{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T15:02:33Z","timestamp":1771599753382,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T00:00:00Z","timestamp":1769558400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"vor","delay-in-days":23,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00840-6","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T13:54:57Z","timestamp":1769608497000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GuardChain: multi-stage trust framework for FL-empowered AIGC"],"prefix":"10.1186","volume":"15","author":[{"given":"Yike","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Xinkui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Shuyi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shengye","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Guobing","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,28]]},"reference":[{"key":"840_CR1","unstructured":"Cao Y, Li S, Liu Y, Yan Z, Dai Y, Yu PS, et al (2023) A comprehensive survey of ai-generated content (aigc): a history of generative ai from gan to chatgpt. arXiv preprint arXiv:230304226"},{"issue":"1","key":"840_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell A, White T, Dumoulin V, Arulkumaran K, Sengupta B, Bharath AA (2018) Generative adversarial networks: an overview. IEEE Signal Process Mag 35(1):53\u201365","journal-title":"IEEE Signal Process Mag"},{"issue":"3","key":"840_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1109\/TPAMI.2022.3181070","volume":"45","author":"W Xia","year":"2022","unstructured":"Xia W, Zhang Y, Yang Y, Xue JH, Zhou B, Yang MH (2022) Gan inversion: a survey. IEEE Trans Pattern Anal Mach Intel 45(3):3121\u20133138","journal-title":"IEEE Trans Pattern Anal Mach Intel"},{"issue":"4","key":"840_CR4","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.jnlssr.2023.08.001","volume":"4","author":"D Guo","year":"2023","unstructured":"Guo D, Chen H, Wu R, Wang Y (2023) AIGC challenges and opportunities related to public safety: a case study of ChatGPT. J Saf Sci Resilience 4(4):329\u2013339","journal-title":"J Saf Sci Resilience"},{"key":"840_CR5","doi-asserted-by":"publisher","first-page":"7776","DOI":"10.1109\/ACCESS.2017.2696365","volume":"5","author":"A L\u2019heureux","year":"2017","unstructured":"L\u2019heureux A, Grolinger K, Elyamany HF, Capretz MA (2017) Machine learning with big data: challenges and approaches. IEEE Access 5:7776\u20137797","journal-title":"Ieee Access"},{"key":"840_CR6","doi-asserted-by":"crossref","unstructured":"Truex S, Baracaldo N, Anwar A, Steinke T, Ludwig H, Zhang R et al (2019) A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM workshop on artificial intelligence and security, pp 1\u201311","DOI":"10.1145\/3338501.3357370"},{"key":"840_CR7","doi-asserted-by":"crossref","unstructured":"Cai D, Wang S, Wu Y, Lin FX, Xu M (2023) Federated few-shot learning for mobile NLP. In Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, pp 1\u201317","DOI":"10.1145\/3570361.3613277"},{"key":"840_CR8","doi-asserted-by":"crossref","unstructured":"Pang S, Zhao X, Luo J, Zheng B, Yin J, Zheng X (2023) Incentive-driven pricing game for multi-edge service providers towards optimal profits. In 2023 IEEE International Conference on Web Services (ICWS), pp 350\u2013359","DOI":"10.1109\/ICWS60048.2023.00054"},{"issue":"1","key":"840_CR9","doi-asserted-by":"publisher","first-page":"135","DOI":"10.26599\/TST.2024.9010034","volume":"30","author":"M Yao","year":"2025","unstructured":"Yao M, Qi S, Tian Z, Li Q, Han Y, Li H et al (2025) Quantifying bytes: understanding practical value of data assets in federated learning. Tsinghua Sci Technol 30(1):135\u2013147. https:\/\/doi.org\/10.26599\/TST.2024.9010034","journal-title":"Tsinghua Sci Technol"},{"key":"840_CR10","unstructured":"Zhang J, Vahidian S, Kuo M, Li C, Zhang R, Wang G, et al (2023) Towards building the federated GPT: federated instruction tuning. arXiv preprint arXiv:230505644"},{"key":"840_CR11","doi-asserted-by":"crossref","unstructured":"Zhao H, Du W, Li F, Li P, Liu G (2023) FedPrompt: communication-efficient and privacy-preserving prompt tuning in federated learning. In ICASSP 2023\u20132023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE 1\u20135","DOI":"10.1109\/ICASSP49357.2023.10095356"},{"key":"840_CR12","unstructured":"Chen C, Wu Z, Lai Y, Ou W, Liao T, Zheng Z (2023) Challenges