{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:30:04Z","timestamp":1770067804737,"version":"3.49.0"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372100"],"award-info":[{"award-number":["62372100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DHU Distinguished Young Professor Program"},{"name":"Shanghai Key Laboratory of Computer Software Evaluating and Testing"},{"name":"Shanghai Key Laboratory of Computer Software Evaluating and Testing"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tnse.2025.3572493","type":"journal-article","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T13:47:43Z","timestamp":1748612863000},"page":"4544-4559","source":"Crossref","is-referenced-by-count":2,"title":["FedSSuper: A Secure and Private Federated Learning Under Trusted Supervision"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0907-9926","authenticated-orcid":false,"given":"Ping","family":"Zhao","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai, China"}]},{"given":"Jin","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4095-6843","authenticated-orcid":false,"given":"Guanglin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Donghua University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3400011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3459037"},{"key":"ref5","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref6","article-title":"Deep leakage from gradients","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Zhu","year":"2019"},{"key":"ref7","first-page":"26429","article-title":"Neurotoxin: Durable backdoors in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Zhang","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3152156"},{"key":"ref9","article-title":"FLGUARD: Secure and private federated learning","volume":"2021","author":"Nguyen","year":"2021","journal-title":"IACR Cryptology ePrint Arch."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3402993"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3314748"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3215574"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622626"},{"key":"ref14","article-title":"Local model poisoning attacks to byzantine-robust federated learning","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Fang","year":"2020"},{"key":"ref15","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Conf. Neural Inf. Process. Syst.","author":"Blanchard","year":"2017"},{"key":"ref16","first-page":"5636","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3253082"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3324772"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3180828"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3316788"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24119"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2023.3243932"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref26","article-title":"FLOD: Oblivious defender for private byzantine-robust federated learning with dishonest-majority","volume":"2021","author":"Dong","year":"2021","journal-title":"IACR Cryptology ePrint Arch."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3251196"},{"key":"ref28","first-page":"3518","article-title":"The hidden vulnerability of distributed learning in Byzantium","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mhamdi","year":"2018"},{"key":"ref29","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2018"},{"key":"ref30","first-page":"301","article-title":"The limitations of federated learning in sybil settings","volume-title":"Proc. Int. Symp. Res. Attacks, Intrusions Defenses","author":"Fung","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref32","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"ref33","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3350389"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3417405"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0814-0_14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0814-0_19"},{"key":"ref38","first-page":"508","article-title":"Auror: Defending against poisoning attacks in collaborative deep learning systems","volume-title":"Proc. Conf. Comput. Secur. Appl.","author":"Shen","year":"2016"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2023.3237397"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref41","article-title":"Justinian\u2019s GAAvernor: Robust distributed learning with gradient aggregation agent","volume-title":"Proc. USENIX Conf. Secur. Symp.","author":"Pan","year":"2020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3168556"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3205714"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20903"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3212174"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref47","article-title":"Learning differentially private recurrent language models","author":"McMahan","year":"2017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59410-7_33"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413764"},{"key":"ref50","article-title":"FastSecAgg: Scalable secure aggregation for privacy-preserving federated learning","author":"Kadhe","year":"2020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3239007"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-019-01205-x"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041404"},{"key":"ref56","article-title":"SAFELearning: Enable backdoor detectability in federated learning with secure aggregation","author":"Zhang","year":"2021"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103561"},{"key":"ref58","article-title":"Byzantine-robust and privacy-preserving framework for FedML","author":"Hashemi","year":"2021"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169918"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11217296\/11018482.pdf?arnumber=11018482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T17:36:54Z","timestamp":1761673014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11018482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":57,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3572493","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}