{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:08:54Z","timestamp":1773655734733,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700762","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:41Z","timestamp":1771936481000},"page":"1242-1252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Trust-Model-Based Method for Protecting Global Models in Federated Learning Systems"],"prefix":"10.3103","volume":"59","author":[{"given":"V. M.","family":"Krundyshev","sequence":"first","affiliation":[]},{"given":"V. K.","family":"Cheskidov","sequence":"additional","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7911_CR1","doi-asserted-by":"publisher","unstructured":"Lin, X., Chen, H., Xu, Yi., Xu, Ch., Gui, X., Deng, Yi., and Wang, Yu., Federated learning with positive and unlabeled data, arXiv Preprint, 2024. https:\/\/doi.org\/10.48550\/arXiv.2106.10904","DOI":"10.48550\/arXiv.2106.10904"},{"key":"7911_CR2","doi-asserted-by":"publisher","first-page":"9901","DOI":"10.3390\/app12199901","volume":"12","author":"R. Gosselin","year":"2022","unstructured":"Gosselin, R., Vieu, L., Loukil, F., and Benoit, A., Privacy and security in federated learning: A survey, Appl. Sci., 2022, vol. 12, no. 19, p. 9901. https:\/\/doi.org\/10.3390\/app12199901","journal-title":"Appl. Sci."},{"key":"7911_CR3","doi-asserted-by":"publisher","first-page":"102402","DOI":"10.1016\/j.cose.2021.102402","volume":"110","author":"N. Truong","year":"2021","unstructured":"Truong, N., Sun, K., Wang, S., Guitton, F., and Guo, Yi., Privacy preservation in federated learning: An insightful survey from the GDPR perspective, Comput. Secur., 2021, vol. 110, p. 102402. https:\/\/doi.org\/10.1016\/j.cose.2021.102402","journal-title":"Comput. Secur."},{"key":"7911_CR4","doi-asserted-by":"publisher","first-page":"63229","DOI":"10.1109\/access.2021.3075203","volume":"9","author":"N. Bouacida","year":"2021","unstructured":"Bouacida, N. and Mohapatra, P., Vulnerabilities in Federated Learning, IEEE Access, 2021, vol. 9, pp.\u00a063229\u201363249. https:\/\/doi.org\/10.1109\/access.2021.3075203","journal-title":"IEEE Access"},{"key":"7911_CR5","unstructured":"Mugunthan, V., Polychroniadou, A., Byrd, D., and Balch, T.H., SMPAI: Secure multi-party computation for federated learning, Proceedings of the NeurIPS 2019 Workshop on Robust AI in Financial Services, Cambridge, MA: MIT Press, 2019, vol. 21."},{"key":"7911_CR6","doi-asserted-by":"publisher","first-page":"627","DOI":"10.3103\/s0146411615080192","volume":"49","author":"P.D. Zegzhda","year":"2015","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627\u2013633. https:\/\/doi.org\/10.3103\/s0146411615080192","journal-title":"Autom. Control Comput. Sci."},{"key":"7911_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","volume":"476","author":"Ch. Zhao","year":"2019","unstructured":"Zhao, Ch., Zhao, Sh., Zhao, M., Chen, Zh., Gao, C.-Z., Li, H., and Tan, Y.-A., Secure multi-party computation: Theory, practice and applications, Inf. Sci. (N. Y.), 2019, vol. 476, pp. 357\u2013372. https:\/\/doi.org\/10.1016\/j.ins.2018.10.024","journal-title":"Inf. Sci. (N. Y.)"},{"key":"7911_CR8","first-page":"215","volume":"17","author":"A.G. Rostovtsev","year":"2014","unstructured":"Rostovtsev, A.G. and Suprun, A.F., Strengthening differential and linear attacks using virtual isomorphisms, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 215\u2013230.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7911_CR9","doi-asserted-by":"publisher","unstructured":"Gehlhar, T., Marx, F., Schneider, T., Suresh, A., Wehrle, T., and Yalame, H., SafeFL: MPC-friendly framework for private and robust federated learning, 2023 IEEE Security and Privacy Workshops (SPW), San Francisco, 2023, IEEE, 2023, pp. 69\u201376. https:\/\/doi.org\/10.1109\/spw59333.2023.00012","DOI":"10.1109\/spw59333.2023.00012"},{"key":"7911_CR10","first-page":"284","volume":"17","author":"V.V. Platonov","year":"2014","unstructured":"Platonov, V.V. and Semenov, P.O., Dimension reduction in network attacks detection systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 284\u2013289.