and remedies to privacy and security in AIGC: exploring the potential of privacy computing, blockchain, and beyond. arXiv preprint arXiv:230600419"},{"issue":"1","key":"840_CR13","doi-asserted-by":"publisher","first-page":"124","DOI":"10.26599\/TST.2023.9010159","volume":"30","author":"Z Shan","year":"2025","unstructured":"Shan Z, Chen X, Zhang Y, He Y, Wang D (2025) Exploration and practice of constructing trusted public IT systems using blockchain-based service network. Tsinghua Sci Technol 30(1):124\u2013134. https:\/\/doi.org\/10.26599\/TST.2023.9010159","journal-title":"Tsinghua Sci Technol"},{"issue":"3","key":"840_CR14","doi-asserted-by":"publisher","first-page":"699","DOI":"10.26599\/BDMA.2024.9020023","volume":"7","author":"K Zhang","year":"2024","unstructured":"Zhang K, Tsai PW, Tian J, Zhao W, Cai X, Gao L et al (2024) Towards privacy in decentralized IoT: a blockchain-based dual response DP mechanism. Big Data Min Analytics 7(3):699\u2013717. https:\/\/doi.org\/10.26599\/BDMA.2024.9020023","journal-title":"Big Data Min Analytics"},{"issue":"14","key":"840_CR15","doi-asserted-by":"publisher","first-page":"16301","DOI":"10.1109\/JSEN.2021.3076767","volume":"21","author":"R Kumar","year":"2021","unstructured":"Kumar R, Khan AA, Kumar J, Golilarz NA, Zhang S, Ting Y et al (2021) Blockchain-federated-learning and deep learning models for covid-19 detection using ct imaging. IEEE Sensors J 21(14):16301\u201316314","journal-title":"IEEE Sensors J"},{"key":"840_CR16","doi-asserted-by":"crossref","unstructured":"Wang F, Chen C, Liu W, Fan T, Liao X, Tan Y et al (2024) CE-RCFR: robust counterfactual regression for consensus-enabled treatment effect estimation. In Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp 3013\u20133023","DOI":"10.1145\/3637528.3672054"},{"key":"840_CR17","doi-asserted-by":"crossref","unstructured":"Rehman MH, Salah K, Damiani E, Svetinovic D (2020) Towards blockchain-based reputation-aware federated learning. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE p 183\u2013188","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163027"},{"issue":"16","key":"840_CR18","doi-asserted-by":"publisher","first-page":"14151","DOI":"10.1109\/JIOT.2020.3014370","volume":"9","author":"L Cui","year":"2020","unstructured":"Cui L, Su X, Ming Z, Chen Z, Yang S, Zhou Y et al (2020) CREAT: blockchain-assisted compression algorithm of federated learning for content caching in edge computing. IEEE Internet Things J 9(16):14151\u201314161","journal-title":"IEEE Internet Things J"},{"issue":"7","key":"840_CR19","doi-asserted-by":"publisher","first-page":"5926","DOI":"10.1109\/JIOT.2020.3032544","volume":"8","author":"W Zhang","year":"2020","unstructured":"Zhang W, Lu Q, Yu Q, Li Z, Liu Y, Lo SK et al (2020) Blockchain-based federated learning for device failure detection in industrial IoT. IEEE Internet Things J 8(7):5926\u20135937","journal-title":"IEEE Internet Things J"},{"key":"840_CR20","doi-asserted-by":"publisher","first-page":"102220","DOI":"10.1016\/j.scs.2020.102220","volume":"59","author":"PK Sharma","year":"2020","unstructured":"Sharma PK, Park JH, Cho K (2020) Blockchain and federated learning-based distributed computing defence framework for sustainable society. Sustain Cities Soc 59:102220","journal-title":"Sustain Cities Soc"},{"key":"840_CR21","doi-asserted-by":"publisher","unstructured":"Wang F, Chen C, Liu W, Qi L, Zhang X, Tan Y et al (2025) Cluster-enhanced dual discrete collaborative filtering for efficient recommendation. IEEE Trans Knowl Data Eng 1\u201313. https:\/\/doi.org\/10.1109\/TKDE.2025.3624659","DOI":"10.1109\/TKDE.2025.3624659"},{"issue":"2","key":"840_CR22","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1109\/TSC.2025.3534619","volume":"18","author":"S Pang","year":"2025","unstructured":"Pang S, Zhao X, Yu S, Chen J, Deng S, Yin J (2025) TrustPay: a dual-layer blockchain-based framework for trusted service transaction. IEEE Trans Serv Comput 18(2):1068\u20131080. https:\/\/doi.org\/10.1109\/TSC.2025.3534619","journal-title":"IEEE Trans Serv Comput"},{"key":"840_CR23","unstructured":"Dong N, Sun J, Wang Z, Zhang S, Zheng S (2022) Flock: defending malicious behaviors in federated learning with Blockchain. arXiv preprint arXiv:221104344"},{"issue":"1","key":"840_CR24","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/MNET.011.2000263","volume":"35","author":"Y