{"id":"https://openalex.org/W7117316411","doi":"https://doi.org/10.1109/access.2025.3648434","title":"X-BDFL: Explainable Blockchain-Enabled Distributed Federated Learning Against Poisoning Attack in Healthcare","display_name":"X-BDFL: Explainable Blockchain-Enabled Distributed Federated Learning Against Poisoning Attack in Healthcare","publication_year":2025,"publication_date":"2025-12-26","ids":{"openalex":"https://openalex.org/W7117316411","doi":"https://doi.org/10.1109/access.2025.3648434"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3648434","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3648434","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3648434","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101238635","display_name":"Shubhasri Roy","orcid":null},"institutions":[{"id":"https://openalex.org/I26072440","display_name":"Indian Institute of Information Technology Allahabad","ror":"https://ror.org/03rgjt374","country_code":"IN","type":"education","lineage":["https://openalex.org/I26072440"]},{"id":"https://openalex.org/I77501641","display_name":"University of Kalyani","ror":"https://ror.org/03v783k16","country_code":"IN","type":"education","lineage":["https://openalex.org/I77501641"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shubhasri Roy","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641","https://openalex.org/I26072440"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076274335","display_name":"Sandip Kumar Singha","orcid":null},"institutions":[{"id":"https://openalex.org/I77501641","display_name":"University of Kalyani","ror":"https://ror.org/03v783k16","country_code":"IN","type":"education","lineage":["https://openalex.org/I77501641"]},{"id":"https://openalex.org/I26072440","display_name":"Indian Institute of Information Technology Allahabad","ror":"https://ror.org/03rgjt374","country_code":"IN","type":"education","lineage":["https://openalex.org/I26072440"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sandip Kumar Singha","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641","https://openalex.org/I26072440"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088396490","display_name":"Debasish Bera","orcid":"https://orcid.org/0000-0001-8888-6042"},"institutions":[{"id":"https://openalex.org/I77501641","display_name":"University of Kalyani","ror":"https://ror.org/03v783k16","country_code":"IN","type":"education","lineage":["https://openalex.org/I77501641"]},{"id":"https://openalex.org/I26072440","display_name":"Indian Institute of Information Technology Allahabad","ror":"https://ror.org/03rgjt374","country_code":"IN","type":"education","lineage":["https://openalex.org/I26072440"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debasish Bera","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, Kalyani, West Bengal, India","institution_ids":["https://openalex.org/I77501641","https://openalex.org/I26072440"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101238635"],"corresponding_institution_ids":["https://openalex.org/I26072440","https://openalex.org/I77501641"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.83971073,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"2726","last_page":"2741"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.46630001068115234,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.46630001068115234,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2190999984741211,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.07729999721050262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8077999949455261},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7074999809265137},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6437000036239624},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.609499990940094},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5906000137329102},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.557200014591217},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5034000277519226},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.44449999928474426}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8503999710083008},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8077999949455261},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7074999809265137},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6437000036239624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.611299991607666},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.609499990940094},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5906000137329102},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.557200014591217},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5034000277519226},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.44449999928474426},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.424699991941452},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4171000123023987},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.34130001068115234},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