{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T04:08:11Z","timestamp":1777867691309,"version":"3.51.4"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Parallel and Distributed Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.jpdc.2026.105266","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T23:49:17Z","timestamp":1774396157000},"page":"105266","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["EPRA-VFL: A privacy-preserving and efficient verifiable federated learning scheme with robust aggregation"],"prefix":"10.1016","volume":"213","author":[{"given":"Yujie","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lu","family":"Guo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhijie","family":"Guo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chuangqi","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Boqun","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.jpdc.2026.105266_bib0001","series-title":"Exploiting unintended feature leakage in collaborative learning; proceedings of the 2019 IEEE symposium on security and privacy (SP), F","author":"MELIS","year":"2019"},{"key":"10.1016\/j.jpdc.2026.105266_bib0002","series-title":"proceedings of the Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), F","article-title":"Comprehensive privacy analysis of deep learning","author":"NASR","year":"2018"},{"issue":"06","key":"10.1016\/j.jpdc.2026.105266_bib0003","first-page":"2833","article-title":"Survey on security and privacy of federated learning models","volume":"34","author":"YUHAO","year":"2023","journal-title":"J. Softw."},{"key":"10.1016\/j.jpdc.2026.105266_bib0004","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1109\/TSP.2022.3153135","article-title":"Robust aggregation for federated learning","volume":"70","author":"PILLUTLA","year":"2022","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.jpdc.2026.105266_bib0005","series-title":"Byzantine Tolerant Gradient Descent; proceedings of the Neural Information Processing Systems, F","article-title":"Machine learning with adversaries","author":"BLANCHARD","year":"2017"},{"key":"10.1016\/j.jpdc.2026.105266_bib0006","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","article-title":"VerifyNet: secure and verifiable federated learning","volume":"15","author":"XU","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jpdc.2026.105266_bib0007","series-title":"Deep Leakage from Gradients; proceedings of the 2019 International Conference on Neural Information Processing Systems, F, 2019 [C]","author":"ZHU","year":"2019"},{"issue":"3-4","key":"10.1016\/j.jpdc.2026.105266_bib0008","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s12243-022-00929-4","article-title":"Mitigation of a poisoning attack in federated learning by using historical distance detection","volume":"78","author":"SHI","year":"2023","journal-title":"Ann. Telecommun."},{"key":"10.1016\/j.jpdc.2026.105266_bib0009","doi-asserted-by":"crossref","first-page":"34138","DOI":"10.1109\/ACCESS.2023.3263564","article-title":"Toward federated learning with byzantine and inactive users: A game theory approach","volume":"11","author":"CHEN","year":"2023","journal-title":"Ieee Access"},{"key":"10.1016\/j.jpdc.2026.105266_bib0010","first-page":"254","article-title":"Byzantine-robust federated learning via Cosine Similarity aggregation","author":"ZHU","year":"2024","journal-title":"Comput. Netw."},{"issue":"6","key":"10.1016\/j.jpdc.2026.105266_bib0011","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.109.065313","article-title":"Copycat perceptron: smashing barriers through collective learning","volume":"109","author":"CATANIA","year":"2024","journal-title":"Phys. Rev. E"},{"issue":"9","key":"10.1016\/j.jpdc.2026.105266_bib0012","doi-asserted-by":"crossref","first-page":"5880","DOI":"10.1002\/int.22818","article-title":"Privacy-preserving federated learning based on multi-key homomorphic encryption","volume":"37","author":"MA","year":"2022","journal-title":"Int. J. Intell. Syst."},{"issue":"5","key":"10.1016\/j.jpdc.2026.105266_bib0013","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"AONO","year":"2017","journal-title":"IEEE trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jpdc.2026.105266_bib0014","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.neucom.2021.08.062","article-title":"Distributed additive encryption and quantization for privacy preserving federated deep learning","volume":"463","author":"ZHU","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jpdc.2026.105266_bib0015","series-title":"proceedings of the 31st USENIX Security Symposium (USENIX Security 22), F","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","author":"STEVENS","year":"2022"},{"key":"10.1016\/j.jpdc.2026.105266_bib0016","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: algorithms and performance analysis","volume":"15","author":"WEI","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jpdc.2026.105266_bib0017","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/TIFS.2022.3227435","article-title":"Privacy-preserving and verifiable federated learning framework for edge computing","volume":"18","author":"ZHOU","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"10.1016\/j.jpdc.2026.105266_bib0018","doi-asserted-by":"crossref","first-page":"3400","DOI":"10.1109\/TNNLS.2019.2944481","article-title":"Robust and communication-efficient federated learning from non-iid data","volume":"31","author":"SATTLER","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.jpdc.2026.105266_bib0019","series-title":"FLOD: Oblivious defender for private Byzantine-robust federated learning with dishonest-majority; proceedings of the European Symposium on Research in Computer Security, F","author":"DONG","year":"2021"},{"key":"10.1016\/j.jpdc.2026.105266_bib0020","unstructured":"GAO Q, SUN Y, GAI X, et al. PRFL: A robust aggregation approach for privacy-protecting Federated Learning. Comput. Sci.: 1-17."