{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T16:53:30Z","timestamp":1766508810218,"version":"3.48.0"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.eswa.2025.130237","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:49:59Z","timestamp":1762271399000},"page":"130237","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PD","title":["HyperShield: A personalized hypernetwork-based defense against poisoning attacks in federated learning for healthcare"],"prefix":"10.1016","volume":"299","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8382-3793","authenticated-orcid":false,"given":"Bich Thuong","family":"Dao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3329-2529","authenticated-orcid":false,"given":"Viet Duc","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1713-9425","authenticated-orcid":false,"given":"Truong An","family":"Vu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7354-1524","authenticated-orcid":false,"given":"Huu Thanh","family":"Nguyen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6005-1497","authenticated-orcid":false,"given":"Kim-Phuc","family":"Tran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6428-8539","authenticated-orcid":false,"given":"Thu Huong","family":"Truong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2025.130237_bib0001","series-title":"Proceedings of the 2016\u202fACM SIGSAC conference on computer and communications security","first-page":"308","article-title":"Deep learning with differential privacy","author":"Abadi","year":"2016"},{"key":"10.1016\/j.eswa.2025.130237_bib0002","series-title":"International conference on security and cryptography for networks","first-page":"516","article-title":"Prio+: Privacy preserving aggregate statistics via boolean shares","author":"Addanki","year":"2022"},{"key":"10.1016\/j.eswa.2025.130237_bib0003","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1016\/j.future.2024.07.035","article-title":"Privacy-preserving edge federated learning for intelligent mobile-health systems","volume":"161","author":"Aminifar","year":"2024","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.eswa.2025.130237_bib0004","series-title":"2024\u202fIEEE international conference on communications workshops (ICC workshops)","first-page":"1980","article-title":"Bayesian optimisation-driven poisoning attack against personalised federated learning in metaverse","author":"Aristodemou","year":"2024"},{"key":"10.1016\/j.eswa.2025.130237_bib0005","series-title":"International conference on artificial intelligence and statistics","first-page":"2938","article-title":"How to backdoor federated learning","author":"Bagdasaryan","year":"2020"},{"key":"10.1016\/j.eswa.2025.130237_bib0006","article-title":"A little is enough: Circumventing defenses for distributed learning","volume":"32","author":"Baruch","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130237_bib0007","series-title":"32nd USENIX security symposium (USENIX security 23)","first-page":"4805","article-title":"{ACORN}: Input validation for secure aggregation","author":"Bell","year":"2023"},{"key":"10.1016\/j.eswa.2025.130237_bib0008","series-title":"2024\u202fIEEE Conference on secure and trustworthy machine learning (saTML)","first-page":"490","article-title":"Scionfl: Efficient and robust secure quantized aggregation","author":"Ben-Itzhak","year":"2024"},{"key":"10.1016\/j.eswa.2025.130237_bib0009","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130237_bib0010","first-page":"21394","article-title":"Personalized federated learning with moreau envelopes","volume":"33","author":"Canh","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130237_bib0011","doi-asserted-by":"crossref","unstructured":"Cao, X., Fang, M., Liu, J., & Gong, N. Z. (2020). Fltrust: Byzantine-robust federated learning via trust bootstrapping. arXiv preprint arXiv:2012.13995.","DOI":"10.14722\/ndss.2021.24434"},{"key":"10.1016\/j.eswa.2025.130237_bib0012","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"3396","article-title":"Mpaf: Model poisoning attacks to federated learning based on fake clients","author":"Cao","year":"2022"},{"key":"10.1016\/j.eswa.2025.130237_bib0013","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","article-title":"Cybersecurity in healthcare: A narrative review of trends, threats and ways forward","volume":"113","author":"Coventry","year":"2018","journal-title":"Maturitas"},{"issue":"5","key":"10.1016\/j.eswa.2025.130237_bib0014","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3514500","article-title":"Federated learning for electronic health records","volume":"13","author":"Dang","year":"2022","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"10.1016\/j.eswa.2025.130237_bib0015","series-title":"Kdd","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"vol. 96","author":"Ester","year":"1996"},{"key":"10.1016\/j.eswa.2025.130237_bib0016","series-title":"29th USENIX security symposium (USENIX security 