{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T01:47:11Z","timestamp":1777945631819,"version":"3.51.4"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.ins.2026.123389","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T07:32:07Z","timestamp":1774078327000},"page":"123389","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Entropy-guided meta-learning defense against data poisoning attacks in blockchain-assisted federated learning"],"prefix":"10.1016","volume":"745","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0142-1005","authenticated-orcid":false,"given":"Waheeb","family":"Algethami","sequence":"first","affiliation":[]},{"given":"Guowei","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3475-0745","authenticated-orcid":false,"given":"Faisal","family":"Alshami","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5949-9657","authenticated-orcid":false,"given":"Muhanna","family":"Ali","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2026.123389_bib0005","series-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20\u201322 April 2017, Fort Lauderdale, FL, USA, Vol. 54 of Proceedings of Machine Learning Research","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"issue":"10","key":"10.1016\/j.ins.2026.123389_bib0010","doi-asserted-by":"crossref","first-page":"13565","DOI":"10.1007\/s10586-024-04629-7","article-title":"A survey on privacy-preserving federated learning against poisoning attacks","volume":"27","author":"Xia","year":"2024","journal-title":"Clust. Comput."},{"key":"10.1016\/j.ins.2026.123389_bib0015","unstructured":"M. Daniels, S. Gallus, R. Wood, Towards scalable and secure federated learning: key issues and future research, TechRxiv Preprint. 10.36227\/techrxiv.173894842.25024919\/v1"},{"issue":"3s","key":"10.1016\/j.ins.2026.123389_bib0020","article-title":"Federated learning for privacy-preserving machine learning: a comprehensive review of techniques, architectures, and open research directions","volume":"38","author":"Pandey","year":"2025","journal-title":"Int. J. Appl. Math."},{"key":"10.1016\/j.ins.2026.123389_bib0025","doi-asserted-by":"crossref","DOI":"10.3390\/app142210706","article-title":"Federated learning: a comparative study of defenses against poisoning attacks","volume":"14","author":"Carvalho","year":"2024","journal-title":"Appl. Sci."},{"key":"10.1016\/j.ins.2026.123389_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2024.107320","article-title":"A secure federated learning framework based on autoencoder and long short-term memory with generalized robust loss function for detection and prevention of data poisoning attacks","volume":"102","author":"Singh","year":"2025","journal-title":"Biomed. Signal Process. Control"},{"key":"10.1016\/j.ins.2026.123389_bib0035","series-title":"Proceedings of the 33rd IEEE International Conference on Computer Communications and Networks (ICCCN)","first-page":"1","article-title":"Securing federated learning: enhancing defense mechanisms against poisoning attacks","author":"Birchman","year":"2024"},{"key":"10.1016\/j.ins.2026.123389_bib0040","doi-asserted-by":"crossref","unstructured":"P.R. Ovi, A. Gangopadhyay, Robust federated learning against data poisoning attacks: prevention and detection of attacked nodes, Electronics 14 (15), 10.3390\/electronics14152970,https:\/\/www.mdpi.com\/2079-9292\/14\/15\/2970","DOI":"10.3390\/electronics14152970"},{"issue":"9","key":"10.1016\/j.ins.2026.123389_bib0045","first-page":"5155","article-title":"Disguised as privacy: data poisoning attacks against differentially private crowdsensing systems","volume":"22","author":"Li","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.ins.2026.123389_bib0050","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.future.2022.04.010","article-title":"SecFedNIDS: robust defense for poisoning attack against federated learning-based network intrusion detection system","volume":"134","author":"Zhang","year":"2022","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"12","key":"10.1016\/j.ins.2026.123389_bib0055","doi-asserted-by":"crossref","first-page":"7897","DOI":"10.1109\/TII.2021.3071405","article-title":"Deep learning-based autonomous driving systems: a survey of attacks and defenses","volume":"17","author":"Deng","year":"2021","journal-title":"IEEE Trans. Ind. Informatics"},{"issue":"1","key":"10.1016\/j.ins.2026.123389_bib0060","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/TII.2022.3198481","article-title":"Data poisoning attacks in internet-of-vehicle networks: taxonomy, state-of-the-art, and future