{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:31:29Z","timestamp":1773156689584,"version":"3.50.1"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100006116","name":"Institute for Research in Fundamental Sciences School of Mathematics","doi-asserted-by":"publisher","award":["1404940042"],"award-info":[{"award-number":["1404940042"]}],"id":[{"id":"10.13039\/501100006116","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.compeleceng.2025.110830","type":"journal-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T02:37:08Z","timestamp":1763606228000},"page":"110830","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"PA","title":["Privacy attack on a federated learning scheme"],"prefix":"10.1016","volume":"129","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2755-3150","authenticated-orcid":false,"given":"Mojtaba","family":"Rafiee","sequence":"first","affiliation":[]},{"given":"Fatemeh","family":"Seyedghasemi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.compeleceng.2025.110830_b1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"10.1016\/j.compeleceng.2025.110830_b2","series-title":"Artificial intelligence and statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"issue":"3","key":"10.1016\/j.compeleceng.2025.110830_b3","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/s42045-020-00045-8","article-title":"A trusted recommendation scheme for privacy protection based on federated learning","volume":"3","author":"Wang","year":"2020","journal-title":"CCF Trans Netw"},{"issue":"3","key":"10.1016\/j.compeleceng.2025.110830_b4","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MNET.011.2000558","article-title":"Federated-learning-empowered collaborative data sharing for vehicular edge networks","volume":"35","author":"Li","year":"2021","journal-title":"IEEE Netw"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110830_b5","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TMC.2022.3216868","article-title":"Handkey: Knocking-triggered robust vibration signature for keyless unlocking","volume":"23","author":"Cao","year":"2022","journal-title":"IEEE Trans Mob Comput"},{"key":"10.1016\/j.compeleceng.2025.110830_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2022.102690","article-title":"Feddq: A communication-efficient federated learning approach for internet of vehicles","volume":"131","author":"Mo","year":"2022","journal-title":"J Syst Archit"},{"issue":"24","key":"10.1016\/j.compeleceng.2025.110830_b7","doi-asserted-by":"crossref","first-page":"21873","DOI":"10.1109\/JIOT.2023.3304790","article-title":"Federated learning for the healthcare metaverse: Concepts, applications, challenges, and future directions","volume":"10","author":"Bashir","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2025.110830_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124891","article-title":"Image privacy protection scheme based on high-quality reconstruction dct compression and nonlinear dynamics","volume":"257","author":"Lin","year":"2024","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.compeleceng.2025.110830_b9","first-page":"1","article-title":"Privacy image secrecy scheme based on chaos-driven fractal sorting matrix and fibonacci q-matrix: L. yunlong et al.","author":"Yunlong","year":"2025","journal-title":"Vis Comput"},{"issue":"13","key":"10.1016\/j.compeleceng.2025.110830_b10","doi-asserted-by":"crossref","first-page":"4450","DOI":"10.1364\/OL.566608","article-title":"Intrusion detection-embedded chaotic encryption via hybrid modulation for data center interconnects","volume":"50","author":"Zeng","year":"2025","journal-title":"Opt Lett"},{"key":"10.1016\/j.compeleceng.2025.110830_b11","unstructured":"Tram\u00e8r F, Zhang F, Juels A, Reiter MK, Ristenpart T. Stealing machine learning models via prediction {APIs}. In: 25th USeNIX security symposium. USeNIX security 16, 2016, p. 601\u201318."},{"issue":"24","key":"10.1016\/j.compeleceng.2025.110830_b12","doi-asserted-by":"crossref","first-page":"24933","DOI":"10.1109\/JIOT.2022.3194930","article-title":"Privacy-enhanced and verification-traceable aggregation for federated learning","volume":"9","author":"Ren","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2025.110830_b13","series-title":"IEEE INFOCOM 2019-IEEE conference on computer communications","first-page":"2512","article-title":"Beyond inferring class representatives: User-level privacy leakage from federated learning","author":"Wang","year":"2019"},{"key":"10.1016\/j.compeleceng.2025.110830_b14","doi-asserted-by":"crossref","first-page":"121","DOI":"10.58496\/ADSA\/2024\/011","article-title":"Adversarial attacks in machine learning: Key insights and defense approaches","volume":"2024","author":"Khaleel","year":"2024","journal-title":"Appl Data Sci Anal"},{"key":"10.1016\/j.compeleceng.2025.110830_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2024.103279","article-title":"Vcsa: Verifiable and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption","volume":"156","author":"Ming","year":"2024","journal-title":"J Syst Archit"},{"key":"10.1016\/j.compeleceng.2025.110830_b16","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.future.2024.06.002","article-title":"An efficient privacy-preserving and verifiable scheme for federated learning","volume":"160","author":"Yang","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.compeleceng.2025.110830_b17","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","article-title":"Verifynet: Secure and verifiable federated learning","volume":"15","author":"Xu","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110830_b18","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TDSC.2021.3126323","article-title":"Versa: Verifiable secure aggregation for cross-device federated learning","volume":"20","author":"Hahn","year":"2021","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110830_b19","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/TDSC.2023.3253082","article-title":"Comments on versa: Verifiable secure aggregation for cross-device federated learning","volume":"21","author":"Luo","year":"2023","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"11","key":"10.1016\/j.compeleceng.2025.110830_b20","doi-asserted-by":"crossref","first-page":"10782","DOI":"10.1109\/JIOT.2020.2987958","article-title":"Privacy-preserving federated learning in fog computing","volume":"7","author":"Zhou","year":"2020","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"10.1016\/j.compeleceng.2025.110830_b21","doi-asserted-by":"crossref","first-page":"3430","DOI":"10.1109\/JIOT.2023.3296637","article-title":"Verifiable privacy-preserving federated learning under multiple encrypted keys","volume":"11","author":"Shen","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2025.110830_b22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.70470\/ESTIDAMAA\/2025\/002","article-title":"Federated learning for smart and sustainable forest fire detection in green internet of things","volume":"2025","author":"Ali","year":"2025","journal-title":"ESTIDAMAA"},{"issue":"12","key":"10.1016\/j.compeleceng.2025.110830_b23","doi-asserted-by":"crossref","first-page":"13744","DOI":"10.1007\/s11227-023-05129-y","article-title":"Flexible multi-client functional encryption for set intersection","volume":"79","author":"Rafiee","year":"2023","journal-title":"J Supercomput"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110830_b24","doi-asserted-by":"crossref","first-page":"273","DOI":"10.58496\/MJCS\/2025\/018","article-title":"Learning techniques-based malware detection: A comprehensive review","volume":"5","author":"Ali","year":"2025","journal-title":"Mesop J CyberSecur"},{"issue":"6","key":"10.1016\/j.compeleceng.2025.110830_b25","doi-asserted-by":"crossref","first-page":"5220","DOI":"10.1109\/JIOT.2020.2977253","article-title":"Achieving o (log3n) communication-efficient privacy-preserving range query in fog-based iot","volume":"7","author":"Mahdikhani","year":"2020","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"10.1016\/j.compeleceng.2025.110830_b26","doi-asserted-by":"crossref","first-page":"2501","DOI":"10.1109\/TDSC.2021.3061611","article-title":"Efficient and privacy-preserving similarity range query over encrypted time series data","volume":"19","author":"Zheng","year":"2021","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"10.1016\/j.compeleceng.2025.110830_b27","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2014.03.025","article-title":"Efficient verifiable multi-secret sharing scheme based on hash function","volume":"278","author":"Shao","year":"2014","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2025.110830_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.70470\/SHIFRA\/2023\/001","article-title":"Privacy-preserving data mining techniques in big data: Balancing security and usability","volume":"2023","author":"Abdulbaqi","year":"2023","journal-title":"SHIFRA"},{"key":"10.1016\/j.compeleceng.2025.110830_b29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.58496\/BJIoT\/2023\/001","article-title":"Federated learning in iot: A survey on distributed decision making","volume":"2023","author":"Hameed","year":"2023","journal-title":"Babylon J Internet Things"},{"key":"10.1016\/j.compeleceng.2025.110830_b30","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M, et al. {TensorFlow}: A system for {Large-Scale} machine learning. In: 12th USeNIX symposium on operating systems design and implementation. OSDI 16, 2016, p. 265\u201383."},{"issue":"11","key":"10.1016\/j.compeleceng.2025.110830_b31","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"LeCun","year":"2002","journal-title":"Proc IEEE"},{"key":"10.1016\/j.compeleceng.2025.110830_b32","series-title":"Transitioning the use of cryptographic algorithms and key lengths","author":"Barker","year":"2024"},{"key":"10.1016\/j.compeleceng.2025.110830_b33","doi-asserted-by":"crossref","first-page":"31","DOI":"10.58496\/BJIoT\/2023\/005","article-title":"Safeguarding connected health: Leveraging trustworthy ai techniques to harden intrusion detection systems against data poisoning threats in iomt environments","volume":"2023","author":"Aljanabi","year":"2023","journal-title":"Babylon J Internet Things"},{"key":"10.1016\/j.compeleceng.2025.110830_b34","doi-asserted-by":"crossref","first-page":"149","DOI":"10.58496\/MJBD\/2023\/019","article-title":"Navigating the void: Uncovering research gaps in the detection of data poisoning attacks in federated learning-based big data processing: A systematic literature review","volume":"2023","author":"Aljanabi","year":"2023","journal-title":"Mesop J Big Data"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790625007736?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790625007736?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T20:48:52Z","timestamp":1766090932000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790625007736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":34,"alternative-id":["S0045790625007736"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110830","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Privacy attack on a federated learning scheme","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110830","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"110830"}}