{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T01:58:30Z","timestamp":1772071110261,"version":"3.50.1"},"reference-count":32,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065978","type":"journal-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T07:42:27Z","timestamp":1752219747000},"page":"983-999","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Differential Privacy Integrated Federated Learning for Power Systems: An Explainability-Driven Approach"],"prefix":"10.32604","volume":"85","author":[{"given":"Zekun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Junwei","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Xiu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bingbing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Long","family":"An","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"5814","DOI":"10.1109\/TIFS.2024.3402113","article-title":"RFed: robustness-enhanced privacy-preserving federated learning against poisoning attack","volume":"19","author":"Miao","year":"2024","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"38484","DOI":"10.1109\/ACCESS.2025.3545786","article-title":"A privacy-preserving federated learning with a feature of detecting forged and duplicated gradient model in autonomous vehicle","volume":"13","author":"Alamer","year":"2025","journal-title":"IEEE Access"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/OJCS.2024.3488512","article-title":"A framework to design efficent blockchain-based decentralized federated learning architectures","volume":"5","author":"Formery","year":"2024","journal-title":"IEEE Open J Comput Soc"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/TIFS.2023.3333555","article-title":"AgrAmplifier: defending federated learning against poisoning attacks through local update amplification","volume":"19","author":"Gong","year":"2024","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1109\/TNSE.2023.3300744","article-title":"PhaCIA-TCNs: short-term load forecasting using temporal convolutional networks with parallel hybrid activated convolution and input attention","volume":"11","author":"Xu","year":"2024","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1109\/TBDATA.2023.3237397","article-title":"An experimental study of Byzantine-robust aggregation schemes in federated learning","volume":"10","author":"Li","year":"2024","journal-title":"IEEE Trans Big Data"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/TDSC.2021.3135422","article-title":"LoMar: a local defense against poisoning attack on federated learning","volume":"20","author":"Li","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2926","DOI":"10.3390\/electronics12132926","article-title":"Better safe than sorry: constructing Byzantine-robust federated learning with synthesized trust","volume":"12","author":"Geng","year":"2023","journal-title":"Electronics"},{"key":"ref9","series-title":"Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS); 2024 Oct 14\u201318","article-title":"No vandalism: privacy-preserving and byzantine-robust federated learning","author":"Xing"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"13281","DOI":"10.1109\/JIOT.2023.3262546","article-title":"Privacy-preserving asynchronous federated learning framework in distributed IoT","volume":"10","author":"Yan","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"165280","DOI":"10.1109\/ACCESS.2024.3493112","article-title":"An robust secure blockchain-based hierarchical asynchronous federated learning scheme for Internet of Things","volume":"12","author":"Chen","year":"2024","journal-title":"IEEE Access"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"127018","DOI":"10.1109\/ACCESS.2024.3454211","article-title":"Privacy-preserving federated learning for intrusion detection in IoT environments: a survey","volume":"12","author":"Vyas","year":"2024","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.future.2024.01.009","article-title":"Benchmarking robustness and privacy-preserving methods in federated learning","volume":"155","author":"Alebouyeh","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref14","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas AB. Communication-efficient learning of deep networks from decentralized data. arXiv:1602.05629. 2016. doi:10.48550\/arXiv.1602.05629."},{"key":"ref15","series-title":"Proceedings of the ICC 2020\u20132020 IEEE International Conference on Communications (ICC); 2020 Jun 7\u201311","article-title":"Electrical load forecasting using edge computing and federated learning","author":"Taik"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/OAJPE.2022.3206220","article-title":"Federated learning for short-term residential load forecasting","volume":"9","author":"Briggs","year":"2022","journal-title":"IEEE Open Access J Power Energy"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TII.2021.3095506","article-title":"Secure and efficient federated learning for smart grid with edge-cloud collaboration","volume":"18","author":"Su","year":"2022","journal-title":"IEEE Trans Ind Inf"},{"key":"ref18","unstructured":"Liu H, Zhang X, Shen X, Sun H. A federated learning framework for smart grids: securing power traces in collaborative learning. arXiv:2103.11870. 2021. doi:10.48550\/arXiv.2103.11870."},{"key":"ref19","series-title":"Proceedings of the 2022 IEEE\/IAS Industrial and Commercial Power System Asia (I&CPS Asia); 2022 Jul 8\u201311","article-title":"A review of federated learning in energy systems","author":"Cheng"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"76753","DOI":"10.1109\/ACCESS.2024.3407121","article-title":"Advancing power system services with privacy-preserving federated learning techniques: a review","volume":"12","author":"Zheng","year":"2024","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"100271","DOI":"10.1016\/j.egyai.2023.100271","article-title":"FedDiSC: a computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination","volume":"14","author":"Husnoo","year":"2023","journal-title":"Energy AI"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"6069","DOI":"10.1109\/JIOT.2021.3110784","article-title":"FedDetect: a novel privacy-preserving federated learning framework for energy theft detection in smart grid","volume":"9","author":"Wen","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"7719","DOI":"10.1109\/JIOT.2022.3230586","article-title":"Privacy-preserving and communication-efficient energy prediction scheme based on federated learning for smart grids","volume":"10","author":"Badr","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref24","author":"Zhu","year":"2019","journal-title":"Advances in Neural Information Processing Systems 32. Proceedings of the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019); 2019 Dec 8\u201314"},{"key":"ref25","series-title":"Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP); 2017 May 22\u201326","article-title":"Membership inference attacks against machine learning models","author":"Shokri"},{"key":"ref26","series-title":"Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking; 2020 Apr 27","article-title":"LDP-Fed: federated learning with local differential privacye","author":"Truex"},{"key":"ref27","series-title":"Proceedings of the 2019 IEEE International Conference on Big Data (Big Data); 2019 Dec 9\u201312","article-title":"Federated learning with Bayesian differential privacy","author":"Triastcyn"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.future.2021.09.015","article-title":"An adaptive federated learning scheme with differential privacy preserving","volume":"127","author":"Wu","year":"2022","journal-title":"Future Gener Comput Syst"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"22359","DOI":"10.1109\/ACCESS.2022.3151670","article-title":"Differential privacy for deep and federated learning: a survey","volume":"10","author":"El Ouadrhiri","year":"2022","journal-title":"IEEE Access"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: algorithms and performance analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2140\/pjm.1966.16.1","article-title":"Minimization of functions having Lipschitz continuous first partial derivatives","volume":"16","author":"Armijo","year":"1966","journal-title":"Pacific J Math"},{"key":"ref32","unstructured":"Geyer RC, Klein T, Nabi M. Differentially private federated learning: a client level perspective. arXiv:1712.07557. 2017. doi:10.48550\/arXiv.1712.07557."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_65978\/TSP_CMC_65978.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:05:07Z","timestamp":1763345107000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065978","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}