{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:10:23Z","timestamp":1778083823450,"version":"3.51.4"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332007"],"award-info":[{"award-number":["62332007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2028"],"award-info":[{"award-number":["U22B2028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Major Project of Tibetan Autonomous Region of China","award":["XZ202201ZD0006G"],"award-info":[{"award-number":["XZ202201ZD0006G"]}]},{"name":"Open Research Fund of Machine Learning and Cyber Security Interdiscipline Research Engineering Center of Jiangsu Province","award":["SDGC2131"],"award-info":[{"award-number":["SDGC2131"]}]},{"name":"National Joint Engineering Research Center of Network Security Detection and Protection Technology"},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving"},{"name":"Guangdong Hong Kong Joint Laboratory for Data Security and Privacy Protection"},{"name":"Engineering Research Center of Trustworthy AI, Ministry of Education"},{"name":"National Natural Science Foundation of China Youth Project","award":["62302192"],"award-info":[{"award-number":["62302192"]}]},{"name":"National Natural Science Foundation of China Youth Project","award":["U23A20303"],"award-info":[{"award-number":["U23A20303"]}]},{"name":"General Project of the Guangdong Provincial Natural Science Foundation","award":["2024A1515010086"],"award-info":[{"award-number":["2024A1515010086"]}]},{"name":"Special Funding Project of the 17th Batch of the China Postdoctoral Science Foundation","award":["2024T170348"],"award-info":[{"award-number":["2024T170348"]}]},{"name":"Guangzhou Science and Technology Plan Project","award":["2024A04J3691"],"award-info":[{"award-number":["2024A04J3691"]}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2024A1515011341"],"award-info":[{"award-number":["2024A1515011341"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Dongguan Social Development Technology Project","award":["20231800940342"],"award-info":[{"award-number":["20231800940342"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tdsc.2025.3574745","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T13:37:07Z","timestamp":1748525827000},"page":"5713-5729","source":"Crossref","is-referenced-by-count":9,"title":["Robust and Secure Federated Learning With Verifiable Differential Privacy"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7814-9563","authenticated-orcid":false,"given":"Chushan","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5876-7875","authenticated-orcid":false,"given":"Jiasi","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8249-2034","authenticated-orcid":false,"given":"Yijian","family":"Zhong","sequence":"additional","affiliation":[{"name":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3140-2320","authenticated-orcid":false,"given":"Jia-Nan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China"}]},{"given":"Cunle","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref3","first-page":"16937","article-title":"Inverting gradients - How easy is it to break privacy in federated learning","volume-title":"Advances in Neural Information Processing Systems","author":"Geiping","year":"2020"},{"key":"ref4","article-title":"SRATTA: Sample re-ATTribution attack of secure aggregation in federated learning","author":"Marchand","year":"2023"},{"key":"ref5","article-title":"Eavesdrop the composition proportion of training labels in federated learning","author":"Wang","year":"2019"},{"key":"ref6","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2020.23003"},{"key":"ref8","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref9","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Fang"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref11","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Bhagoji"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref14","article-title":"FastSecAgg: Scalable secure aggregation for privacy-preserving federated learning","author":"Kadhe","year":"2020"},{"key":"ref15","article-title":"LightsSecAgg: Rethinking secure aggregation in federated learning","author":"Yang","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560611"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560557"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3603216.3624964"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987958"},{"key":"ref20","article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","author":"Hardy","year":"2017"},{"key":"ref21","first-page":"493","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. 2020 USENIX Annu. Tech. Conf.","author":"Zhang"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref23","first-page":"5201","article-title":"The distributed discrete gaussian mechanism for federated learning with secure aggregation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kairouz"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3128679"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref26","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Stevens"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3168556"},{"key":"ref28","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref30","article-title":"RoFL: Attestable robustness for secure federated learning","author":"Burkhalter","year":"2021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179468"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467919"},{"key":"ref33","first-page":"10495","article-title":"Zeno: Robust fully asynchronous SGD","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Xie"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3264697"},{"key":"ref35","article-title":"Flguard: Secure and private federated learning","author":"Nguyen","year":"2021","journal-title":"Cryptol. ePrint Arch."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3239007"},{"key":"ref37","first-page":"3520","article-title":"Certified defenses for data poisoning attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Steinhardt"},{"key":"ref38","first-page":"3056","article-title":"The fundamental price of secure aggregation in differentially private federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref39","first-page":"259","article-title":"Prio: Private, robust, and scalable computation of aggregate statistics","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Des. Implementation","author":"Corrigan-Gibbs"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref42","article-title":"Multiparty Computation Over z\/2 Kz","author":"Escudero","year":"2021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741978"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0086"},{"key":"ref45","article-title":"Verifiable differential privacy","author":"Biswas","year":"2022"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3453142.3491287"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/337"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041404"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2024.3362191"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335"},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"Katz","year":"2014"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref55","first-page":"463","article-title":"On the power of multiple anonymous messages","volume-title":"Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn.","author":"Ghazi","year":"2020"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_4"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref60","article-title":"Fashion-mnist: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"ref61","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref62","first-page":"1415","article-title":"$flame$flame: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Nguyen"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11150357\/11017481.pdf?arnumber=11017481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T22:51:59Z","timestamp":1757371919000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11017481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":61,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3574745","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}