Li","year":"2020","unstructured":"Li Y, Chen C, Liu N, Huang H, Zheng Z, Yan Q (2020) A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network 35(1):234\u2013241","journal-title":"IEEE Network"},{"issue":"5","key":"840_CR25","first-page":"2438","volume":"18","author":"J Weng","year":"2019","unstructured":"Weng J, Weng J, Zhang J, Li M, Zhang Y, Luo W (2019) Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans Dependable Secure Comput 18(5):2438\u20132455","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"840_CR26","doi-asserted-by":"publisher","DOI":"10.1145\/3722104","author":"F Wang","year":"2025","unstructured":"Wang F, Qi L, Liu W, Yu B, Chen J, Xu Y (2025) Inter- and intra- similarity preserved counterfactual incentive effect estimation for recommendation systems. ACM Trans Inf Syst. https:\/\/doi.org\/10.1145\/3722104","journal-title":"ACM Trans Inf Syst"},{"key":"840_CR27","doi-asserted-by":"crossref","unstructured":"Liu W, Zhou P, Zhao Z, Wang Z, Deng H, Ju Q (2020) Fastbert: a self-distilling bert with adaptive inference time. ACL","DOI":"10.18653\/v1\/2020.acl-main.537"},{"key":"840_CR28","unstructured":"Jdmwc K, Toutanova LK (2019) Bert: pre-training of deep bidirectional transformers for language understanding. In Proceedings of naacL-HLT, vol 1. pp 2"},{"key":"840_CR29","unstructured":"Jin M, Wen Q, Liang Y, Zhang C, Xue S, Wang X, et al (2023) Large models for time series and spatio-temporal data: a survey and outlook. arXiv preprint arXiv:231010196"},{"key":"840_CR30","unstructured":"Chen C, Feng X, Zhou J, Yin J, Zheng X (2023) Federated large language model: a position paper. arXiv preprint arXiv:230708925"},{"issue":"2","key":"840_CR31","doi-asserted-by":"publisher","first-page":"430","DOI":"10.26599\/BDMA.2024.9020068","volume":"8","author":"C Li","year":"2025","unstructured":"Li C, Gu B, Zhao Z, Qu Y, Xin G, Huo J et al (2025) Federated transfer learning for on-device LLMs efficient fine tuning optimization. Big Data Min Analytics 8(2):430\u2013446. https:\/\/doi.org\/10.26599\/BDMA.2024.9020068","journal-title":"Big Data Min Analytics"},{"key":"840_CR32","unstructured":"Xu M, Wu Y, Cai D, Li X, Wang S (2023) Federated fine-tuning of billion-sized language models across mobile devices. arXiv preprint arXiv:230813894"},{"issue":"4","key":"840_CR33","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.26599\/TST.2024.9010089","volume":"30","author":"J Chen","year":"2025","unstructured":"Chen J, Wang F, Pang S, Chen M, Xi M, Zhao T et al (2025) A privacy policy text compliance reasoning framework with large language models for healthcare services. Tsinghua Sci Technol 30(4):1831\u20131845. https:\/\/doi.org\/10.26599\/TST.2024.9010089","journal-title":"Tsinghua Sci Technol"},{"issue":"1","key":"840_CR34","doi-asserted-by":"publisher","first-page":"189","DOI":"10.26599\/BDMA.2024.9020053","volume":"8","author":"J Yu","year":"2025","unstructured":"Yu J, Yao H, Ouyang K, Cao X, Zhang L (2025) BPS-FL: Blockchain-based privacy-preserving and secure federated learning. Big Data Min Analytics 8(1):189\u2013213. https:\/\/doi.org\/10.26599\/BDMA.2024.9020053","journal-title":"Big Data Min Analytics"},{"key":"840_CR35","doi-asserted-by":"crossref","unstructured":"Wenzheng L (2023) The characteristics, relationships and challenges of metaverse, Web 3.0 and AIGC. In 2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC), IEEE p 32\u201337","DOI":"10.1109\/ICEIEC58029.2023.10201132"},{"issue":"4","key":"840_CR36","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.26599\/BDMA.2024.9020029","volume":"7","author":"C Liu","year":"2024","unstructured":"Liu C, Guo S, Dang F, Qiu X, Shao S (2024) Large-scale model meets federated learning: a hierarchical hybrid distributed training mechanism for intelligent intersection large-scale model. Big Data Min Analytics 7(4):1031\u20131049. https:\/\/doi.org\/10.26599\/BDMA.2024.9020029","journal-title":"Big Data Min Analytics"},{"key":"840_CR37","doi-asserted-by":"crossref","unstructured":"Kuang W, Qian B, Li Z, Chen D, Gao D, Pan X, et al (2023) Federatedscope-llm: a comprehensive package for fine-tuning large language models in federated learning. arXiv preprint arXiv:230900363","DOI":"10.1145\/3637528.3671573"},{"key":"840_CR38","doi-asserted-by":"publisher","unstructured":"Chen J, Wang F, Pang S, Tan S, Chen M, Zhao T et al (2024) UniGM: unifying