{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T05:50:50Z","timestamp":1773899450739,"version":"3.50.1"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20240102"],"award-info":[{"award-number":["BK20240102"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24A20272"],"award-info":[{"award-number":["U24A20272"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62373361"],"award-info":[{"award-number":["62373361"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.engappai.2025.113472","type":"journal-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T11:37:33Z","timestamp":1765539453000},"page":"113472","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PB","title":["A robust federated learning framework for low-quality data and its applications"],"prefix":"10.1016","volume":"165","author":[{"given":"Wenxiu","family":"Xiao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1903-0291","authenticated-orcid":false,"given":"Teng","family":"Cui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3057-7225","authenticated-orcid":false,"given":"Wei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2025.113472_b1","doi-asserted-by":"crossref","first-page":"57128","DOI":"10.1109\/ACCESS.2024.3382709","article-title":"A survey on security, privacy, trust, and architectural challenges in IoT systems","volume":"12","author":"Adam","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2025.113472_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103637","article-title":"FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats","volume":"165","author":"Alrashdi","year":"2024","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.engappai.2025.113472_b3","unstructured":"Blanchard, P., El Mhamdi, E.M., Guerraoui, R., Stainer, J., 2017. Machine learning with adversaries: byzantine tolerant gradient descent. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. (ISSN: 9781510860964) pp. 118\u2013128."},{"key":"10.1016\/j.engappai.2025.113472_b4","series-title":"2024 IEEE International Conference on Big Data","first-page":"8179","article-title":"FedCali: Mitigating overgeneralization for anomaly detection in distributed sensor environments","author":"Chen","year":"2024"},{"key":"10.1016\/j.engappai.2025.113472_b5","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.ins.2019.01.062","article-title":"Stochastic configuration networks with block increments for data modeling in process industries","volume":"484","author":"Dai","year":"2019","journal-title":"Inform. Sci."},{"key":"10.1016\/j.engappai.2025.113472_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2025.110515","article-title":"Open problems and challenges in federated learning for IoT: A comprehensive review and strategic guide","volume":"126","author":"Diba","year":"2025","journal-title":"Comput. Electr. Eng."},{"issue":"9","key":"10.1016\/j.engappai.2025.113472_b7","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1109\/LAWP.2020.3011759","article-title":"Design of the single-\/dual-port wideband differential dielectric resonator antenna using higher order mode","volume":"19","author":"Fang","year":"2020","journal-title":"IEEE Antennas Wirel. Propag. Lett."},{"key":"10.1016\/j.engappai.2025.113472_b8","series-title":"Numerical Linear Algebra with Applications","first-page":"205","article-title":"Chapter 11 - Gaussian elimination and the LU decomposition","author":"Ford","year":"2015"},{"key":"10.1016\/j.engappai.2025.113472_b9","series-title":"Numerical Linear Algebra with Applications","first-page":"299","article-title":"Chapter 15 - The singular value decomposition","author":"Ford","year":"2015"},{"key":"10.1016\/j.engappai.2025.113472_b10","unstructured":"Fung, C., Yoon, C.J., Beschastnikh, I., 2020. The limitations of federated learning in sybil settings. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses. RAID 2020, (ISSN: 978-1-939133-18-2) pp. 301\u2013316."},{"key":"10.1016\/j.engappai.2025.113472_b11","series-title":"International Conference on Machine Learning","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","author":"Guerraoui","year":"2018"},{"key":"10.1016\/j.engappai.2025.113472_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2024.110359","article-title":"A deep reinforcement learning method with multiple starting nodes for dynamic process planning decision making","volume":"194","author":"Guo","year":"2024","journal-title":"Comput. Ind. Eng."