{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T04:28:09Z","timestamp":1777955289827,"version":"3.51.4"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004478","name":"Beijing Union University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004478","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014345","name":"Strong","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014345","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,29]]},"DOI":"10.1109\/wcncw49093.2021.9420026","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T08:42:07Z","timestamp":1620463327000},"page":"1-6","source":"Crossref","is-referenced-by-count":36,"title":["Blockchain Empowered Reliable Federated Learning by Worker Selection: A Trustworthy Reputation Evaluation Method"],"prefix":"10.1109","author":[{"given":"Qinnan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qingyang","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Dandan","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800286"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647927"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2921755"},{"key":"ref15","article-title":"Mobile edge computing, blockchain and reputation-based crowdsourcing iot federated learning: A secure, decentralized and privacy-preserving system","author":"zhao","year":"2019"},{"key":"ref16","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial IoT[J]","author":"lu","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"ref19","article-title":"Differentially Private Asynchronous Federated Learning for Mobile Edge Computing in Urban Informatics","author":"lu","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2640087.2644155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800254"},{"key":"ref6","article-title":"An overview of gradient descent optimization algorithms[J]","author":"ruder","year":"2016"},{"key":"ref5","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n\u00fd","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref7","article-title":"Biscotti: A ledger for private and secure peer-to-peer machine learning","author":"shayan","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2902878"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2915983"},{"key":"ref9","article-title":"Federated learning for mobile keyboard prediction","author":"hard","year":"2018"},{"key":"ref20","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"kone?n\u00fd","year":"2016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894944"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VTS-APWCS.2019.8851649"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"}],"event":{"name":"2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","location":"Nanjing, China","start":{"date-parts":[[2021,3,29]]},"end":{"date-parts":[[2021,3,29]]}},"container-title":["2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9419968\/9419972\/09420026.pdf?arnumber=9420026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:23Z","timestamp":1652197283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9420026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,29]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wcncw49093.2021.9420026","relation":{},"subject":[],"published":{"date-parts":[[2021,3,29]]}}}