multiple pre-trained graph models via adaptive knowledge aggregation. In Proceedings of the 32nd ACM International Conference on Multimedia. MM\u201924, Association for Computing Machinery, New York, NY, USA, 8556\u20138565. Available from: https:\/\/doi.org\/10.1145\/3664647.3681018","DOI":"10.1145\/3664647.3681018"},{"key":"840_CR39","volume-title":"Confon empirical methods in natural language Processing(EMNLP)","author":"T Che","year":"2023","unstructured":"Che T, Liu J, Zhou Y, Ren J, Zhou J, Sheng VS et al (2023) Federated learning of large language models with parameter-efficient prompt tuning and adaptive optimization. In: Confon empirical methods in natural language Processing(EMNLP). Association for Computational Linguistics, Singapore"},{"key":"840_CR40","doi-asserted-by":"crossref","unstructured":"Han S, Buyukates B, Hu Z, Jin H, Jin W, Sun L, et al (2023) FedMLSecurity: a benchmark for attacks and defenses in federated learning and LLMs. arXiv preprint arXiv:230604959","DOI":"10.1145\/3637528.3671545"},{"key":"840_CR41","doi-asserted-by":"crossref","unstructured":"Xu M, Du H, Niyato D, Kang J, Xiong Z, Mao S et al (2024) Unleashing the power of edge-cloud generative ai in mobile networks: a survey of aigc services. IEEE Commun Surv & Tutorials","DOI":"10.1109\/COMST.2024.3353265"},{"issue":"4","key":"840_CR42","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1007\/s10586-021-03301-8","volume":"24","author":"J Zarrin","year":"2021","unstructured":"Zarrin J, Wen Phang H, Babu Saheer L, Zarrin B (2021) Blockchain for decentralization of internet: prospects, trends, and challenges. Cluster Comput 24(4):2841\u20132866","journal-title":"Cluster Comput"},{"key":"840_CR43","doi-asserted-by":"crossref","unstructured":"Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In Advances in Cryptology\u2014ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold, Springer, Coast, Australia, 552\u2013565. December 9\u201313, 2001 Proceedings 7","DOI":"10.1007\/3-540-45682-1_32"},{"key":"840_CR44","doi-asserted-by":"crossref","unstructured":"Lamport L (2019) The part-time parliament. Concurrency: The Works Leslie Lamport 277\u2013317","DOI":"10.1145\/3335772.3335939"},{"key":"840_CR45","doi-asserted-by":"crossref","unstructured":"Lamport L, Shostak R, Pease M (2019) The Byzantine generals problem. Concurrency: The Works Leslie Lamport 203\u2013226","DOI":"10.1145\/3335772.3335936"},{"key":"840_CR46","unstructured":"Touvron H, Lavril T, Izacard G, Martinet X, Lachaux MA, Lacroix T, et al (2023) Llama: open and efficient foundation language models. arXiv preprint arXiv:230213971"},{"key":"840_CR47","unstructured":"Taori R, Gulrajani I, Zhang T, Dubois Y, Li X, Guestrin C et al Stanford Alpaca: an instruction-following LLaMA model. GitHub. https:\/\/github.com\/tatsu-lab\/stanford_alpaca"},{"key":"840_CR48","doi-asserted-by":"crossref","unstructured":"Li A, Sun J, Li P, Pu Y, Li H, Chen Y (2021) Hermes: an efficient federated learning framework for heterogeneous mobile clients. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, pp 420\u2013437","DOI":"10.1145\/3447993.3483278"},{"key":"840_CR49","doi-asserted-by":"crossref","unstructured":"Li C, Zeng X, Zhang M, Cao Z (2022) PyramidFL: a fine-grained client selection framework for efficient federated learning. In Proceedings of the 28th Annual International Conference on Mobile Computing and Networking, pp 158\u2013171","DOI":"10.1145\/3495243.3517017"},{"key":"840_CR50","doi-asserted-by":"crossref","unstructured":"Lin BY, He C, Zeng Z, Wang H, Huang Y, Dupuy C, et al (2021) Fednlp: benchmarking federated learning methods for natural language processing tasks. arXiv preprint arXiv:210408815","DOI":"10.18653\/v1\/2022.findings-naacl.13"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00840-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00840-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00840-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T14:05:21Z","timestamp":1771596321000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00840-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,28]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["840"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00840-6","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,28]]},"assertion":[{"value":"18 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"23"}}