},{"key":"10.1016\/j.engappai.2025.113472_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.130844","article-title":"Federated continual learning: Concepts, challenges, and solutions","volume":"651","author":"Hamedi","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.engappai.2025.113472_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113007","article-title":"Heterogeneity-aware pruning framework for personalized federated learning in remote sensing scene classification","volume":"311","author":"Hu","year":"2025","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.engappai.2025.113472_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.111048","article-title":"Federated incremental learning algorithm based on topological data analysis","volume":"158","author":"Hu","year":"2025","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.engappai.2025.113472_b16","doi-asserted-by":"crossref","first-page":"101210","DOI":"10.1109\/ACCESS.2024.3431885","article-title":"An experimental survey of incremental transfer learning for multicenter collaboration","volume":"12","author":"Huang","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2025.113472_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.media.2025.103673","article-title":"Shadow defense against gradient inversion attack in federated learning","volume":"105","author":"Jiang","year":"2025","journal-title":"Med. Image Anal."},{"key":"10.1016\/j.engappai.2025.113472_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111442","article-title":"FLCom: Robust federated learning against strong model poisoning attacks","volume":"269","author":"Li","year":"2025","journal-title":"Comput. Netw."},{"key":"10.1016\/j.engappai.2025.113472_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2025.121992","article-title":"Sparse personalized federated class-incremental learning","volume":"706","author":"Liu","year":"2025","journal-title":"Inform. Sci."},{"key":"10.1016\/j.engappai.2025.113472_b20","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.engappai.2025.113472_b21","series-title":"International Conference on Machine Learning","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"Mnih","year":"2016"},{"key":"10.1016\/j.engappai.2025.113472_b22","series-title":"Playing atari with deep reinforcement learning","author":"Mnih","year":"2013"},{"issue":"7540","key":"10.1016\/j.engappai.2025.113472_b23","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"Mnih","year":"2015","journal-title":"Nature"},{"key":"10.1016\/j.engappai.2025.113472_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2023.103723","article-title":"A robust analysis of adversarial attacks on federated learning environments","volume":"86","author":"Nair","year":"2023","journal-title":"Comput. Stand. Interfaces"},{"issue":"2","key":"10.1016\/j.engappai.2025.113472_b25","doi-asserted-by":"crossref","DOI":"10.3390\/electronics11020262","article-title":"A lightweight learning method for stochastic configuration networks using non-inverse solution","volume":"11","author":"Nan","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.engappai.2025.113472_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.compchemeng.2020.106886","article-title":"A review on reinforcement learning: Introduction and applications in industrial process control","volume":"139","author":"Nian","year":"2020","journal-title":"Comput. Chem. Eng."},{"key":"10.1016\/j.engappai.2025.113472_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.dcan.2025.06.001","article-title":"Building robust traffic classifier under low quality data: a federated contrastive learning approach","author":"Qin","year":"2025","journal-title":"Digit. Commun. Networks"},{"key":"10.1016\/j.engappai.2025.113472_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.ecoenv.2025.118442","article-title":"Blockchain-secured IoT-federated learning for industrial air pollution monitoring: A mechanistic approach to exposure prediction and environmental safety","volume":"300","author":"Ramadan","year":"2025","journal-title":"Ecotoxicol. Environ. Safety"},{"key":"10.1016\/j.engappai.2025.113472_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.cmpb.2025.108768","article-title":"Federated learning in radiomics: A comprehensive meta-survey on medical image analysis","volume":"267","author":"Raza","year":"2025","journal-title":"Comput. Methods Programs Biomed."},{"key":"10.1016\/j.engappai.2025.113472_b30","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/S0925-2312(00)00363-5","article-title":"Improved RAN sequential prediction using orthogonal techniques","volume":"41","author":"Salmeron","year":"2001","journal-title":"Neurocomputing"},{"key":"10.1016\/j.engappai.2025.113472_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.robot.2025.104920","article-title":"Leveraging motion perceptibility and deep reinforcement learning for visual control of nonholonomic mobile robots","volume":"189","author":"Soualhi","year":"2025","journal-title":"Robot. Auton. Syst."