{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:46:52Z","timestamp":1776876412018,"version":"3.51.2"},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003213","name":"Beijing Municipal Education Commission","doi-asserted-by":"publisher","award":["KM202210005028"],"award-info":[{"award-number":["KM202210005028"]}],"id":[{"id":"10.13039\/501100003213","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302020"],"award-info":[{"award-number":["62302020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302229"],"award-info":[{"award-number":["62302229"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115194","type":"journal-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T15:27:38Z","timestamp":1775575658000},"page":"115194","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Triple-verifiable aggregation with parameter encoding for privacy-enhanced cross-device federated learning"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1304-9399","authenticated-orcid":false,"given":"Chenxu","family":"Fan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6414-9697","authenticated-orcid":false,"given":"Yuwen","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0018-8069","authenticated-orcid":false,"given":"Qin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Ziwen","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3761-9598","authenticated-orcid":false,"given":"Haiyang","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6058-0217","authenticated-orcid":false,"given":"Zhen","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115194_bib0005","series-title":"Security and Cryptography for Networks","first-page":"516","article-title":"Prio+: privacy preserving aggregate statistics via boolean shares","author":"Addanki","year":"2022"},{"key":"10.1016\/j.asoc.2026.115194_bib0010","first-page":"187","article-title":"Fault detection and diagnosis using reconstruction-based diglpp: application to industrial distillation system","volume":"59","author":"Ali","year":"2025","journal-title":"Ifac-pap."},{"key":"10.1016\/j.asoc.2026.115194_bib0015","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.aej.2024.11.044","article-title":"On the enhancement of estimator efficiency of population variance through stratification, transformation, and formulation with application to Covid-19 data","volume":"113","author":"Ali","year":"2025","journal-title":"Alex. Eng. J."},{"key":"10.1016\/j.asoc.2026.115194_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.conengprac.2025.106361","article-title":"Intelligent machine learning-based multi-model fusion monitoring: application to industrial physio-chemical systems","volume":"162","author":"Ali","year":"2025","journal-title":"Control Eng. Pract."},{"key":"10.1016\/j.asoc.2026.115194_bib0025","doi-asserted-by":"crossref","first-page":"22465","DOI":"10.1021\/acs.iecr.5c02759","article-title":"Hybrid fusion paradigm in advanced process monitoring: a panoramic review and future perspectives","volume":"64","author":"Ali","year":"2025","journal-title":"Ind. Eng. Chem. Res."},{"key":"10.1016\/j.asoc.2026.115194_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.compchemeng.2025.109352","article-title":"Process monitoring and dynamic fusion of complex industrial systems: a reconstruction-based Bayesian framework","volume":"203","author":"Ali","year":"2025","journal-title":"Comput. Chem. Eng."},{"key":"10.1016\/j.asoc.2026.115194_bib0035","article-title":"Advance industrial monitoring of physio-chemical processes using novel integrated machine learning approach","volume":"42","author":"Ali","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.asoc.2026.115194_bib0040","doi-asserted-by":"crossref","DOI":"10.1088\/2632-2153\/ada088","article-title":"A novel dynamic machine learning-based explainable fusion monitoring: application to industrial and chemical processes","volume":"6","author":"Ali","year":"2025","journal-title":"Mach. Learn. Sci. Technol."},{"key":"10.1016\/j.asoc.2026.115194_bib0045","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-16798-5","article-title":"M-estimation activation functions for high-performance extreme learning machine ensemble classification","volume":"15","author":"Alimi","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115194_bib0050","series-title":"International Conference on Artificial Intelligence and Statistics","first-page":"2938","article-title":"How to backdoor federated learning","author":"Bagdasaryan","year":"2020"},{"key":"10.1016\/j.asoc.2026.115194_bib0055","series-title":"Recommendation for Key Management:: Part 1 - General","author":"Barker","year":"2020"},{"key":"10.1016\/j.asoc.2026.115194_bib0060","series-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1253","article-title":"Secure