20)","first-page":"1605","article-title":"Local model poisoning attacks to {Byzantine-Robust} federated learning","author":"Fang","year":"2020"},{"key":"10.1016\/j.eswa.2025.130237_bib0017","series-title":"23rd international symposium on research in attacks, intrusions and defenses (RAID 2020)","first-page":"301","article-title":"The limitations of federated learning in sybil settings","author":"Fung","year":"2020"},{"issue":"3","key":"10.1016\/j.eswa.2025.130237_bib0018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3083897","article-title":"On the hardness and approximation of euclidean DBSCAN","volume":"42","author":"Gan","year":"2017","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"10.1016\/j.eswa.2025.130237_bib0019","series-title":"International conference on machine learning","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","author":"Guerraoui","year":"2018"},{"key":"10.1016\/j.eswa.2025.130237_bib0020","unstructured":"Johnson, A. E. W., Pollard, T. J., & Mark, R. G. (2016). MIMIC-III clinical database (version 1.4). PhysioNet. [Online]. Available: https:\/\/doi.org\/10.13026\/C2XW26."},{"issue":"1","key":"10.1016\/j.eswa.2025.130237_bib0021","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/TETC.2023.3268186","article-title":"Blockchain-based federated learning with SMPC model verification against poisoning attack for healthcare systems","volume":"12","author":"Kalapaaking","year":"2023","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"10.1016\/j.eswa.2025.130237_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.compbiomed.2023.107845","article-title":"Digital healthcare framework for patients with disabilities based on deep federated learning schemes","volume":"169","author":"Lakhan","year":"2024","journal-title":"Computers in Biology and Medicine"},{"key":"10.1016\/j.eswa.2025.130237_bib0023","series-title":"International conference on machine learning","first-page":"6357","article-title":"Ditto: Fair and robust federated learning through personalization","author":"Li","year":"2021"},{"key":"10.1016\/j.eswa.2025.130237_bib0024","series-title":"2023\u202fIEEE symposium on security and privacy (SP)","first-page":"453","article-title":"RoFL: Robustness of secure federated learning","author":"Lycklama","year":"2023"},{"key":"10.1016\/j.eswa.2025.130237_bib0025","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/TIFS.2022.3169918","article-title":"ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning","volume":"17","author":"Ma","year":"2022","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2025.130237_bib0026","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.csbj.2025.06.009","article-title":"Revolutionizing healthcare data analytics with federated learning: A comprehensive survey of applications, systems, and future directions","volume":"28","author":"Madathil","year":"2025","journal-title":"Computational and Structural Biotechnology Journal"},{"key":"10.1016\/j.eswa.2025.130237_bib0027","series-title":"Artificial intelligence and statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.eswa.2025.130237_bib0028","series-title":"2017\u202fIEEE Symposium on security and privacy (SP)","first-page":"19","article-title":"SecureML: A system for scalable privacy-preserving machine learning","author":"Mohassel","year":"2017"},{"issue":"11","key":"10.1016\/j.eswa.2025.130237_bib0029","doi-asserted-by":"crossref","first-page":"4228","DOI":"10.3390\/s22114228","article-title":"State of the art in smart portable, wearable, ingestible and implantable devices for health status monitoring and disease management","volume":"22","author":"Mukherjee","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.eswa.2025.130237_bib0030","series-title":"Proceedings of the 10th ACM workshop on artificial intelligence and security","first-page":"27","article-title":"Towards poisoning of deep learning algorithms with back-gradient optimization","author":"Mu\u00f1oz-Gonz\u00e1lez","year":"2017"},{"issue":"9","key":"10.1016\/j.eswa.2025.130237_bib0031","doi-asserted-by":"crossref","first-page":"1750","DOI":"10.3390\/electronics14091750","article-title":"Federated learning in smart healthcare: A survey of applications, challenges, and future directions","volume":"14","author":"Nasajpour","year":"2025","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2025.130237_bib0032","series-title":"Globecom 2020 - 2020 ieee global communications conference","first-page":"1","article-title":"Adversarial attacks to machine learning-based smart healthcare systems","author":"Newaz","year":"2020"},{"issue":"1","key":"10.1016\/j.eswa.2025.130237_bib0033","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1038\/s41746-025-01788-8","article-title":"Personalized federated learning for predicting disability progression in multiple sclerosis using real-world routine clinical data","volume":"8","author":"Pirmani","year":"2025","journal-title":"NPJ Digital Medicine"},{"key":"10.1016\/j.eswa.2025.130237_bib0034","unstructured":"Randl, K., Armengol, N. L., Mondrejevski, L., & Miliou, I. (2022). Early prediction of the risk of ICU mortality with deep federated learning. [Online]. Available: https:\/\/arxiv.org\/abs\/2212.00554."