},{"issue":"1","key":"10.1016\/j.jpdc.2026.105266_bib0021","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TDSC.2021.3126323","article-title":"Versa: verifiable secure aggregation for cross-device federated learning","volume":"20","author":"HAHN","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"10.1016\/j.jpdc.2026.105266_bib0022","doi-asserted-by":"crossref","first-page":"3316","DOI":"10.1109\/TII.2020.3036166","article-title":"VFL: A verifiable federated learning with privacy-preserving for big data in industrial IoT","volume":"18","author":"FU","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jpdc.2026.105266_bib0023","article-title":"WVFL: weighted verifiable secure aggregation in federated learning","author":"ZHONG","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"01","key":"10.1016\/j.jpdc.2026.105266_bib0024","first-page":"69","article-title":"Research on centralized differential privacy algorithm for federated learning","volume":"24","author":"RUZHI","year":"2024","journal-title":"Netinfo Secur."},{"key":"10.1016\/j.jpdc.2026.105266_bib0025","series-title":"proceedings of the Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, F","article-title":"Deep learning with differential privacy","author":"ABADI","year":"2016"},{"key":"10.1016\/j.jpdc.2026.105266_bib0026","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial IoT","volume":"16","author":"LU","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jpdc.2026.105266_bib0027","series-title":"Federated learning with Gaussian differential privacy; proceedings of the Proceedings of the 2020 2nd international conference on robotics, intelligent control and artificial intelligence, F","author":"CHUANXIN","year":"2020"},{"issue":"3","key":"10.1016\/j.jpdc.2026.105266_bib0028","doi-asserted-by":"crossref","first-page":"2134","DOI":"10.1109\/TII.2019.2942179","article-title":"Differentially private asynchronous federated learning for mobile edge computing in urban informatics","volume":"16","author":"LU","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jpdc.2026.105266_bib0029","series-title":"Distributed Learning without Distress: Privacy-Preserving Empirical Risk Minimization; proceedings of the Neural Information Processing Systems, F","author":"JAYARAMAN","year":"2018"},{"key":"10.1016\/j.jpdc.2026.105266_bib0030","series-title":"Practical secure aggregation for privacy-preserving machine learning; proceedings of the proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, F","author":"BONAWITZ","year":"2017"},{"issue":"09","key":"10.1016\/j.jpdc.2026.105266_bib0031","first-page":"297","article-title":"Federated learning scheme based on secure multi-party computation and differential privacy","volume":"49","author":"LINGTAO","year":"2022","journal-title":"Comput. Sci."},{"issue":"6","key":"10.1016\/j.jpdc.2026.105266_bib0032","doi-asserted-by":"crossref","first-page":"2073","DOI":"10.1109\/TSC.2019.2897554","article-title":"Demystifying membership inference attacks in machine learning as a service","volume":"14","author":"TRUEX","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jpdc.2026.105266_bib0033","first-page":"30","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","author":"BLANCHARD","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jpdc.2026.105266_bib0034","first-page":"16070","article-title":"Attack of the tails: yes, you really can backdoor federated learning","volume":"33","author":"WANG","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jpdc.2026.105266_bib0035","article-title":"Fltrust: Byzantine-robust federated learning via trust bootstrapping","author":"CAO","year":"2020","journal-title":"arXiv prepr. arXiv:201213995"},{"issue":"12","key":"10.1016\/j.jpdc.2026.105266_bib0036","doi-asserted-by":"crossref","first-page":"3690","DOI":"10.1109\/TPDS.2022.3167434","article-title":"Differentially private byzantine-robust federated learning","volume":"33","author":"MA","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"06","key":"10.1016\/j.jpdc.2026.105266_bib0037","first-page":"138","article-title":"Byzantine-robust federated learning overNon-IID data","volume":"44","author":"MA","year":"2023","journal-title":"J. Commun."},{"key":"10.1016\/j.jpdc.2026.105266_bib0038","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TIFS.2020.3043139","article-title":"V eri fl: communication-efficient and fast verifiable aggregation for federated learning","volume":"16","author":"GUO","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.jpdc.2026.105266_bib0039","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.future.2021.10.017","article-title":"Non-interactive verifiable privacy-preserving federated learning","volume":"128","author":"XU","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"10.1016\/j.jpdc.2026.105266_bib0040","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/TDSC.2022.3146448","article-title":"Aggregation service for federated learning: an efficient, secure, and more resilient realization","volume":"20","author":"ZHENG","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.jpdc.2026.105266_bib0041","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1007\/s11280-020-00780-4","article-title":"DP-FL: a novel differentially private federated learning framework for the unbalanced data","volume":"23","author":"HUANG","year":"2020","journal-title":"World Wide Web"}],"container-title":["Journal of Parallel and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731526000444?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731526000444?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:42:06Z","timestamp":1777545726000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0743731526000444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":41,"alternative-id":["S0743731526000444"],"URL":"https:\/\/doi.org\/10.1016\/j.jpdc.2026.105266","relation":{},"ISSN":["0743-7315"],"issn-type":[{"value":"0743-7315","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"EPRA-VFL: A privacy-preserving and efficient verifiable federated learning scheme with robust aggregation","name":"articletitle","label":"Article Title"},{"value":"Journal of Parallel and Distributed Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jpdc.2026.105266","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"105266"}}