{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:47:56Z","timestamp":1776876476357,"version":"3.51.2"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115211","type":"journal-article","created":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T14:16:42Z","timestamp":1776176202000},"page":"115211","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["TR-MEPS: Entropic spectral projection for trust-aware robust federated aggregation"],"prefix":"10.1016","volume":"197","author":[{"given":"Koffka","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9831-6155","authenticated-orcid":false,"given":"Winston","family":"Elibox","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8983-1795","authenticated-orcid":false,"given":"Shanta","family":"Ramnath","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115211_bib0005","series-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), Proceedings of Machine Learning Research","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"vol. 54","author":"McMahan","year":"2017"},{"key":"10.1016\/j.asoc.2026.115211_bib0010","series-title":"Proceedings of Machine Learning and Systems (MLSys)","article-title":"Federated optimization in heterogeneous networks","author":"Li","year":"2020"},{"key":"10.1016\/j.asoc.2026.115211_bib0015","series-title":"Proceedings of the 37th International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"5132","article-title":"SCAFFOLD: stochastic controlled averaging for federated learning","volume":"119","author":"Karimireddy","year":"2020"},{"key":"10.1016\/j.asoc.2026.115211_bib0020","series-title":"Network and Distributed System Security Symposium (NDSS)","article-title":"FLTrust: byzantine-robust federated learning via trust bootstrapping","author":"Cao","year":"2021"},{"key":"10.1016\/j.asoc.2026.115211_bib0025","series-title":"Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","first-page":"301","article-title":"The limitations of federated learning in sybil settings","author":"Fung","year":"2020"},{"key":"10.1016\/j.asoc.2026.115211_bib0030","author":"Yaldiz"},{"key":"10.1016\/j.asoc.2026.115211_bib0035","first-page":"119","article-title":"Machine learning with adversaries: byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst. (neurips)"},{"key":"10.1016\/j.asoc.2026.115211_bib0040","series-title":"Proceedings of the 35th International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"5650","article-title":"Byzantine-robust distributed learning: towards optimal statistical rates","volume":"vol. 80","author":"Yin","year":"2018"},{"key":"10.1016\/j.asoc.2026.115211_bib0045","series-title":"Proceedings of the 35th International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume":"vol. 80","author":"Mhamdi","year":"2018"},{"key":"10.1016\/j.asoc.2026.115211_bib0050","series-title":"Proceedings of the 41st International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"54460","article-title":"FedREDefense: defending against model poisoning attacks for federated learning using model update reconstruction error","volume":"vol. 235","author":"Xie","year":"2024"},{"key":"10.1016\/j.asoc.2026.115211_bib0055","series-title":"Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)","first-page":"3667","article-title":"FedRoLA: robust federated learning against model poisoning via layer-based aggregation","author":"Yan","year":"2024"},{"key":"10.1016\/j.asoc.2026.115211_bib0060","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"20654","article-title":"Detecting backdoor attacks in federated learning via direction alignment inspection","author":"Xu","year":"2025"},{"key":"10.1016\/j.asoc.2026.115211_bib0065","doi-asserted-by":"crossref","DOI":"10.52202\/079017-3314","article-title":"RFLPA: a robust federated learning framework against poisoning attacks with secure aggregation","volume":"37","author":"Mai","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst. (neurips)"},{"key":"10.1016\/j.asoc.2026.115211_bib0070","author":"Tripathi"},{"key":"10.1016\/j.asoc.2026.115211_bib0075","doi-asserted-by":"crossref","DOI":"10.1016\/j.acha.2024.101660","article-title":"Differentially private federated learning with Laplacian smoothing","volume":"72","author":"Liang","year":"2024","journal-title":"Appl. Comput. Harmon. Anal."},{"key":"10.1016\/j.asoc.2026.115211_bib0080","author":"Wang"},{"key":"10.1016\/j.asoc.2026.115211_bib0085","author":"Lutz"},{"key":"10.1016\/j.asoc.2026.115211_bib0090","series-title":"Proceedings of the 41st International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"20096","article-title":"Self-Driven entropy aggregation for Byzantine-Robust heterogeneous federated learning","volume":"vol. 235","author":"Huang","year":"2024"},{"key":"10.1016\/j.asoc.2026.115211_bib0095","series-title":"Proceedings of the 40th International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"19767","article-title":"Revisiting weighted aggregation in federated learning with neural networks","volume":"vol. 202","author":"Li","year":"2023"},{"key":"10.1016\/j.asoc.2026.115211_bib0100","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"30651","article-title":"FedAWA: adaptive optimization of aggregation weights in federated learning using client vectors","author":"Shi","year":"2025"},{"key":"10.1016\/j.asoc.2026.115211_bib0105","first-page":"4424","article-title":"Federated multi-task learning","volume":"30","author":"Smith","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst. (neurips)"},{"key":"10.1016\/j.asoc.2026.115211_bib0110","first-page":"19586","article-title":"An efficient framework for clustered federated learning","volume":"33","author":"Ghosh","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst. (neurips)"},{"issue":"8","key":"10.1016\/j.asoc.2026.115211_bib0115","first-page":"9953","article-title":"Federated learning on non-IID graphs via structural knowledge sharing","volume":"37","author":"Tan","year":"2023","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.115211_bib0120","article-title":"Provably personalized and robust federated learning","author":"Werner","year":"2023","journal-title":"Trans. Mach. Learn. Res."