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7911_CR11","doi-asserted-by":"publisher","unstructured":"Awan, S., Luo, B., and Li, F., CONTRA: Defending against poisoning attacks in federated learning, Computer Security\u2013ESORICS 2021, Bertino, E., Shulman, H., and Waidner, M., Eds., Lecture Notes in Computer Science, vol. 12972, Cham: Springer, 2021, pp. 455\u2013475. https:\/\/doi.org\/10.1007\/978-3-030-88418-5_22","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"7911_CR12","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.3103\/s014641161808031x","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P., Vasil\u2019ev, Yu.S., and Poltavtseva, M.A., Approaches to modeling the security of cyberphysical systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1000\u20131009. https:\/\/doi.org\/10.3103\/s014641161808031x","journal-title":"Autom. Control Comput. Sci."},{"key":"7911_CR13","doi-asserted-by":"publisher","unstructured":"Chen, Ya., Gui, Yi., Lin, H., Gan, W., and Wu, Yo., Federated learning attacks and defenses: A survey, 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 2022, IEEE, 2022, pp. 4256\u20134265. https:\/\/doi.org\/10.1109\/bigdata55660.2022.10020431","DOI":"10.1109\/bigdata55660.2022.10020431"},{"key":"7911_CR14","first-page":"377","volume":"5","author":"M.M. Merener","year":"2012","unstructured":"Merener, M.M., Theoretical results on de-anonymization via linkage attacks, Trans. Data Privacy, 2012, vol. 5, no. 2, pp. 377\u2013402.","journal-title":"Trans. Data Privacy"},{"key":"7911_CR15","doi-asserted-by":"publisher","unstructured":"Jagielski, M., Oprea, A., Biggio, B., Liu, Ch., Nita-Rotaru, C., and Li, B., Manipulating machine learning: Poisoning attacks and countermeasures for regression learning, 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, 2018, IEEE, 2018, pp. 19\u201335. https:\/\/doi.org\/10.1109\/sp.2018.00057","DOI":"10.1109\/sp.2018.00057"},{"key":"7911_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/3517821","volume":"13","author":"Sh. Li","year":"2022","unstructured":"Li, Sh., Ngai, E., Ye, F., and Voigt, T., Auto-weighted robust federated learning with corrupted data sources, ACM Trans. Intell. Syst. Technol., 2022, vol. 13, no. 5, p. 73. https:\/\/doi.org\/10.1145\/3517821","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"7911_CR17","unstructured":"Ivanov, D.V. and Ovasapyan, T.D., Securing WSNs based on trust model, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2017, no. 26, pp. 96\u201397."},{"key":"7911_CR18","doi-asserted-by":"publisher","unstructured":"Busygin, A. and Kalinin, M., Criterion of blockchain vulnerability to majority attack based on hashing power distribution assessment, Futuristic Trends in Network and Communication Technologies. FTNCT 2020, Singh, P.K., Veselov, G., Vyatkin, V., Pljonkin, A., Dodero, J.M., and Kumar, Y., Eds., Communications in Computer and Information Science, vol. 1395, Singapore: Springer, 2021, pp. 68\u201377. https:\/\/doi.org\/10.1007\/978-981-16-1480-4_6","DOI":"10.1007\/978-981-16-1480-4_6"},{"key":"7911_CR19","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.3390\/sym13122453","volume":"13","author":"D. Zegzhda","year":"2021","unstructured":"Zegzhda, D., Pavlenko, E., and Aleksandrova, E., Modelling artificial immunization processes to counter cyberthreats, Symmetry, 2021, vol. 13, no. 12, p. 2453. https:\/\/doi.org\/10.3390\/sym13122453","journal-title":"Symmetry"},{"key":"7911_CR20","unstructured":"Tensorflow Federated. https:\/\/github.com\/google-parfait\/tensorflow-federated\/. Cited September 22, 2024."},{"key":"7911_CR21","unstructured":"Keras. https:\/\/github.com\/keras-team\/keras\/. Cited September 22, 2024."},{"key":"7911_CR22","unstructured":"The EMNIST Dataset. https:\/\/www.nist.gov\/itl\/products-and-services\/emnist-dataset\/. Cited September 22, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700762.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700762","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700762.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:57Z","timestamp":1773612177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7911"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700762","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"28 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}