directions","volume":"19","author":"Chen","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"issue":"1","key":"10.1016\/j.ins.2026.123389_bib0065","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s10462-024-11014-8","article-title":"Deep learning adversarial attacks and defenses in autonomous vehicles: a systematic literature review from a safety perspective","volume":"58","author":"Ibrahum","year":"2025","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.ins.2026.123389_bib0070","unstructured":"M.S. Salek, A. Al Mamun, M. Chowdhury, AR-GAN: generative adversarial network-based defense method against adversarial attacks on the traffic sign classification system of autonomous vehicles, CoRR abs\/2401.14232. 10.48550\/ARXIV.2401.14232"},{"issue":"10","key":"10.1016\/j.ins.2026.123389_bib0075","doi-asserted-by":"crossref","first-page":"6526","DOI":"10.1109\/TII.2022.3156645","article-title":"ADFL: a poisoning attack defense framework for horizontal federated learning","volume":"18","author":"Guo","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"issue":"14","key":"10.1016\/j.ins.2026.123389_bib0080","doi-asserted-by":"crossref","DOI":"10.3390\/su151410931","article-title":"A content poisoning attack detection and prevention system in vehicular named data networking","volume":"15","author":"Magsi","year":"2023","journal-title":"Sustainability"},{"key":"10.1016\/j.ins.2026.123389_bib0085","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.future.2023.10.005","article-title":"Personalized federated learning-based intrusion detection system: poisoning attack and defense","volume":"153","author":"Thein","year":"2024","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10.1016\/j.ins.2026.123389_bib0090","unstructured":"X. Li, X. Yang, Z. Zhou, R. Lu, Efficiently achieving privacy preservation and poisoning attack resistance in federated learning, IEEE Transactions on Information Forensics and Security 10.1109\/TIFS.2024.3378006"},{"key":"10.1016\/j.ins.2026.123389_bib0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2024.107320","article-title":"A secure federated learning framework based on autoencoder and long short-term memory with generalized robust loss function for detection and prevention of data poisoning attacks","volume":"102","author":"Singh","year":"2025","journal-title":"Biomed. Signal Process. Control"},{"key":"10.1016\/j.ins.2026.123389_bib0100","doi-asserted-by":"crossref","first-page":"50017","DOI":"10.1109\/ACCESS.2025.3552168","article-title":"AIDFL: an information-driven anomaly detector for data poisoning in decentralized federated learning","volume":"13","author":"Chen","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2026.123389_bib0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111427","article-title":"AntidoteFL: enhancing defense against poisoning attacks in federated learning","volume":"269","author":"Liu","year":"2025","journal-title":"Comput. Netw."},{"key":"10.1016\/j.ins.2026.123389_bib0110","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/TIFS.2022.3169918","article-title":"ShieldFL: mitigating model poisoning attacks in privacy-preserving federated learning","volume":"17","author":"Ma","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2026.123389_bib0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110383","article-title":"Robust and privacy-preserving federated learning with distributed additive encryption against poisoning attacks","volume":"245","author":"Zhang","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.ins.2026.123389_bib0120","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110909","article-title":"DUPS: data poisoning attacks with uncertain sample selection for federated learning","volume":"256","author":"Zhang","year":"2025","journal-title":"Comput. Netw."},{"key":"10.1016\/j.ins.2026.123389_bib0125","doi-asserted-by":"crossref","first-page":"28628","DOI":"10.1109\/ACCESS.2025.3538891","article-title":"A meta-reinforcement learning-based poisoning attack framework against federated learning","volume":"13","author":"Zhou","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2026.123389_bib0130","doi-asserted-by":"crossref","first-page":"60108","DOI":"10.1109\/ACCESS.2025.3556906","article-title":"An optimal two-step approach for defense against poisoning attacks in federated learning","volume":"13","author":"Ali","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2026.123389_bib0135","unstructured":"M. Garc\u00eda-M\u00e1rquez, N.R. Barroso, M.V. Luz\u00f3n, F. Herrera, Krum federated chain (KFC): using blockchain to defend against adversarial attacks in federated learning, CoRR abs\/2502.06917. 