{"id":"https://openalex.org/W4414490746","doi":"https://doi.org/10.1007/s44443-025-00256-3","title":"DMAFL: Effective defense against malicious attacker federated learning framework via blockchain and TFHE","display_name":"DMAFL: Effective defense against malicious attacker federated learning framework via blockchain and TFHE","publication_year":2025,"publication_date":"2025-09-24","ids":{"openalex":"https://openalex.org/W4414490746","doi":"https://doi.org/10.1007/s44443-025-00256-3"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00256-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00256-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00256-3.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00256-3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100293758","display_name":"Chunhua Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153869","display_name":"Huaiyin Institute of Technology","ror":"https://ror.org/0555ezg60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153869"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunhua Jin","raw_affiliation_strings":["School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China","institution_ids":["https://openalex.org/I4210153869"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiahao Wang","orcid":"https://orcid.org/0009-0000-3651-5143"},"institutions":[{"id":"https://openalex.org/I4210153869","display_name":"Huaiyin Institute of Technology","ror":"https://ror.org/0555ezg60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153869"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahao Wang","raw_affiliation_strings":["School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China"],"raw_orcid":"https://orcid.org/0009-0000-3651-5143","affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China","institution_ids":["https://openalex.org/I4210153869"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066881061","display_name":"Wei L\u00fc","orcid":"https://orcid.org/0000-0003-4731-1976"},"institutions":[{"id":"https://openalex.org/I4210153869","display_name":"Huaiyin Institute of Technology","ror":"https://ror.org/0555ezg60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153869"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanru Lu","raw_affiliation_strings":["School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China","institution_ids":["https://openalex.org/I4210153869"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065366428","display_name":"Chongjia Luo","orcid":"https://orcid.org/0000-0003-1517-4022"},"institutions":[{"id":"https://openalex.org/I4210153869","display_name":"Huaiyin Institute of Technology","ror":"https://ror.org/0555ezg60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153869"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenfeng Luo","raw_affiliation_strings":["School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China","institution_ids":["https://openalex.org/I4210153869"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049357951","display_name":"Junyi Liu","orcid":"https://orcid.org/0000-0002-2018-1668"},"institutions":[{"id":"https://openalex.org/I4210153869","display_name":"Huaiyin Institute of Technology","ror":"https://ror.org/0555ezg60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153869"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junyi Liu","raw_affiliation_strings":["School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China","institution_ids":["https://openalex.org/I4210153869"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665986","display_name":"Guanhua Chen","orcid":"https://orcid.org/0000-0002-7870-7546"},"institutions":[{"id":"https://openalex.org/I4210153869","display_name":"Huaiyin Institute of Technology","ror":"https://ror.org/0555ezg60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153869"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanhua Chen","raw_affiliation_strings":["School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China","institution_ids":["https://openalex.org/I4210153869"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053201154","display_name":"Zhonghao Zhai","orcid":"https://orcid.org/0000-0002-7410-8677"},"institutions":[{"id":"https://openalex.org/I4210153869","display_name":"Huaiyin Institute of Technology","ror":"https://ror.org/0555ezg60","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210153869"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhonghao Zhai","raw_affiliation_strings":["School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Huaiyin Institute of Technology, Meicheng Road, Huaian, Jiangsu, 223003, China","institution_ids":["https://openalex.org/I4210153869"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100293758"],"corresponding_institution_ids":["https://openalex.org/I4210153869"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12913745,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"8","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6480000019073486},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.6204000115394592},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5907999873161316},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5874000191688538},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5242000222206116},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.5230000019073486},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49559998512268066},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4837999939918518},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4374000132083893}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7918999791145325},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6480000019073486},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.6204000115394592},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5907999873161316},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5874000191688538},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5242000222