{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T03:18:20Z","timestamp":1777519100395,"version":"3.51.4"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19A2066"],"award-info":[{"award-number":["U19A2066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Key Laboratory of Information Security Technology","award":["2020B1212060078"],"award-info":[{"award-number":["2020B1212060078"]}]},{"name":"Sichuan Science and Technology Plan Projects - Key Research and Development Projects","award":["2020YFG0294"],"award-info":[{"award-number":["2020YFG0294"]}]},{"name":"Chengdu Science and Technology Project - Key R&amp;D Support Program"},{"name":"Major Science and Technology Application Demonstration Project","award":["2019-YF09-00048-CG"],"award-info":[{"award-number":["2019-YF09-00048-CG"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002048"],"award-info":[{"award-number":["62002048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Startup Fund Central Universities","award":["Y030202059018061"],"award-info":[{"award-number":["Y030202059018061"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tii.2021.3085960","type":"journal-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T15:26:29Z","timestamp":1623252389000},"page":"4049-4058","source":"Crossref","is-referenced-by-count":298,"title":["Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3725-1394","authenticated-orcid":false,"given":"Bin","family":"Jia","sequence":"first","affiliation":[{"name":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9886-1412","authenticated-orcid":false,"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Jiewen","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9156-2823","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"}]},{"given":"Ke","family":"Huang","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Yongquan","family":"Liang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"5827?","DOI":"10.1109\/JIOT.2019.2952146","article-title":"Local differential privacy for deep learning","volume":"7","author":"arachchige","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2925825"},{"key":"ref10","article-title":"Differentially private federated learning: A client level perspective","author":"geyer","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.036"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948094"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2921755"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773646"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"619?","DOI":"10.1016\/j.future.2020.10.007","article-title":"A survey on security and privacy of federated learning","volume":"115","author":"mothukuri","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref28","first-page":"771?","article-title":"A short introduction to boosting","volume":"14","author":"freund","year":"1999","journal-title":"J Jpn Soc Artif Intell"},{"key":"ref27","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"0","journal-title":"Proc 33rd Int Conf Automata Languages Program"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.060"},{"key":"ref5","article-title":"Advances and open problems in federated learning","author":"kairouz","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.09.002"},{"key":"ref7","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref2","first-page":"1273","article-title":"y Arcas, &#x201C;Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"0","journal-title":"Mach Learn Res"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.01.009"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011208"},{"key":"ref20","article-title":"Entity resolution and federated learning get a federated resolution","author":"nock","year":"2018"},{"key":"ref22","first-page":"149?","article-title":"Improved probabilistic encryption scheme","volume":"36","author":"zhang","year":"2010","journal-title":"Comput Eng"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1?","DOI":"10.1145\/3214303","article-title":"A survey on homomorphic encryption schemes: Theory and implementation","volume":"51","author":"acar","year":"2018","journal-title":"ACM Comput Surv"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.06.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9717272\/09448383.pdf?arnumber=9448383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T03:07:41Z","timestamp":1733886461000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9448383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":32,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tii.2021.3085960","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}