10.48550\/arXiv.2502.06917"},{"key":"10.1016\/j.ins.2026.123389_bib0140","doi-asserted-by":"crossref","first-page":"139931","DOI":"10.1109\/ACCESS.2025.3596627","article-title":"Robust and privacy-preserving federated learning against malicious clients: a Bulyan-based adaptive differential privacy framework","volume":"13","author":"Pandey","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2026.123389_bib0145","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103562","article-title":"VPPFL: a verifiable privacy-preserving federated learning scheme against poisoning attacks","volume":"136","author":"Huang","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.ins.2026.123389_bib0150","doi-asserted-by":"crossref","first-page":"2848","DOI":"10.1109\/TIFS.2022.3196274","article-title":"Privacy-preserving byzantine-robust federated learning via blockchain systems","volume":"17","author":"Miao","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2026.123389_bib0155","doi-asserted-by":"crossref","first-page":"4574","DOI":"10.1109\/TIFS.2021.3108434","article-title":"Privacy-enhanced federated learning against poisoning adversaries","volume":"16","author":"Liu","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2026.123389_bib0160","series-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4\u20139, 2017","first-page":"119","article-title":"Machine learning with adversaries: byzantine tolerant gradient descent","author":"Blanchard","year":"2017"},{"key":"10.1016\/j.ins.2026.123389_bib0165","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.120350","article-title":"FlexibleFL: mitigating poisoning attacks with contributions in cloud-edge federated learning systems","volume":"664","author":"Zhao","year":"2024","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2026.123389_bib0170","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023, Long Beach, CA, USA, August 6\u201310, 2023","first-page":"2096","article-title":"ShapleyFL: robust federated learning based on Shapley value","author":"Sun","year":"2023"},{"key":"10.1016\/j.ins.2026.123389_bib0175","series-title":"28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, February 21\u201325, 2021","article-title":"FLTrust: byzantine-robust federated learning via trust bootstrapping","author":"Cao","year":"2021"},{"key":"10.1016\/j.ins.2026.123389_bib0180","series-title":"International Wireless Communications and Mobile Computing, IWCMC 2024, Ayia Napa, Cyprus, May 27\u201331, 2024","first-page":"1112","article-title":"ERD-FL: entropy-driven robust defense for federated learning","author":"Atia","year":"2024"},{"key":"10.1016\/j.ins.2026.123389_bib0185","unstructured":"M. Kelly, R. Longjohn, K. Nottingham, MNIST database of handwritten digits, 2021, 10.24432\/C53K8Q"},{"key":"10.1016\/j.ins.2026.123389_bib0190","unstructured":"H. Xiao, K. Rasul, R. Vollgraf, Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms, CoRR abs\/1708.07747.http:\/\/arxiv.org\/abs\/1708.07747"},{"key":"10.1016\/j.ins.2026.123389_bib0195","unstructured":"V.N. Alex Krizhevsky, G. Hinton, The CIFAR-10 and CIFAR-100 datasets, Google in Mountain View.https:\/\/www.cs.toronto.edu\/kriz\/cifar.html"},{"issue":"3","key":"10.1016\/j.ins.2026.123389_bib0200","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1109\/TPDS.2022.3230938","article-title":"GossipFL: a decentralized federated learning framework with sparsified and adaptive communication","volume":"34","author":"Tang","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.ins.2026.123389_bib0205","doi-asserted-by":"crossref","first-page":"2848","DOI":"10.1109\/TIFS.2022.3196274","article-title":"Privacy-preserving byzantine-robust federated learning via blockchain systems","volume":"17","author":"Miao","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025526003208?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025526003208?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T12:39:13Z","timestamp":1777725553000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025526003208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":41,"alternative-id":["S0020025526003208"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2026.123389","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Entropy-guided meta-learning defense against data poisoning attacks in blockchain-assisted federated learning","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2026.123389","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"123389"}}