{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T21:05:18Z","timestamp":1776891918006,"version":"3.51.2"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100015956","name":"Special Project for Research and Development in Key areas of Guangdong Province","doi-asserted-by":"publisher","award":["2023B0303030001"],"award-info":[{"award-number":["2023B0303030001"]}],"id":[{"id":"10.13039\/501100015956","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012541","name":"Guangdong Innovative and Entrepreneurial Research Team Program","doi-asserted-by":"publisher","award":["2019ZT08X214"],"award-info":[{"award-number":["2019ZT08X214"]}],"id":[{"id":"10.13039\/100012541","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4252030"],"award-info":[{"award-number":["4252030"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92267203"],"award-info":[{"award-number":["92267203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.neucom.2026.133437","type":"journal-article","created":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T18:12:00Z","timestamp":1774462320000},"page":"133437","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Privacy-preserving decentralized federated broad continuous learning based on complete binary tree"],"prefix":"10.1016","volume":"682","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7348-6337","authenticated-orcid":false,"given":"Chang-E","family":"Ren","sequence":"first","affiliation":[]},{"given":"Siyao","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Li","sequence":"additional","affiliation":[]},{"given":"C.L.Philip","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133437_bib0005","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume":"vol. 54","author":"Mcmahan","year":"2017"},{"key":"10.1016\/j.neucom.2026.133437_bib0010","doi-asserted-by":"crossref","first-page":"46","DOI":"10.70470\/SHIFRA\/2025\/002","article-title":"Federated Learning in Healthcare: a bibliometric analysis of privacy, security, and adversarial threats (2021-2024)","volume":"2025","author":"Almaiah","year":"2025","journal-title":"SHIFRA"},{"issue":"3","key":"10.1016\/j.neucom.2026.133437_bib0015","doi-asserted-by":"crossref","first-page":"2031","DOI":"10.1109\/COMST.2020.2986024","article-title":"Federated learning in mobile edge networks: a comprehensive survey","volume":"22","author":"Lim","year":"2020","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.neucom.2026.133437_bib0020","series-title":"Third Workshop on Bayesian Deep Learning (NeurIPS)","article-title":"Fully decentralized federated learning","volume":"vol. 2","author":"Lalitha","year":"2018"},{"issue":"8","key":"10.1016\/j.neucom.2026.133437_bib0025","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1093\/jamia\/ocy017","article-title":"Distributed deep learning networks among institutions for medical imaging","volume":"25","author":"Chang","year":"2018","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"10.1016\/j.neucom.2026.133437_bib0030","series-title":"Multi-institutional deep learning modeling without sharing patient data: a feasibility study on brain tumor segmentation","author":"Sheller","year":"2018"},{"issue":"1","key":"10.1016\/j.neucom.2026.133437_bib0035","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-020-69250-1","article-title":"Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data","volume":"10","author":"Sheller","year":"2020","journal-title":"Sci. Rep."},{"key":"10.1016\/j.neucom.2026.133437_bib0040","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0079-7421(08)60536-8","article-title":"Catastrophic interference in connectionist networks: the sequential learning problem","volume":"24","author":"Mccloskey","year":"1989","journal-title":"Psychol. Learn. Motiv."},{"key":"10.1016\/j.neucom.2026.133437_bib0045","article-title":"Continual learning for robotics: definition, framework, learning strategies, opportunities and challenges","volume":"58","author":"Lesort","year":"2019","journal-title":"Inf. Fusion."},{"issue":"99","key":"10.1016\/j.neucom.2026.133437_bib0050","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPAMI.2021.3057446","article-title":"A continual learning survey: defying forgetting in classification tasks","author":"Delange","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"99","key":"10.1016\/j.neucom.2026.133437_bib0055","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/TNNLS.2017.2716952","article-title":"Broad learning system: an effective and efficient incremental learning system without the need for deep architecture","volume":"29","author":"Chen","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.neucom.2026.133437_bib0060","first-page":"16937","article-title":"Inverting gradients \u2013 how easy is it to break privacy in federated learning?","volume":"33","author":"Geiping","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133437_bib0065","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: algorithms and performance analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.neucom.2026.133437_bib0070","series-title":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","article-title":"Towards efficient and privacy-preserving federated deep learning","author":"Hao","year":"2019"},{"key":"10.1016\/j.neucom.2026.133437_bib0075","series-title":"2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","first-page":"611","article-title":"Fbl-Bp: byzantine-resilient and privacy-preserving federated broad learning","author":"Cheng","year":"2023"},{"key":"10.1016\/j.neucom.2026.133437_bib0080","author":"Yang"},{"key":"10.1016\/j.neucom.2026.133437_bib0085","series-title":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","first-page":"1207","article-title":"Communication-efficient decentralized learning with sparsification and adaptive peer selection","author":"Tang","year":"2020"},{"key":"10.1016\/j.neucom.2026.133437_bib0090","series-title":"2020 20th IEEE\/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID)","first-page":"410","article-title":"Two-phase multi-party computation enabled privacy-preserving federated learning","author":"Kanagavelu","year":"2020"},{"key":"10.1016\/j.neucom.2026.133437_bib0095","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz","year":"2017"},{"issue":"5","key":"10.1016\/j.neucom.2026.133437_bib0100","doi-asserted-by":"crossref","first-page":"4641","DOI":"10.1109\/JIOT.2020.2964162","article-title":"Federated learning with cooperating devices: a consensus approach for massive IOT networks","volume":"7","author":"Savazzi","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.neucom.2026.133437_bib0105","series-title":"2021 