{"id":"https://openalex.org/W4395680545","doi":"https://doi.org/10.1109/jiot.2024.3394168","title":"PSFL: Ensuring Data Privacy and Model Security for Federated Learning","display_name":"PSFL: Ensuring Data Privacy and Model Security for Federated Learning","publication_year":2024,"publication_date":"2024-04-26","ids":{"openalex":"https://openalex.org/W4395680545","doi":"https://doi.org/10.1109/jiot.2024.3394168"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3394168","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3394168","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090250275","display_name":"Jing Li","orcid":"https://orcid.org/0009-0000-1655-2254"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Li","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087443104","display_name":"Zhou Zhou","orcid":"https://orcid.org/0000-0001-5436-7674"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Zhou","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047910167","display_name":"Axin Xiang","orcid":"https://orcid.org/0000-0002-3404-5341"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Axin Xiang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328364","display_name":"Shuai Wang","orcid":"https://orcid.org/0009-0001-3395-8181"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Wang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060659901","display_name":"Jinbo Xiong","orcid":"https://orcid.org/0000-0001-9985-1953"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinbo Xiong","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen, China","College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5090250275"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":null,"apc_paid":null,"fwci":4.1891,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.9456029,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"11","issue":"15","first_page":"26234","last_page":"26252"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.845818042755127},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6340818405151367},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5534018278121948},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.5412551760673523},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.47943705320358276},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39530104398727417},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19697263836860657},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11632862687110901}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.845818042755127},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6340818405151367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5534018278121948},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.5412551760673523},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.47943705320358276},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39530104398727417},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19697263836860657},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11632862687110901}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3394168","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3394168","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G132680173","display_name":null,"funder_award_id":"[2020]5017","funder_id":"https://openalex.org/F4320336617","funder_display_name":"Science and Technology Program of Guizhou Province"},{"id":"https://openalex.org/G7339968161","display_name":null,"funder_award_id":"62272102","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8023207571","display_name":null,"funder_award_id":"2023J02014","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G8933663338","display_name":null,"funder_award_id":"[2022]065","funder_id":"https://openalex.org/F4320336617","funder_display_name":"Science and Technology Program of Guizhou Province"},{"id":"https://openalex.org/G968270831","display_name":null,"funder_award_id":"62272123","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null},{"id":"https://openalex.org/F4320336617","display_name":"Science and Technology Program of Guizhou Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W3017123256","https://openalex.org/W3022248811","https://openalex.org/W3042070225","https://openalex.org/W3042636178","https://openalex.org/W3045720734","https://openalex.org/W3084128899","https://openalex.org/W3085804918","https://openalex.org/W3088631669","https://openalex.org/W3088731039","https://openalex.org/W3111358184","https://openalex.org/W3113149354","https://openalex.org/W3118608800","https://openalex.org/W3120176213","https://openalex.org/W3120346123","https://openalex.org/W3125786278","https://openalex.org/W3138153888","https://openalex.org/W3176937389","https://openalex.org/W3193492336","https://openalex.org/W3197511691","https://openalex.org/W3209606284","https://openalex.org/W3212079419","https://openalex.org/W4206298942","https://openalex.org/W4206770764","https://openalex.org/W4210485920","https://openalex.org/W4210508597","https://openalex.org/W4212974603","https://openalex.org/W4220842084","https://openalex.org/W4226249052","https://openalex.org/W4311081048","https://openalex.org/W4312602835","https://openalex.org/W4312731257","https://openalex.org/W4313307834","https://openalex.org/W4323065874","https://openalex.org/W4365130618","https://openalex.org/W4386736874","https://openalex.org/W6728757088","https://openalex.org/W6743821447","https://openalex.org/W6748786018","https://openalex.org/W6758201434","https://openalex.org/W6759226220","https://openalex.org/W6770634426","https://openalex.org/W6771533808","https://openalex.org/W6787633081","https://openalex.org/W6788944133"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832"],"abstract_inverted_index":{"The":[0],"integration":[1],"of":[2,24,83,128,145,151,174],"blockchain-based":[3],"federated":[4],"learning":[5],"(BFL)":[6],"and":[7,17,27,42,49,67,143,162,171],"Industry":[8,32,194],"4.0":[9],"utilizes":[10],"intermediate":[11],"models":[12],"to":[13,40,193],"execute":[14],"task":[15],"deployment":[16],"result":[18],"acceptance,":[19],"effectively":[20],"solving":[21],"the":[22,35,84,90,106,126,134,141,168,172,175],"problems":[23],"data":[25,28,47,65],"barriers":[26],"resource":[29,123],"waste":[30],"in":[31,89,97,102,179],"4.0.":[33,195],"However,":[34],"BFL":[36],"ecosystem":[37],"is":[38,130,156],"susceptible":[39],"poisoning":[41],"inference":[43],"attacks":[44],"that":[45,62,187],"undermine":[46],"privacy":[48,66],"model":[50,68,169,176],"security.":[51,69],"In":[52,164],"this":[53],"paper,":[54],"we":[55,71,109],"propose":[56,110],"PSFL,":[57,146],"a":[58,73,80,111],"robust":[59],"FL":[60],"framework":[61],"guarantees":[63],"both":[64],"Specifically,":[70],"design":[72],"cross-validation":[74],"algorithm":[75],"where":[76],"numerous":[77],"participants":[78],"conduct":[79],"thorough":[81],"assessment":[82,139],"user\u2019s":[85],"contribution":[86],"growth":[87],"rate":[88],"current":[91],"round.":[92],"This":[93],"approach":[94],"proves":[95],"effective":[96],"identifying":[98],"Byzantine":[99],"attackers":[100],"engaged":[101],"malicious":[103,152],"activities":[104],"within":[105],"system.":[107],"Furthermore,":[108],"lightweight":[112],"multi-receiver":[113],"signcryption":[114],"mechanism":[115],"employing":[116],"secure":[117],"key":[118],"distribution,":[119],"which":[120,185],"significantly":[121],"minimizes":[122],"overhead.":[124],"Finally,":[125],"security":[127,173],"PSFL":[129,166,188],"proved":[131],"based":[132],"on":[133],"random":[135],"oracle":[136],"model.":[137],"Empirical":[138],"affirms":[140],"effectiveness":[142],"practicality":[144],"even":[147],"with":[148],"different":[149],"proportions":[150],"users,":[153],"PSFL\u2019s":[154],"performance":[155],"10%20%":[157],"higher":[158],"than":[159],"Trimmed":[160],"Mean":[161],"M-Krum.":[163],"summary,":[165],"improves":[167],"accuracy":[170],"transmission":[177],"process":[178],"scenarios":[180],"involving":[181],"edge":[182],"node":[183],"poisoning,":[184],"demonstrates":[186],"can":[189],"be":[190],"well":[191],"adapted":[192]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