206116},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.5230000019073486},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49559998512268066},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4837999939918518},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45179998874664307},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4374000132083893},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.436599999666214},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3472000062465668},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.3352000117301941},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.33090001344680786},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2964000105857849},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.2935999929904938},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2915000021457672},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.27070000767707825},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.2529999911785126},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.25110000371932983}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00256-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00256-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00256-3.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:259b1c6ce963421d90393e83a6faef42","is_oa":true,"landing_page_url":"https://doaj.org/article/259b1c6ce963421d90393e83a6faef42","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 37, Iss 8, Pp 1-19 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00256-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00256-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00256-3.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4414490746.pdf"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W1885156594","https://openalex.org/W2031533839","https://openalex.org/W2126087831","https://openalex.org/W2768174108","https://openalex.org/W2810065831","https://openalex.org/W3038022836","https://openalex.org/W3088396143","https://openalex.org/W3091870957","https://openalex.org/W3105281963","https://openalex.org/W3172555720","https://openalex.org/W3172836181","https://openalex.org/W3186669480","https://openalex.org/W3196377726","https://openalex.org/W3204946808","https://openalex.org/W3205368495","https://openalex.org/W3208693455","https://openalex.org/W3211010549","https://openalex.org/W4200635003","https://openalex.org/W4210712880","https://openalex.org/W4211030585","https://openalex.org/W4213106035","https://openalex.org/W4220837705","https://openalex.org/W4221143748","https://openalex.org/W4285142034","https://openalex.org/W4289782028","https://openalex.org/W4316039379","https://openalex.org/W4318619660","https://openalex.org/W4322631204","https://openalex.org/W4385245701","https://openalex.org/W4385453496","https://openalex.org/W4385681741","https://openalex.org/W4387250147","https://openalex.org/W4390273618","https://openalex.org/W4390604022","https://openalex.org/W4390872697","https://openalex.org/W4393339879","https://openalex.org/W4396758501","https://openalex.org/W4399661803","https://openalex.org/W4400076000","https://openalex.org/W4401147017","https://openalex.org/W4401863415","https://openalex.org/W4403019743","https://openalex.org/W4403909613","https://openalex.org/W4404794127","https://openalex.org/W4406388444","https://openalex.org/W4406774535","https://openalex.org/W4407127070","https://openalex.org/W4407245268","https://openalex.org/W4407304478","https://openalex.org/W4407948341","https://openalex.org/W4409728231","https://openalex.org/W4410062040","https://openalex.org/W4410985502","https://openalex.org/W4411865836","https://openalex.org/W4414854637","https://openalex.org/W6910557135","https://openalex.org/W6929373168"],"related_works":[],"abstract_inverted_index":{"A":[0,60],"blockchain":[1],"and":[2,18,29,35,45,70,78,102,106,129,135,153,166],"threshold":[3,127],"fully":[4],"homomorphic":[5],"encryption":[6,134],"(TFHE)-based":[7],"federated":[8,22,174],"learning":[9,23,175],"framework":[10,48],"is":[11,74],"proposed":[12,170],"to":[13,27,76,93,140],"defend":[14],"against":[15],"model":[16,33,115],"poisoning":[17,30],"privacy":[19],"leakage.":[20],"Standard":[21],"(FL)":[24],"remains":[25],"vulnerable":[26],"inference":[28],"attacks":[31],"during":[32],"aggregation":[34],"distribution.":[36],"To":[37],"address":[38],"these":[39],"threats,":[40],"we":[41,84],"present":[42],"a":[43,90,144],"secure":[44],"efficient":[46],"FL":[47],"that":[49,110],"combines":[50],"TFHE":[51],"with":[52,89,122],"Shamir\u2019s":[53],"secret":[54,67],"sharing":[55,68],"for":[56,172],"privacy-preserving":[57],"encrypted":[58],"updates.":[59,82],"multi-layer":[61],"verification":[62],"mechanism":[63,92],"consisting":[64],"of":[65,148,168],"verifiable":[66],"(PVSS)":[69],"cosine":[71],"similarity":[72],"checks":[73],"introduced":[75],"identify":[77],"filter":[79],"out":[80],"malicious":[81],"Furthermore,":[83],"replace":[85],"the":[86,163,169],"central":[87],"aggregator":[88],"blockchain-based":[91],"eliminate":[94],"single-point":[95],"trust.":[96],"Extensive":[97],"experiments":[98],"conducted":[99],"on":[100,151,155],"MNIST":[101,152],"CIFAR-10":[103,156],"under":[104,117,157],"IID":[105],"Non-IID":[107],"settings":[108],"demonstrate":[109],"our":[111,131],"scheme":[112,171],"maintains":[113],"high":[114],"accuracy":[116,146],"20%\u201340%":[118],"label-flipping":[119],"attacks.":[120],"Compared":[121],"baseline":[123],"methods":[124],"such":[125],"as":[126],"Paillier":[128],"PPVFL,":[130],"approach":[132],"reduces":[133],"decryption":[136],"overhead":[137],"by":[138],"up":[139],"28.4%,":[141],"while":[142],"achieving":[143],"lower":[145],"drop":[147],"only":[149],"2.32%":[150],"7.44%":[154],"40%":[158],"poisoning.":[159],"These":[160],"results":[161],"highlight":[162],"robustness,":[164],"efficiency,":[165],"practicality":[167],"real-world":[173],"deployments.":[176]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