Single-Server aggregation with (poly)logarithmic overhead","author":"Bell","year":"2020"},{"key":"10.1016\/j.asoc.2026.115194_bib0065","series-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","first-page":"251","article-title":"Secret sharing homomorphisms: keeping shares of a secret secret (extended abstract)","author":"Benaloh","year":"1987"},{"key":"10.1016\/j.asoc.2026.115194_bib0070","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz","year":"2017"},{"key":"10.1016\/j.asoc.2026.115194_bib0075","series-title":"Advances in Cryptology - ASIACRYPT 2003","first-page":"37","article-title":"A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications","author":"Bresson","year":"2003"},{"key":"10.1016\/j.asoc.2026.115194_bib0080","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/JSAIT.2024.3391849","article-title":"Lightverifl: a lightweight and verifiable secure aggregation for federated learning","volume":"5","author":"Buyukates","year":"2024","journal-title":"IEEE J. Sel. Areas Inf. Theory"},{"key":"10.1016\/j.asoc.2026.115194_bib0085","series-title":"26th Annual Symposium on Foundations of Computer Science (Sfcs 1985)","first-page":"383","article-title":"Verifiable secret sharing and achieving simultaneity in the presence of faults","author":"Chor","year":"1985"},{"key":"10.1016\/j.asoc.2026.115194_bib0090","series-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","first-page":"259","article-title":"Prio: private, robust, and scalable computation of aggregate statistics","author":"Corrigan-Gibbs","year":"2017"},{"key":"10.1016\/j.asoc.2026.115194_bib0095","series-title":"Democratizing Cryptography: the Work of Whitfield Diffie and Martin Hellman","first-page":"365","article-title":"New directions in cryptography","author":"Diffie","year":"2022"},{"key":"10.1016\/j.asoc.2026.115194_bib0100","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-21792-y","article-title":"Novel eigen space method for multiple spatiotemporal rare diseases clusters detection: a case study of waterborne disease","volume":"15","author":"Fayyaz","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115194_bib0105","series-title":"28th Annual Symposium on Foundations of Computer Science (Sfcs 1987)","first-page":"427","article-title":"A practical scheme for non-interactive verifiable secret sharing","author":"Feldman","year":"1987"},{"key":"10.1016\/j.asoc.2026.115194_bib0110","series-title":"International Conference on Learning Representations","article-title":"Robbing the fed: directly obtaining private data in federated learning with modified models","author":"Fowl","year":"2022"},{"key":"10.1016\/j.asoc.2026.115194_bib0115","series-title":"Advances in Neural Information Processing Systems (NeurIPS)","first-page":"16937","article-title":"Inverting gradients: how easy is it to break privacy in federated learning?","author":"Geiping","year":"2020"},{"key":"10.1016\/j.asoc.2026.115194_bib0120","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.jmapro.2024.11.067","article-title":"A deep neural network model for parameter identification in deep drawing metal forming process","volume":"133","author":"Guo","year":"2025","journal-title":"J. Manuf. Process."},{"key":"10.1016\/j.asoc.2026.115194_bib0125","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TDSC.2021.3126323","article-title":"VerSA: verifiable secure aggregation for Cross-Device federated learning","volume":"20","author":"Hahn","year":"2023","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.asoc.2026.115194_bib0130","author":"Hard"},{"key":"10.1016\/j.asoc.2026.115194_bib0135","series-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.asoc.2026.115194_bib0140","first-page":"1","article-title":"Towards secure weighted aggregation for Privacy-Preserving federated learning","author":"He","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115194_bib0145","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"603","article-title":"Deep models under the GAN: information leakage from collaborative deep learning","author":"Hitaj","year":"2017"},{"key":"10.1016\/j.asoc.2026.115194_bib0150","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2021.3095077","article-title":"A survey on federated learning for resource-constrained IOT devices","volume":"9","author":"Imteaj","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.asoc.2026.115194_bib0155","series-title":"2018 IEEE Symposium on Security and Privacy (SP)","first-page":"19","article-title":"Manipulating machine learning: poisoning attacks and countermeasures for regression learning","author":"Jagielski","year":"2018"},{"key":"10.1016\/j.asoc.2026.115194_bib0160","series-title":"Advances in Neural Information Processing Systems","first-page":"29898","article-title":"Gradient inversion with generative image prior","author":"Jeon","year":"2021"},{"key":"10.1016\/j.asoc.2026.115194_bib0165","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1038\/s42256-021-00337-8","article-title":"End-to-end privacy preserving deep learning on multi-institutional medical imaging","volume":"3","author":"Kaissis","year":"2021","journal-title":"Nat. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.115194_bib0170","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jmapro.2025.02.044","article-title":"A deep neural network approach to predict dimensional accuracy of thin-walled tubes in backward flow forming plasticity process","volume":"141","author":"Kocab\u0131\u00e7ak","year":"2025","journal-title":"J. Manuf. Process."},{"key":"10.1016\/j.asoc.2026.115194_bib0175","series-title":"International Conference on Learning Representations","article-title":"Deep gradient compression: reducing the communication bandwidth for distributed training","author":"Lin","year":"2018"},{"key":"10.1016\/j.asoc.2026.115194_bib0180","doi-asserted-by":"crossref","first-page":"4996","DOI":"10.1109\/TIFS.2023.3303718","article-title":"Tear: exploring temporal evolution of adversarial robustness for membership inference attacks against federated learning","volume":"18","author":"Liu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115194_bib0185","first-page":"1","article-title":"Efficient dropout-resilient aggregation for privacy-preserving machine learning","author":"Liu","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115194_bib0190","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"477","article-title":"Flamingo: Multi-Round Single-Server secure aggregation with applications to private federated learning","author":"Ma","year":"2023"},{"key":"10.1016\/j.asoc.2026.115194_bib0195","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-Efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.asoc.2026.115194_bib0200","series-title":"2019 IEEE Symposium on Security and Privacy (SP)","first-page":"739","article-title":"Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning","author":"Nasr","year":"2019"},{"key":"10.1016\/j.asoc.2026.115194_bib0205","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated learning for internet of things: a comprehensive survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.asoc.2026.115194_bib0210","doi-asserted-by":"crossref","DOI":"10.1016\/j.cma.2024.117603","article-title":"A data-driven uncertainty quantification framework in probabilistic bio-inspired porous materials (material-uq): an investigation for rottmps plates","volume":"435","author":"Nguyen","year":"2025","journal-title":"Comput. Methods Appl. Mech. Eng."},{"key":"10.1016\/j.asoc.2026.115194_bib0215","doi-asserted-by":"crossref","DOI":"10.3390\/math12152300","article-title":"Deep neural network and evolved optimization algorithm for damage assessment in a truss bridge","volume":"12","author":"Nguyen-Ngoc","year":"2024","journal-title":"Mathematics"},{"key":"10.1016\/j.asoc.2026.115194_bib0220","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Phong","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115194_bib0225","doi-asserted-by":"crossref","first-page":"4290","DOI":"10.1109\/TDSC.2023.3326230","article-title":"Perfectly accurate membership inference by a dishonest central server in federated learning","volume":"21","author":"Pichler","year":"2024","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.asoc.2026.115194_bib0230","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"1961","article-title":"ELSA: secure aggregation for federated learning with malicious actors","author":"Rathee","year":"2023"},{"key":"10.1016\/j.asoc.2026.115194_bib0235","doi-asserted-by":"crossref","first-page":"3400","DOI":"10.1109\/TNNLS.2019.2944481","article-title":"Robust and Communication-Efficient federated learning from non-i.i.d. Data","volume":"31","author":"Sattler","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115194_bib0240","doi-asserted-by":"crossref","first-page":"3430","DOI":"10.1109\/JIOT.2023.3296637","article-title":"Verifiable Privacy-Preserving federated learning under multiple encrypted keys","volume":"11","author":"Shen","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.asoc.2026.115194_bib0245","series-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS \u201915","first-page":"1310","article-title":"Privacy-Preserving deep learning","author":"Shokri","year":"2015"},{"key":"10.1016\/j.asoc.2026.115194_bib0250","series-title":"2017 