{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T05:56:52Z","timestamp":1775800612490,"version":"3.50.1"},"reference-count":125,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2026.3676154","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:59:49Z","timestamp":1774036789000},"page":"8005-8022","source":"Crossref","is-referenced-by-count":0,"title":["Security and Verifiability in Federated Learning: A Zero-Knowledge Reputation-Based Blockchain Framework"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5912-2138","authenticated-orcid":false,"given":"Swetha","family":"Ghanta","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, SRM University-AP, Amaravati, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2201-9402","authenticated-orcid":false,"given":"Ashok Kumar","family":"Pradhan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, SRM University-AP, Amaravati, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1051-5695","authenticated-orcid":false,"given":"Prasanthi","family":"Boyapati","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, SRM University-AP, Amaravati, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6770-9845","authenticated-orcid":false,"given":"Sujit","family":"Biswas","sequence":"additional","affiliation":[{"name":"Computer Science Department, City St. George&#x2019;s, University of London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2959-6541","authenticated-orcid":false,"given":"Saraju P","family":"Mohanty","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas, Denton, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"AI (artificial intelligence) in daily life","author":"Talati","year":"2024","journal-title":"Authorea Preprints"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1167344"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DICCT64131.2025.10986657"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959190"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.04.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3401159"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2024.100465"},{"key":"ref9","article-title":"LLM harmony: Multi-agent communication for problem solving","author":"Rasal","year":"2024"},{"issue":"2278","key":"ref10","first-page":"10","article-title":"Microsoft co-pilots role in augmenting decision intelligence for executives","volume":"14","author":"Asundi","year":"2025","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref11","article-title":"AI reasoning for wireless communications and networking: A survey and perspectives","author":"Luo","year":"2025"},{"key":"ref12","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Brown","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3501813"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref15","article-title":"Federated learning: Opportunities and challenges","author":"Mammen","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-91798-1_12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/diagnostics13091532"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3575192"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2022.08.039"},{"issue":"1","key":"ref21","article-title":"General data protection regulation","volume":"24","author":"Protection","year":"2018","journal-title":"Intersoft Consulting"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1056\/nejmlim035027"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-95-3001-4_1"},{"key":"ref24","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"Konen","year":"2016"},{"key":"ref25","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Konen","year":"2016"},{"key":"ref26","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991401"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3153338"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509980"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/s43856-024-00462-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0186-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-01-2025-0024"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69250-1"},{"key":"ref37","first-page":"493","article-title":"$\\lbrace$BatchCrypt$\\rbrace$: Efficient homomorphic encryption for $\\lbrace$Cross-Silo$\\rbrace$ federated learning","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Zhang","year":"2020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00250-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00390-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-024-01291-0"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2025.3545755"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref44","article-title":"Scaling up trustless DNN inference with zero-knowledge proofs","author":"Kang","year":"2022"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3589066"},{"key":"ref46","article-title":"Recursive proof composition without a trusted setup","volume":"2019","author":"Bowe","year":"2019","journal-title":"Cryptol. ePrint Arch."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485379"},{"key":"ref48","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925010"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3468473"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-025-04315-4"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TON.2025.3562869"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3544872"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108900"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3304368"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1201\/9781584888215-c14"},{"key":"ref58","article-title":"A fully homomorphic encryption scheme","author":"Gentry","year":"2009"},{"key":"ref59","first-page":"3837","article-title":"Federated heavy hitters discovery with differential privacy","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Zhu","year":"2020"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413764"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref64","article-title":"FastSecAgg: Scalable secure aggregation for privacy-preserving federated learning","author":"Kadhe","year":"2020"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2022.12.008"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1965918"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3185327"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09454-6"},{"key":"ref71","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"Cryptol. ePrint Arch."},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3528580.3532845"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00232-w"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2023.103059"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-82516-3_6"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.3165"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP61132.2024.10752160"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3373501"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3168025"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2024.3409329"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2023.100152"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3007817"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015772"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3170348"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3265366"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3267112"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112405"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.03.014"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.5220\/0012428300003648"},{"key":"ref90","article-title":"Zero-knowledge proof-based practical federated learning on blockchain","author":"Xing","year":"2023"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104992"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/e25111550"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3622060"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3247452"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103510"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12870"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3072033"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000085"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599710"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_28"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151359"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.11.014"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_31"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3116917"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3371643"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417278"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3068195"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3035591"},{"key":"ref109","first-page":"4675","article-title":"SafetyNets: Verifiable execution of deep neural networks on an untrusted cloud","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ghodsi","year":"2017"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3348760"},{"key":"ref111","article-title":"Ezkl","year":"2025"},{"key":"ref112","article-title":"A survey of zero-knowledge proof based verifiable machine learning","author":"Peng","year":"2025"},{"key":"ref113","article-title":"zkPyTorch: A hierarchical optimized compiler for zero-knowledge machine learning","author":"Xie","year":"2025","journal-title":"Cryptol. ePrint Arch."},{"key":"ref114","article-title":"Brain tumor MRI dataset","author":"Nickparvar","year":"2021"},{"key":"ref115","article-title":"Brain tumor classification (MRI)","author":"Bhuvaji","year":"2025"},{"key":"ref116","article-title":"Brain tumor dataset","author":"Cheng","year":"2017"},{"key":"ref117","article-title":"Br35H: Brain tumor detection 2020","author":"Hamada","year":"2020"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-57970-7"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/e24060799"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8104054"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2022.0130755"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3172303"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-022-11014-1"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1186\/s12880-024-01261-0"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11449442.pdf?arnumber=11449442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T05:04:47Z","timestamp":1775797487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11449442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":125,"URL":"https:\/\/doi.org\/10.1109\/tnse.2026.3676154","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}