},{"key":"10.1016\/j.asoc.2026.115211_bib0125","series-title":"Proceedings of the 38th International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"6357","article-title":"Ditto: fair and robust federated learning through personalization","volume":"vol. 139","author":"Li","year":"2021"},{"key":"10.1016\/j.asoc.2026.115211_bib0130","series-title":"Proceedings of the 36th International Conference on Machine Learning (ICML), Proceedings of Machine Learning Research","first-page":"4615","article-title":"Agnostic federated learning","volume":"vol. 97","author":"Mohri","year":"2019"},{"issue":"4","key":"10.1016\/j.asoc.2026.115211_bib0135","doi-asserted-by":"crossref","DOI":"10.1145\/2523813","article-title":"A survey on concept drift adaptation","volume":"46","author":"Gama","year":"2014","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.asoc.2026.115211_bib0140","series-title":"Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics (AISTATS), Proceedings of Machine Learning Research","first-page":"2938","article-title":"How to backdoor federated learning","volume":"vol. 108","author":"Bagdasaryan","year":"2020"},{"key":"10.1016\/j.asoc.2026.115211_bib0145","series-title":"Proceedings of Machine Learning and Systems (MLSys)","article-title":"Towards federated learning at scale: system design","volume":"vol. 1","author":"Bonawitz","year":"2019"},{"issue":"3","key":"10.1016\/j.asoc.2026.115211_bib0150","doi-asserted-by":"crossref","first-page":"2031","DOI":"10.1109\/COMST.2020.2986024","article-title":"Federated learning in mobile edge networks: a comprehensive survey","volume":"22","author":"Lim","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.asoc.2026.115211_bib0155","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/s22020450","article-title":"Federated learning in edge computing: a systematic survey","volume":"22","author":"Abreha","year":"2022","journal-title":"Sensors"},{"issue":"1\u20132","key":"10.1016\/j.asoc.2026.115211_bib0160","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends Mach. Learn."},{"key":"10.1016\/j.asoc.2026.115211_bib0165","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.ins.2022.04.027","article-title":"Federated against the cold: a trust-based federated learning approach to counter the cold start problem in recommendation systems","volume":"601","author":"Wahab","year":"2022","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115211_bib0170","doi-asserted-by":"crossref","DOI":"10.1007\/s12190-025-02681-z","article-title":"Enhancing relationship analysis through topological structures based on virtual fuzzy parameterized soft sets","volume":"72","author":"Dalk\u0131l\u0131\u00e7","year":"2026","journal-title":"Journal of Applied Mathematics and Computing"},{"issue":"3","key":"10.1016\/j.asoc.2026.115211_bib0175","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1080\/0952813X.2023.2222720","article-title":"Similarity measures of neutrosophic fuzzy soft set and its application to decision making","volume":"37","author":"Dalk\u0131l\u0131\u00e7","year":"2025","journal-title":"J. Exp. Theor. Artif. Intell."},{"issue":"2","key":"10.1016\/j.asoc.2026.115211_bib0180","first-page":"3975","article-title":"Mathematical analysis of parameters belonging to the universe in the soft set theory with new distance measures","volume":"46","author":"Demirta\u015f","year":"2024","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"2","key":"10.1016\/j.asoc.2026.115211_bib0185","first-page":"105","article-title":"Two novel approaches that reduce the effectiveness of the decision maker in decision making under uncertainty environments","volume":"19","author":"Dalk\u0131l\u0131\u00e7","year":"2022","journal-title":"Iran. J. Fuzzy Syst."},{"key":"10.1016\/j.asoc.2026.115211_bib0190","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s40747-021-00378-x","article-title":"On topological structures of virtual fuzzy parametrized fuzzy soft sets","volume":"8","author":"Dalk\u0131l\u0131\u00e7","year":"2022","journal-title":"Complex Intell. Syst."},{"issue":"7","key":"10.1016\/j.asoc.2026.115211_bib0195","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.1080\/00207160.2021.1978436","article-title":"Approaches that take into account interactions between parameters: pure (fuzzy) soft sets","volume":"99","author":"Dalk\u0131l\u0131\u00e7","year":"2022","journal-title":"Int. J. Comput. Math."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006599?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006599?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:05:51Z","timestamp":1776873951000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006599"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":39,"alternative-id":["S1568494626006599"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115211","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"TR-MEPS: Entropic spectral projection for trust-aware robust federated aggregation","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115211","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115211"}}