IEEE Symposium on Security and Privacy (SP)","first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"Shokri","year":"2017"},{"key":"10.1016\/j.asoc.2026.115194_bib0255","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/JSAIT.2021.3054610","article-title":"Turbo-Aggregate: breaking the quadratic aggregation barrier in secure federated learning","volume":"2","author":"So","year":"2021","journal-title":"IEEE J. Sel. Areas Inf. Theory"},{"key":"10.1016\/j.asoc.2026.115194_bib0260","first-page":"1","article-title":"EPPDA: an efficient Privacy-Preserving data aggregation federated learning scheme","author":"Song","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.asoc.2026.115194_bib0265","series-title":"Proceedings of the 31st USENIX Security Symposium","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","author":"Stevens","year":"2022"},{"key":"10.1016\/j.asoc.2026.115194_bib0270","series-title":"2020 IEEE European Symposium on Security and Privacy (EuroS P)","first-page":"175","article-title":"Bypassing backdoor detection algorithms in deep learning","author":"Tan","year":"2020"},{"key":"10.1016\/j.asoc.2026.115194_bib0275","doi-asserted-by":"crossref","first-page":"3601","DOI":"10.1109\/TDSC.2022.3226508","article-title":"Vosa: verifiable and oblivious secure aggregation for privacy-preserving federated learning","volume":"20","author":"Wang","year":"2023","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.asoc.2026.115194_bib0280","series-title":"Computer Security \u2013 ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I","first-page":"545","article-title":"A framework for evaluating client privacy leakages in federated learning","author":"Wei","year":"2020"},{"key":"10.1016\/j.asoc.2026.115194_bib0285","series-title":"Proceedings of the 39th International Conference on Machine Learning","first-page":"23668","article-title":"Fishing for user data in Large-Batch federated learning via gradient magnification","author":"Wen","year":"2022"},{"key":"10.1016\/j.asoc.2026.115194_bib0290","doi-asserted-by":"crossref","first-page":"2032","DOI":"10.1038\/s41467-022-29763-x","article-title":"Communication-efficient federated learning via knowledge distillation","volume":"13","author":"Wu","year":"2022","journal-title":"Nat. Commun."},{"key":"10.1016\/j.asoc.2026.115194_bib0295","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","article-title":"VerifyNet: secure and verifiable federated learning","volume":"15","author":"Xu","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.asoc.2026.115194_bib0300","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/TGCN.2023.3277251","article-title":"Fast secure aggregation with high dropout resilience for federated learning","volume":"7","author":"Yang","year":"2023","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"10.1016\/j.asoc.2026.115194_bib0305","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103700","article-title":"PVFL: verifiable federated learning and prediction with privacy-preserving","volume":"139","author":"Yin","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.115194_bib0310","series-title":"2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"16332","article-title":"See through gradients: image batch recovery via GradInversion","author":"Yin","year":"2021"},{"key":"10.1016\/j.asoc.2026.115194_bib0315","series-title":"2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE)","first-page":"374","article-title":"Poisoning attack in federated learning using generative adversarial nets","author":"Zhang","year":"2019"},{"key":"10.1016\/j.asoc.2026.115194_bib0320","doi-asserted-by":"crossref","first-page":"19926","DOI":"10.1109\/JIOT.2024.3370938","article-title":"Wvfl: weighted verifiable secure aggregation in federated learning","volume":"11","author":"Zhong","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.asoc.2026.115194_bib0325","series-title":"Advances in Neural Information Processing Systems","article-title":"Deep leakage from gradients","author":"Zhu","year":"2019"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006423?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006423?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:03:21Z","timestamp":1776873801000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":65,"alternative-id":["S1568494626006423"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115194","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Triple-verifiable aggregation with parameter encoding for privacy-enhanced cross-device federated learning","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115194","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115194"}}