{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:58:10Z","timestamp":1770537490566,"version":"3.49.0"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3100700"],"award-info":[{"award-number":["2021YFB3100700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076125"],"award-info":[{"award-number":["62076125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032025"],"award-info":[{"award-number":["62032025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172258"],"award-info":[{"award-number":["62172258"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2049"],"award-info":[{"award-number":["U20B2049"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20467"],"award-info":[{"award-number":["U21A20467"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Program","award":["JCYJ20210324134810028"],"award-info":[{"award-number":["JCYJ20210324134810028"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3472531","type":"journal-article","created":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T18:23:09Z","timestamp":1727893389000},"page":"9744-9759","source":"Crossref","is-referenced-by-count":6,"title":["Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2170-2349","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Yichen","family":"Cai","sequence":"additional","affiliation":[{"name":"Software Engineering Program, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0481-5341","authenticated-orcid":false,"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Esch-sur-Alzette, Luxembourg"}]},{"given":"Chuan","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Computer Science, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9274-7325","authenticated-orcid":false,"given":"Chunpeng","family":"Ge","sequence":"additional","affiliation":[{"name":"Joint SDU-NTU Centre for Artificial Intelligence Research (C-FAIR) and the Software School, Shandong University, Jinan, China"}]},{"given":"Xiangmou","family":"Qu","sequence":"additional","affiliation":[{"name":"School of Big Data &#x0026; Software Engineering, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6240-6688","authenticated-orcid":false,"given":"Lu","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Writing across the World\u2019s languages: Deep internationalization for gboard, the Google keyboard","author":"van Esch","year":"2019","journal-title":"arXiv:1912.01218"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3501296"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000263"},{"key":"ref5","first-page":"1","article-title":"Fully decentralized federated learning","volume-title":"Proc. 3rd Workshop Bayesian Deep Learn. (NeurIPS)","volume":"2","author":"Lalitha"},{"key":"ref6","article-title":"When federated learning meets blockchain: A new distributed learning paradigm","author":"Ma","year":"2020","journal-title":"arXiv:2009.09338"},{"key":"ref7","article-title":"A systematic survey of blockchained federated learning","author":"Wang","year":"2021","journal-title":"arXiv:2110.02182"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3524104"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3196274"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3163592"},{"key":"ref11","first-page":"1","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref12","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3154503"},{"key":"ref14","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref16","volume-title":"TEE System Architecture","year":"2023"},{"key":"ref17","volume-title":"Intel SGX Platform Services","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"ref20","volume-title":"Unable to Find the Size of Enclave Page Cache (EPC)","year":"2023"},{"key":"ref21","first-page":"1","article-title":"Innovative technology for CPU based attestation and sealing","volume-title":"Proc. 2nd Int. Workshop Hardw. Architectural Support Secur. Privacy","author":"Anati"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0051"},{"key":"ref23","first-page":"1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Satoshi Nakamoto"},{"issue":"2014","key":"ref24","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"ref25","article-title":"Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contract execution","author":"Cheng","year":"2018","journal-title":"arXiv:1804.05141"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00175"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3457388.3458665"},{"key":"ref29","first-page":"451","article-title":"HybCache: Hybrid sidechannel- resilient caches for trusted execution environments","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Dessouky"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359809"},{"key":"ref31","article-title":"Towards attack-tolerant trusted execution environments: Secure remote attestation in the presence of side channels","author":"Crone","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3268935.3268940"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.03.004"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914454"},{"key":"ref36","article-title":"Integrating remote attestation with transport layer security","author":"Knauth","year":"2018","journal-title":"arXiv:1801.05863"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3202887"},{"key":"ref39","volume-title":"Redis Documentation","year":"2023"},{"key":"ref40","first-page":"1","article-title":"Faster and timing-attack resistant aesgcm","volume-title":"Proc. 11th Int. Workshop Cryptograph. Hardw. Embedded Syst. (CHES)","author":"K\u00e4sper"},{"issue":"446","key":"ref41","first-page":"2014","article-title":"Efficient and secure elliptic curve cryptography implementation of curve p-256","volume-title":"Proc. Workshop Elliptic Curve Cryptogr. Standards","volume":"66","author":"Adalier"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3093711"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2019.00030"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3170348"},{"key":"ref46","first-page":"1","article-title":"Privacypreserving decentralized aggregation for federated learning","volume-title":"Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS)","author":"Jeon"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3222935"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3227435"},{"key":"ref50","first-page":"1","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Zhang"},{"key":"ref51","first-page":"11372","article-title":"CRFL: Certifiably robust federated learning against backdoor attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Xie"},{"key":"ref52","article-title":"Tendermint: Byzantine fault tolerance in the age of blockchains","author":"Buchman","year":"2016"},{"key":"ref53","article-title":"GPTs are GPTs: An early look at the labor market impact potential of large language models","author":"Eloundou","year":"2023","journal-title":"arXiv:2303.10130"},{"key":"ref54","article-title":"Model compression via distillation and quantization","author":"Polino","year":"2018","journal-title":"arXiv:1802.05668"},{"key":"ref55","volume-title":"Bringing HPC Techniques to Deep Learning","author":"Gibiansky","year":"2023"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2921755"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICICAS48597.2019.00162"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228945"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103562","article-title":"VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks","volume":"136","author":"Huang","year":"2024","journal-title":"Comput. Secur."},{"key":"ref61","volume-title":"Out of the Box, Blockchain Powered Verifiable PPC Framework","year":"2023"},{"key":"ref62","volume-title":"The Internet of GPUs is Finally Here","year":"2023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"ref64","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","author":"Tram\u00e8r","year":"2018","journal-title":"arXiv:1806.03287"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"ref66","first-page":"1","article-title":"Efficient and private federated learning using TEE","volume-title":"Proc. EuroSys Conf.","author":"Mo"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_10"},{"key":"ref68","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref69","first-page":"1","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xie"},{"key":"ref70","first-page":"249","article-title":"Walle: An end-to-end, general-purpose, and large-scale production system for device-cloud collaborative machine learning","volume-title":"Proc. 16th USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Lv"},{"key":"ref71","first-page":"1","article-title":"Deep leakage from gradients","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Zhu"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10319981\/10703116.pdf?arnumber=10703116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T22:43:21Z","timestamp":1732661001000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10703116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3472531","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}