{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:45:21Z","timestamp":1770756321451,"version":"3.50.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62406299"],"award-info":[{"award-number":["62406299"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Project of the MIIT Key Laboratory of Blockchain Technology and Data Security","award":["KT20250001"],"award-info":[{"award-number":["KT20250001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/jiot.2025.3584084","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T13:39:33Z","timestamp":1751290773000},"page":"51866-51876","source":"Crossref","is-referenced-by-count":1,"title":["LPV-FL: A Lightweight Privacy-Preserving and Verifiable Federated Learning Scheme"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6287-9793","authenticated-orcid":false,"given":"Xia","family":"Lei","sequence":"first","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9542-131X","authenticated-orcid":false,"given":"Siqi","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4537-4650","authenticated-orcid":false,"given":"Yongkai","family":"Fan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist. (PMLR)","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3369658"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3036166"},{"key":"ref5","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in Byzantium","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Guerraoui"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3043139"},{"key":"ref7","first-page":"1","article-title":"Verifiable federated learning","volume-title":"Proc. Workshop Federat. Learn., Recent Adv. New Chall.","author":"Bottoni"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560557"},{"key":"ref10","first-page":"1","article-title":"SafetyNets: Verifiable execution of deep neural networks on an untrusted cloud","volume-title":"Proc. 31st Conf. Neural Inf. Process. Syst.","volume":"30","author":"Ghodsi"},{"key":"ref11","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","author":"Tramer","year":"2018","journal-title":"arXiv:1806.03287"},{"key":"ref12","first-page":"259","article-title":"Prio: Private, robust, and scalable computation of aggregate statistics","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Corrigan-Gibbs"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.124"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103700"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-0989-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148628"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3323206"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2921755"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2019.00030"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3050781"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.03.020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660366"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2022.3180932"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9213-3_12"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11293846\/11058935.pdf?arnumber=11058935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T18:47:32Z","timestamp":1765478852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11058935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":33,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3584084","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,15]]}}}