{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T11:05:51Z","timestamp":1749726351834,"version":"3.38.0"},"reference-count":33,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055344","type":"journal-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T07:35:30Z","timestamp":1728632130000},"page":"2317-2336","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Two-Stage Client Selection Scheme for Blockchain-Enabled Federated Learning in IoT"],"prefix":"10.32604","volume":"81","author":[{"given":"Xiaojun","family":"Jin","sequence":"first","affiliation":[]},{"given":"Chao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Song","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Pengyi","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Wei","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2021.3095077","article-title":"A survey on federated learning for resource-constrained IoT devices","volume":"9","author":"Imteaj","year":"Jul. 2021","journal-title":"IEEE Internet Things J."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated learning for internet of things: A comprehensive survey","volume":"23","author":"Nguyen","year":"Apr. 2021","journal-title":"IEEE Commun. Surveys & Tutorials"},{"key":"ref3","series-title":"Proc. 22nd ACM SIGSAC Conf. Comput. Commun. Security","first-page":"1322","article-title":"Model inversion attacks that exploit confidence information and basic countermeasures","author":"Matt","year":"Oct. 2015"},{"key":"ref4","series-title":"Proc. 2018 ACM SIGSAC Conf. Comput. Commun. Security","first-page":"619","article-title":"Property inference attacks on fully connected neural networks using permutation invariant representations","author":"Ganju","year":"2018"},{"key":"ref5","series-title":"2017 IEEE Symp. on Security and Privacy (SP)","first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"Shokri","year":"2017"},{"key":"ref6","unstructured":"N. Satoshi, \u201cBitcoin: A peer-to-peer electronic cash system,\u201d Accessed: Oct. 31, 2008. [Online]. Available: https:\/\/assets.pubpub.org\/d8wct41f\/31611263538139.pdf"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3951","DOI":"10.1007\/s10462-022-10271-9","article-title":"Securing federated learning with blockchain: A systematic literature review","volume":"56","author":"Qammar","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"4423","DOI":"10.1007\/s00500-021-06496-5","article-title":"Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey","volume":"26","author":"Li","year":"2022","journal-title":"Soft Comput."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3524104","article-title":"Blockchain-enabled federated learning: A survey","volume":"55","author":"Qu","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref10","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017","journal-title":"Proc. 20th Int. Conf. Artif. Intell. Stat."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2022.01.002","article-title":"A privacy-preserving and verifiable federated learning method based on blockchain","volume":"186","author":"Fang","year":"2022","journal-title":"Comput. Commun."},{"key":"ref12","unstructured":"J. Wang, S. Wang, R. R. Chen, and M. Ji, \u201cLocal averaging helps: Hierarchical federated learning and convergence analysis,\u201d 2010. doi: 10.48550\/arXiv.2010.12998."},{"key":"ref13","unstructured":"L. Liu, J. Zhang, S. Song, and K. B. Letaief, \u201cHierarchical quantized federated learning: Convergence analysis and system design,\u201d 2021. doi: 10.48550\/arXiv.2103.14272."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"6535","DOI":"10.1109\/TWC.2020.3003744","article-title":"HFEL: Joint edge association and resource allocation for cost-efficient hierarchical federated edge learning","volume":"19","author":"Luo","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1109\/TNSE.2021.3050781","article-title":"VFChain: Enabling verifiable and auditable federated learning via blockchain systems","volume":"9","author":"Peng","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1723","DOI":"10.1109\/TNET.2023.3328635","article-title":"EV-FL: Efficient verifiable federated learning with weighted aggregation for industrial IoT networks","volume":"32","author":"Yu","year":"2023","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"13125","DOI":"10.1109\/JIOT.2023.3330813","article-title":"SVFLC: Secure and verifiable federated learning with chain aggregation","volume":"11","author":"Li","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref18","series-title":"Int. Conf. Machine Learning.","first-page":"3407","article-title":"Clustered sampling: Low-variance and improved representativity for clients selection in federated learning","author":"Fraboni","year":"2021"},{"key":"ref19","series-title":"Int. Conf. Learn. Represent.","article-title":"Diverse client selection for federated learning via submodular maximization","author":"Balakrishnan","year":"2022"},{"key":"ref20","unstructured":"J. Goetz, K. Malik, D. Bui, S. Moon, H. Liu and A. Kumar, \u201cActive federated learning,\u201d 2019. doi: 10.48550\/arXiv.1909.12641."},{"key":"ref21","unstructured":"Y. Cho, J. Wang, and G. Joshi, \u201cClient selection in federated learning: Convergence analysis and power-of-choice selection strategies,\u201d 2020. doi: 10.48550\/arXiv.2010.01243."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"5784","DOI":"10.1109\/TVT.2020.2967099","article-title":"TrustAccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain","volume":"69","author":"Gao","year":"2020","journal-title":"IEEE Trans. Vehicular Technol."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.3233\/JIFS-189318","article-title":"Data security sharing method based on cp-abe and blockchain","volume":"40","author":"Zhang","year":"2021","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref24","series-title":"Adv. Cryptol.\u2013EUROCRYPT 2005: 24th Annu. Int. Conf. Theor. Appl. Cryptogr. Tech.","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"Sahai","year":"2005"},{"key":"ref25","series-title":"2007 IEEE Symp. Security Privacy (SP\u201907)","first-page":"321","article-title":"Ciphertext-policy attribute based encryption","author":"Bethencourt","year":"2007"},{"key":"ref26","series-title":"Proc. 13th ACM Conf. Comput. Commun. Security","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"Goyal","year":"2006"},{"key":"ref27","series-title":"Int. Conf. Mach. Learn.","article-title":"Trust region policy optimization","author":"Schulman","year":"2015"},{"key":"ref28","unstructured":"J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov, \u201cProximal policy optimization algorithms,\u201d 2017. doi: 10.48550\/arXiv.1707.06347."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","article-title":"Space\/time trade-offs in hash coding with allowable errors","volume":"13","author":"Bloom","year":"1970","journal-title":"Commun. ACM"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"14731","DOI":"10.1109\/JIOT.2021.3071553","article-title":"Privacy-preserving flexible access control for encrypted data in internet of things","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref31","series-title":"ICC, 2019-2019 IEEE Int. Conf. Commun. (ICC)","article-title":"Client selection for federated learning with heterogeneous resources in mobile edge","author":"Nishio","year":"2019"},{"key":"ref32","series-title":"2021 IEEE Glob. Commun. Conf. (GLOBECOM)","first-page":"1","article-title":"Client selection with bandwidth allocation in federated learning","author":"Kuang","year":"2021"},{"key":"ref33","unstructured":"S. Caldas et al., \u201cLeaf: A benchmark for federated settings,\u201d 2018. doi: 10.48550\/arXiv.1812.01097."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_55344\/TSP_CMC_55344.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:08:52Z","timestamp":1741320532000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58637"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":33,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055344","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}