{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:41:22Z","timestamp":1775144482962,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Cryptologic Science Fund of China","award":["No.2025NCSF02032"],"award-info":[{"award-number":["No.2025NCSF02032"]}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["No.2022JZ-38"],"award-info":[{"award-number":["No.2022JZ-38"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61807026"],"award-info":[{"award-number":["No.61807026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Secure Communication Key Laboratory Stabilization Program Support Project","award":["No.2023"],"award-info":[{"award-number":["No.2023"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/jiot.2025.3601856","type":"journal-article","created":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:02:27Z","timestamp":1755910947000},"page":"1-1","source":"Crossref","is-referenced-by-count":3,"title":["Robust Privacy-Enhanced Aggregation Scheme for Federated Learning in Industrial Internet of Things"],"prefix":"10.1109","author":[{"given":"Zhenhua","family":"Liu","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1695-3279","authenticated-orcid":false,"given":"Pengbo","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3247-5620","authenticated-orcid":false,"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Communication Engineering, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist. (AISTATS)","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxac128"},{"key":"ref5","article-title":"FedML: A research library and benchmark for federated machine learning","author":"He","year":"2020","journal-title":"arXiv:2007.13518"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179400"},{"key":"ref11","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume":"33","author":"Geiping","year":"2020","journal-title":"Advances in Neural Information Processing System"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2931068"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151670"},{"key":"ref14","first-page":"7575","article-title":"cpSGD: Communication-efficient and differentially-private distributed SGD","volume":"31","author":"Agarwal","year":"2018","journal-title":"Advances in Neural Information Processing System"},{"key":"ref15","article-title":"Distributed privacy-preserving prediction","author":"Lyu","year":"2019","journal-title":"arXiv:1910.11478"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_23"},{"key":"ref18","first-page":"259","article-title":"Prio: Private, robust, and scalable computation of aggregate statistics","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Corrigan-Gibbs"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179468"},{"key":"ref21","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u00fd","year":"2017","journal-title":"arXiv:1610.05492"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3315526"},{"key":"ref23","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Advances in Neural Information Processing System"},{"key":"ref24","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. 35th Int. Conf. Mach. Learn. (ICML)","author":"Yin"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24512"},{"key":"ref27","first-page":"8635","article-title":"A little is enough: Circumventing defenses for distributed learning","volume":"32","author":"Baruch","year":"2019","journal-title":"Advances in Neural Information Processing System"},{"key":"ref28","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Security Symp.","author":"Fang"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833647"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24620"},{"key":"ref33","first-page":"1","article-title":"Privacy-preserving aggregation of time-series data","volume-title":"Proc. Netw. Distrib. System Security Symp. (NDSS)","author":"Shi"},{"key":"ref34","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019","journal-title":"arXiv:1911.07963"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179434"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00023"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560557"},{"key":"ref40","article-title":"Secure aggregation in federated learning is not private: Leaking user data at large scale through model modification","author":"Zhao","year":"2023","journal-title":"arXiv:2303.12233"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref43","first-page":"769","article-title":"SPDZ2k: Efficient MPC mod 2K for dishonest majority","volume-title":"Proc. Annu. Int. Cryptol. Conf.","author":"Cramer"},{"key":"ref44","first-page":"809","article-title":"Cheetah: Lean and fast secure two-party deep neural network inference","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Huang"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3108197"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3411402"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111764"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3421602"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108331"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3267479"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3224443"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3519331"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3310106"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3554759"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"ref56","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref59","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref61","first-page":"35","article-title":"ABY3: A mixed protocol framework for machine learning","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS)","author":"Mohassel"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/6702522\/11134437.pdf?arnumber=11134437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T04:44:39Z","timestamp":1761367479000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11134437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3601856","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}