IEEE Symposium on Computers and Communications (ISCC)","first-page":"1","article-title":"Towards a peer-to-peer federated machine learning environment for continuous authentication","author":"Monschein","year":"2021"},{"issue":"2","key":"10.1016\/j.neucom.2026.133437_bib0110","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MCOM.001.2000200","article-title":"Opportunities of federated learning in connected, cooperative, and automated industrial systems","volume":"59","author":"Savazzi","year":"2021","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.neucom.2026.133437_bib0115","series-title":"International Conference on Machine Learning","first-page":"31269","article-title":"Improving the model consistency of decentralized federated learning","author":"Shi","year":"2023"},{"issue":"5","key":"10.1016\/j.neucom.2026.133437_bib0120","doi-asserted-by":"crossref","first-page":"3558","DOI":"10.1109\/TNSE.2022.3175945","article-title":"Deep-fel: decentralized, efficient and privacy-enhanced federated edge learning for healthcare cyber physical systems","volume":"9","author":"Lian","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.neucom.2026.133437_bib0125","author":"Hu"},{"key":"10.1016\/j.neucom.2026.133437_bib0130","series-title":"Federated Learning Using Peer-to-Peer Network for Decentralized Orchestration of Model Weights","author":"Behera","year":"2021"},{"key":"10.1016\/j.neucom.2026.133437_bib0135","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.ins.2023.01.130","article-title":"Enhancing privacy preservation and trustworthiness for decentralized federated learning","volume":"628","author":"Wang","year":"2023","journal-title":"Inf. Sci."},{"issue":"12","key":"10.1016\/j.neucom.2026.133437_bib0140","doi-asserted-by":"crossref","first-page":"4783","DOI":"10.1109\/TPDS.2022.3202887","article-title":"A decentralized federated learning framework via committee mechanism with convergence guarantee","volume":"33","author":"Che","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"10.1016\/j.neucom.2026.133437_bib0145","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/MNET.011.2000263","article-title":"A blockchain-based decentralized federated learning framework with committee consensus","volume":"35","author":"Li","year":"2020","journal-title":"IEEE Netw."},{"key":"10.1016\/j.neucom.2026.133437_bib0150","author":"Zhao"},{"issue":"7","key":"10.1016\/j.neucom.2026.133437_bib0155","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1109\/TPDS.2020.3044223","article-title":"Biscotti: a blockchain system for private and secure federated learning","volume":"32","author":"Shayan","year":"2020","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.neucom.2026.133437_bib0160","author":"Roy"},{"issue":"4","key":"10.1016\/j.neucom.2026.133437_bib0165","doi-asserted-by":"crossref","first-page":"2879","DOI":"10.1109\/TSC.2023.3250705","article-title":"Privacy-preserving and reliable decentralized federated learning","volume":"16","author":"Gao","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"9","key":"10.1016\/j.neucom.2026.133437_bib0170","doi-asserted-by":"crossref","first-page":"6273","DOI":"10.1109\/TII.2022.3145010","article-title":"Decentralized wireless federated learning with differential privacy","volume":"18","author":"Chen","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.neucom.2026.133437_bib0175","series-title":"International Conference on Artificial Intelligence and Statistics","first-page":"473","article-title":"Personalized and private peer-to-peer machine learning","author":"Bellet","year":"2018"},{"key":"10.1016\/j.neucom.2026.133437_bib0180","series-title":"2018 IEEE International Conference on Big Data (Big Data)","first-page":"1178","article-title":"When machine learning meets blockchain: a decentralized, privacy-preserving and secure design","author":"Chen","year":"2018"},{"key":"10.1016\/j.neucom.2026.133437_bib0185","article-title":"Gain: decentralized privacy-preserving federated learning","volume":"78","author":"Jiang","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.neucom.2026.133437_bib0190","series-title":"IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","first-page":"1","article-title":"Privacy-preserving decentralized aggregation for federated learning","author":"Jeon","year":"2021"},{"key":"10.1016\/j.neucom.2026.133437_bib0195","series-title":"International Conference on Service-Oriented Computing","first-page":"176","article-title":"Decentralized federated learning preserves model and data privacy","author":"Wittkopp","year":"2020"},{"issue":"4","key":"10.1016\/j.neucom.2026.133437_bib0200","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TIFS.2018.2868162","article-title":"Enabling efficient and geometric range query with access control over encrypted spatial data","volume":"14","author":"Xu","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.neucom.2026.133437_bib0205","doi-asserted-by":"crossref","first-page":"3854","DOI":"10.1109\/TVT.2019.2895834","article-title":"Efficient and privacy-preserving truth discovery in mobile crowd sensing systems","volume":"68","author":"Xu","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.neucom.2026.133437_bib0210","series-title":"Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004","article-title":"Learning methods for generic object recognition with invariance to pose and lighting","volume":"vol. 2","author":"LeCun","year":"2004"},{"issue":"8","key":"10.1016\/j.neucom.2026.133437_bib0215","doi-asserted-by":"crossref","first-page":"3874","DOI":"10.1109\/TCYB.2021.3090260","article-title":"Federated continuous learning with broad network architecture","volume":"51","author":"Le","year":"2021","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.neucom.2026.133437_bib0220","author":"Yuan"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226008349?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226008349?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:32:19Z","timestamp":1776889939000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226008349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":44,"alternative-id":["S0925231226008349"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133437","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Privacy-preserving decentralized federated broad continuous learning based on complete binary tree","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133437","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133437"}}