.3411000072956085},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.33160001039505005},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.321399986743927},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.29260000586509705},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2721000015735626},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.2540000081062317}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3648434","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3648434","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3648434","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3648434","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.758586585521698,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1504695911","https://openalex.org/W1965555277","https://openalex.org/W2112796928","https://openalex.org/W2326245332","https://openalex.org/W2912213068","https://openalex.org/W2977797911","https://openalex.org/W2979416895","https://openalex.org/W2997359889","https://openalex.org/W2998557912","https://openalex.org/W3016632787","https://openalex.org/W3046238651","https://openalex.org/W3087391814","https://openalex.org/W3092036931","https://openalex.org/W3138597937","https://openalex.org/W3160147580","https://openalex.org/W3200002062","https://openalex.org/W4226047321","https://openalex.org/W4226249052","https://openalex.org/W4232916392","https://openalex.org/W4255825152","https://openalex.org/W4300991139","https://openalex.org/W4315474725","https://openalex.org/W4387722547","https://openalex.org/W4392302699","https://openalex.org/W4392932182","https://openalex.org/W4393171950","https://openalex.org/W4399141517","https://openalex.org/W4400076000","https://openalex.org/W4404941463"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,63,87],"5G":[3],"have":[4],"empowered":[5],"edge":[6,26,116,200],"devices":[7],"to":[8,38,117,148,165,199],"generate":[9],"high-quality":[10],"data,":[11],"driving":[12],"the":[13,25,49,115,125],"need":[14],"for":[15,54,127],"Federated":[16],"Learning":[17],"(FL),":[18],"which":[19],"enables":[20],"privacy-preserving":[21],"model":[22,60,102,194],"training":[23],"at":[24,114,124],"(e.g.,":[27],"hospitals)":[28],"without":[29,99,170,196],"sharing":[30],"raw":[31],"data.":[32],"However,":[33],"traditional":[34],"FL":[35,75,106],"remains":[36],"vulnerable":[37],"poisoning":[39,85],"attacks":[40,212],"and":[41,92,96,121,130,176,210,219,236],"relies":[42],"on":[43,233,244],"an":[44],"overburdened":[45],"central":[46],"server.":[47],"Moreover,":[48],"lack":[50],"of":[51,145,157,163,217],"transparent":[52],"explanations":[53],"poisoner":[55,94,135],"elimination":[56,97,151],"raises":[57],"concerns":[58],"about":[59],"reliability,":[61],"especially":[62],"sensitive":[64,101],"domains":[65],"like":[66,247],"healthcare.":[67],"This":[68],"article":[69],"proposes":[70],"a":[71],"novel":[72],"hyperledger-based":[73],"hierarchical":[74,105],"scheme":[76,98,137,159,187],"called":[77],"X-BDFL":[78,207],"(Explainable":[79],"blockchain-enabled":[80],"distributed":[81],"federated":[82],"learning)":[83],"against":[84],"attack":[86],"healthcare":[88],"that":[89,206],"ensures":[90],"explainable":[91],"verifiable":[93],"detection":[95,136],"exposing":[100],"parameters.":[103],"The":[104,134,155],"structure":[107],"builds":[108],"trust":[109],"by":[110,242],"filtering":[111],"unintended":[112],"anomalies":[113],"protect":[118],"client":[119,146],"reputation":[120],"detecting":[122],"poisoners":[123],"fog":[126],"early":[128],"mitigation":[129],"reduced":[131],"server":[132],"overhead.":[133],"leverages":[138],"Shapley":[139],"Additive":[140],"Explanations":[141],"(SHAP)-based":[142],"behaviour":[143],"analysis":[144],"models":[147],"justify":[149],"threat":[150],"through":[152],"feature":[153],"attribution.":[154],"novelty":[156],"this":[158],"is":[160],"its":[161],"use":[162],"JS-Divergence":[164],"detect":[166],"out-of-order":[167],"malicious":[168],"clients":[169],"assuming":[171],"any":[172],"prior":[173],"data":[174],"distribution,":[175],"maintaining":[177],"effectiveness":[178],"even":[179],"when":[180],"most":[181],"participants":[182],"are":[183],"compromised.":[184],"Furthermore,":[185],"our":[186],"offers":[188],"transparent,":[189],"scalable":[190],"defence":[191,231],"while":[192,224],"preserving":[193,225],"integrity":[195],"adding":[197],"overhead":[198],"medical":[201],"devices.":[202],"Experimental":[203],"results":[204],"shows":[205],"counters":[208],"label-flipping":[209],"backdoor":[211],"with":[213],"low":[214],"success":[215],"rates":[216],"4%":[218],"9%":[220],"under":[221],"90%":[222],"poisoning,":[223],"task":[226],"accuracy.":[227],"It":[228],"achieves":[229],"comparable":[230],"accuracy":[232],"MINIST":[234],"dataset":[235,246],"outperforms":[237],"state-of-the-art":[238],"method":[239],"(MOAT":[240],"[9])":[241],"28%":[243],"complex":[245],"COVID-QU-Ex.":[248]},"counts_by_year":[],"updated_date":"2026-01-10T23:39:48.068659","created_date":"2025-12-26T00:00:00"}
