{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:06:28Z","timestamp":1755219988073,"version":"3.43.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["61802217","U24B20146","62372044"],"award-info":[{"award-number":["61802217","U24B20146","62372044"]}]},{"name":"NSFSD","award":["ZR2023MF082"],"award-info":[{"award-number":["ZR2023MF082"]}]},{"DOI":"10.13039\/501100018553","name":"Qingdao Science and Technology Plan Key Research and Development Project","doi-asserted-by":"publisher","award":["22-3-4-xxgg-10-gx"],"award-info":[{"award-number":["22-3-4-xxgg-10-gx"]}],"id":[{"id":"10.13039\/501100018553","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Original Exploration Project of Qingdao NSF","award":["23-2-1-164-zyyd-jch"],"award-info":[{"award-number":["23-2-1-164-zyyd-jch"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/tnsm.2025.3569228","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T13:33:08Z","timestamp":1747315988000},"page":"3449-3462","source":"Crossref","is-referenced-by-count":0,"title":["RoPA: Robust Privacy-Preserving Forward Aggregation for Split Vertical Federated Learning"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6607-3566","authenticated-orcid":false,"given":"Lingling","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Qingdao University of Science and Technology, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6890-6435","authenticated-orcid":false,"given":"Zhengyin","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Qingdao University of Science and Technology, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3270-8843","authenticated-orcid":false,"given":"Mei","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Qingdao University of Science and Technology, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6784-0221","authenticated-orcid":false,"given":"Keke","family":"Gai","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0657-8300","authenticated-orcid":false,"given":"Jingjing","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Qingdao University of Science and Technology, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8448-705X","authenticated-orcid":false,"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A survey on vertical federated learning: From a layered perspective","author":"Yang","year":"2023","journal-title":"arxiv:2304.01829"},{"key":"ref2","article-title":"PyVertical: A vertical federated learning framework for multi-headed SplitNN","author":"Romanini","year":"2021","journal-title":"arXiv:2104.00489"},{"key":"ref3","first-page":"24261","article-title":"MLP-mixer: An all-MLP architecture for vision","volume-title":"Proc. 35th Conf. Neural Inf. Process. Syst.","author":"Tolstikhin"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.003"},{"key":"ref6","article-title":"Backdoor attacks and defenses in feature-partitioned collaborative learning","author":"Liu","year":"2020","journal-title":"arXiv:2007.03608"},{"key":"ref7","article-title":"Hijack vertical federated learning models with adversarial embedding","author":"Qiu","year":"2020","journal-title":"arXiv:2212.00322"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3327853"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563201"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056185"},{"issue":"4","key":"ref12","first-page":"1355","article-title":"Credit risk assessment from combined bank records using federated learning","volume":"6","author":"Kawa","year":"2019","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3231277"},{"key":"ref14","first-page":"259","article-title":"Prio: Private, robust, and scalable computation of aggregate statistics","volume-title":"Proc. 26th USENIX Secur. Symp. (USENIX Secur.)","author":"Corrigan-Gibbs"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref16","first-page":"5271","article-title":"PCAT: Functionality and data stealing from split learning by pseudo-client attack","volume-title":"Proc. 32th USENIX Secur. Symp. (USENIX Secur.)","author":"Gao"},{"key":"ref17","article-title":"A review of homomorphic encryption libraries for secure computation","author":"Sathya","year":"2018","journal-title":"arXiv:1812.02428"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3317870"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3627993"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14711\/thesis-991013202158603412"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3526127"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19208-1_28"},{"key":"ref23","article-title":"VAFL: A method of vertical asynchronous federated learning","author":"Chen","year":"2020","journal-title":"arXiv:2007.06081"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20825"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671502"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3139055"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486872"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3201729"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref30","first-page":"20296","article-title":"FedVS: Straggler-resilient and privacy-preserving vertical federated learning for split models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM58522.2023.00072"},{"key":"ref32","article-title":"VFedMH: Vertical federated learning for training multi-party heterogeneous models","author":"Wang","year":"2023","journal-title":"arxiv:2310.13367"},{"key":"ref33","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur.)","author":"Fang"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3200724"},{"key":"ref35","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Nguyen"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3559411"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179400"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.01.130"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3521377"},{"key":"ref40","first-page":"1846","article-title":"Free-rider attacks on model aggregation in federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Fraboni"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947274"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3288936"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3411501.3419418"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485259"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11118327\/11005399.pdf?arnumber=11005399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T17:44:32Z","timestamp":1754588672000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11005399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3569228","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}