},{"key":"10.1016\/j.eswa.2025.130237_bib0035","series-title":"2023\u202fIEEE symposium on security and privacy (SP)","first-page":"1961","article-title":"Elsa: Secure aggregation for federated learning with malicious actors","author":"Rathee","year":"2023"},{"key":"10.1016\/j.eswa.2025.130237_bib0036","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.120377","article-title":"Bpfl: Blockchain-based privacy-preserving federated learning against poisoning attack","volume":"665","author":"Ren","year":"2024","journal-title":"Information Sciences"},{"issue":"2","key":"10.1016\/j.eswa.2025.130237_bib0037","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1109\/JBHI.2022.3143576","article-title":"IoMT: A COVID-19 healthcare system driven by federated learning and blockchain","volume":"27","author":"Samuel","year":"2022","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"10.1016\/j.eswa.2025.130237_bib0038","series-title":"International conference on machine learning","first-page":"9489","article-title":"Personalized federated learning using hypernetworks","author":"Shamsian","year":"2021"},{"key":"10.1016\/j.eswa.2025.130237_bib0039","series-title":"Ndss","article-title":"Manipulating the byzantine: Optimizing model poisoning attacks and defenses for federated learning","author":"Shejwalkar","year":"2021"},{"key":"10.1016\/j.eswa.2025.130237_bib0040","series-title":"Proceedings of the 32nd annual conference on computer security applications","first-page":"508","article-title":"Auror: Defending against poisoning attacks in collaborative deep learning systems","author":"Shen","year":"2016"},{"issue":"3","key":"10.1016\/j.eswa.2025.130237_bib0041","doi-asserted-by":"crossref","first-page":"5644","DOI":"10.1109\/TCE.2024.3386932","article-title":"FedKC: Personalized federated learning with robustness against model poisoning attacks in the metaverse for consumer health","volume":"70","author":"Sun","year":"2024","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.eswa.2025.130237_bib0042","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.eswa.2025.130237_bib0043","article-title":"Federated contrastive learning with feature-based distillation for human activity recognition","author":"Xiao","year":"2025","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"10.1016\/j.eswa.2025.130237_bib0044","doi-asserted-by":"crossref","first-page":"16589","DOI":"10.1109\/TNNLS.2025.3556317","article-title":"Heterogeneous mutual knowledge distillation for wearable human activity recognition","volume":"36","author":"Xiao","year":"2025","journal-title":", IEEE Transactions on Neural Networks and Learning Systems"},{"key":"10.1016\/j.eswa.2025.130237_bib0045","series-title":"International conference on learning representations","article-title":"Dba: Distributed backdoor attacks against federated learning","author":"Xie","year":"2019"},{"key":"10.1016\/j.eswa.2025.130237_bib0046","doi-asserted-by":"crossref","first-page":"6693","DOI":"10.1109\/TIFS.2024.3420126","article-title":"A robust privacy-preserving federated learning model against model poisoning attacks","volume":"19","author":"Yazdinejad","year":"2024","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2025.130237_bib0047","series-title":"International conference on machine learning","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","author":"Yin","year":"2018"},{"key":"10.1016\/j.eswa.2025.130237_bib0048","doi-asserted-by":"crossref","unstructured":"Yuan, S., Fernando, A., & Klonoff, D. C. (2018). Standards for medical device cybersecurity in 2018. Journal of Diabetes Science and Technology, 12(4), 743\u2013746.","DOI":"10.1177\/1932296818763634"},{"key":"10.1016\/j.eswa.2025.130237_bib0049","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1109\/TIFS.2019.2939713","article-title":"Privacy-preserving collaborative deep learning with unreliable participants","volume":"15","author":"Zhao","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425038527?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417425038527?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:44:53Z","timestamp":1766504693000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425038527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":49,"alternative-id":["S0957417425038527"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130237","relation":{},"ISSN":["0957-4174"],"issn-type":[{"type":"print","value":"0957-4174"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"HyperShield: A personalized hypernetwork-based defense against poisoning attacks in federated learning for healthcare","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2025.130237","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"130237"}}