Singh","year":"2025","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0155","doi-asserted-by":"crossref","DOI":"10.1145\/3727643","article-title":"A systematic literature review of robust federated learning: issues, solutions, and future research directions","volume":"57","author":"Uddin","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.asoc.2026.115183_bib0160","series-title":"Proceedings of the International Conference on Learning Representations (ICLR)","article-title":"Federated learning with matched averaging","author":"Wang","year":"2020"},{"key":"10.1016\/j.asoc.2026.115183_bib0165","series-title":"2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)","first-page":"902","article-title":"Tackling system-induced bias in federated learning: a pricing-based incentive mechanism","author":"Wang","year":"2024"},{"key":"10.1016\/j.asoc.2026.115183_bib0170","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2024.3460737","article-title":"Efficient cloud-sourced transport mode detection using trajectory data: a semi-supervised asynchronous federated learning approach","author":"Yang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.asoc.2026.115183_bib0175","series-title":"International Conference on Machine Learning","first-page":"5650","article-title":"Byzantine-robust distributed learning: towards optimal statistical rates","author":"Yin","year":"2018"},{"key":"10.1016\/j.asoc.2026.115183_bib0180","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"16642","article-title":"Efficient asynchronous federated learning with prospective momentum aggregation and fine-grained correction","author":"Zang","year":"2024"},{"key":"10.1016\/j.asoc.2026.115183_bib0185","first-page":"1","article-title":"CSI-FL: communication-sensing integrated federated learning framework for heterogeneous IOV","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0190","doi-asserted-by":"crossref","first-page":"2864","DOI":"10.1109\/TNSE.2022.3185327","article-title":"Homomorphic encryption-based privacy-preserving federated learning in iot-enabled healthcare system","volume":"10","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.asoc.2026.115183_bib0195","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1109\/TITS.2023.3324962","article-title":"Federated learning in intelligent transportation systems: recent applications and open problems","volume":"25","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0200","series-title":"Proceedings of the 18th International Conference on World Wide Web (WWW \u201909), Pp","first-page":"791","article-title":"Mining interesting locations and travel sequences from GPS trajectories","author":"Zheng","year":"2009"},{"key":"10.1016\/j.asoc.2026.115183_bib0205","doi-asserted-by":"crossref","first-page":"13396","DOI":"10.1109\/TITS.2023.3243088","article-title":"Enhanced federated learning for edge data security in intelligent transportation systems","volume":"24","author":"Zhu","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.asoc.2026.115183_bib0210","series-title":"International Conference on Algorithms and Architectures for Parallel Processing","first-page":"321","article-title":"Review of incentive mechanisms of differential privacy based federated learning protocols: from the economics and game theoretical perspectives","author":"Zhuo","year":"2024"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006319?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006319?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:04:44Z","timestamp":1776873884000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":42,"alternative-id":["S1568494626006319"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115183","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"RFD-ML: Robust federated defense via meta-learning","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115183","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115183"}}