},{"issue":"13","key":"10.1016\/j.engappai.2025.113472_b32","doi-asserted-by":"crossref","first-page":"11365","DOI":"10.1109\/JIOT.2021.3128646","article-title":"Data poisoning attacks on federated machine learning","volume":"9","author":"Sun","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2025.113472_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.126736","article-title":"Fault diagnosis using liquid state machine with spiking-timing-dependent plasticity learning rule","volume":"271","author":"Wan","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.engappai.2025.113472_b34","series-title":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications","first-page":"1698","article-title":"Optimizing federated learning on non-IID data with reinforcement learning","author":"Wang","year":"2020"},{"issue":"10","key":"10.1016\/j.engappai.2025.113472_b35","doi-asserted-by":"crossref","first-page":"3466","DOI":"10.1109\/TCYB.2017.2734043","article-title":"Stochastic configuration networks: Fundamentals and algorithms","volume":"47","author":"Wang","year":"2017","journal-title":"IEEE Trans. Cybern."},{"issue":"3","key":"10.1016\/j.engappai.2025.113472_b36","first-page":"4961","article-title":"Video action recognition method based on personalized federated learning and spatiotemporal features","volume":"83","author":"Wu","year":"2025","journal-title":"Comput. Mater. Contin."},{"key":"10.1016\/j.engappai.2025.113472_b37","series-title":"International Conference on Machine Learning","first-page":"11372","article-title":"Crfl: Certifiably robust federated learning against backdoor attacks","author":"Xie","year":"2021"},{"issue":"2","key":"10.1016\/j.engappai.2025.113472_b38","doi-asserted-by":"crossref","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.engappai.2025.113472_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2025.103962","article-title":"A lightweight decentralized federated learning framework for the industrial internet of things","volume":"178","author":"Yang","year":"2025","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.engappai.2025.113472_b40","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2024.104009","article-title":"Credit risk prediction for small and micro enterprises based on federated transfer learning frozen network parameters","volume":"232","author":"Yang","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.engappai.2025.113472_b41","article-title":"Adaptive optimization federated learning enabled digital twins in industrial IoT","volume":"41","author":"Yang","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.engappai.2025.113472_b42","series-title":"International Conference on Machine Learning","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","author":"Yin","year":"2018"},{"key":"10.1016\/j.engappai.2025.113472_b43","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/0024-3795(94)00164-2","article-title":"A necessary and sufficient condition for M-matrices and its relation to block LU factorization","volume":"235","author":"Yip","year":"1996","journal-title":"Linear Algebra Appl."},{"key":"10.1016\/j.engappai.2025.113472_b44","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.111025","article-title":"Attention-guided low-rank convolutional weighting for industrial missing data attacks","volume":"156","author":"Zhang","year":"2025","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"11","key":"10.1016\/j.engappai.2025.113472_b45","doi-asserted-by":"crossref","first-page":"10952","DOI":"10.1109\/TKDE.2022.3230959","article-title":"A game-theoretic federated learning framework for data quality improvement","volume":"35","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"10.1016\/j.engappai.2025.113472_b46","doi-asserted-by":"crossref","first-page":"3333","DOI":"10.1109\/TKDE.2021.3140131","article-title":"A robust game-theoretical federated learning framework with joint differential privacy","volume":"35","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.engappai.2025.113472_b47","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.comcom.2022.01.006","article-title":"Attention-based federated incremental learning for traffic classification in the internet of things","volume":"185","author":"Zhu","year":"2022","journal-title":"Comput. Commun."},{"key":"10.1016\/j.engappai.2025.113472_b48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.future.2023.11.038","article-title":"FedViT: Federated continual learning of vision transformer at edge","volume":"154","author":"Zuo","year":"2024","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625035031?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625035031?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:38:12Z","timestamp":1773887892000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197625035031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":48,"alternative-id":["S0952197625035031"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113472","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A robust federated learning framework for low-quality data and its applications","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113472","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"113472"}}