{"id":"https://openalex.org/W4312795532","doi":"https://doi.org/10.1109/mnet.001.2200214","title":"Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks","display_name":"Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks","publication_year":2022,"publication_date":"2022-09-01","ids":{"openalex":"https://openalex.org/W4312795532","doi":"https://doi.org/10.1109/mnet.001.2200214"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.001.2200214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.001.2200214","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045731515","display_name":"Xiaoyi Yang","orcid":"https://orcid.org/0000-0002-3083-2559"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Xiaoyi Yang","raw_affiliation_strings":["The Hong Kong Polytechnic University,Hong Kong","The Hong Kong Polytechnic University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University,Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"The Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035820331","display_name":"Yanqi Zhao","orcid":"https://orcid.org/0000-0002-1023-6549"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanqi Zhao","raw_affiliation_strings":["Xi&#x0027;an University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x0027;an University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100428481","display_name":"Qian Chen","orcid":"https://orcid.org/0000-0002-6956-8185"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Chen","raw_affiliation_strings":["Xidian University,China","Xidian University, China"],"affiliations":[{"raw_affiliation_string":"Xidian University,China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419998","display_name":"Yong Yu","orcid":"https://orcid.org/0000-0002-0187-2439"},"institutions":[{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]},{"id":"https://openalex.org/I98834328","display_name":"Wuyi University","ror":"https://ror.org/059djzq42","country_code":"CN","type":"education","lineage":["https://openalex.org/I98834328"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yu","raw_affiliation_strings":["Shaanxi Normal University and Wuyi University,China","Shaanxi Normal University and Wuyi University, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Normal University and Wuyi University,China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"Shaanxi Normal University and Wuyi University, China","institution_ids":["https://openalex.org/I88830068","https://openalex.org/I98834328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Stevens Institute of Technology,USA","Stevens Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Stevens Institute of Technology,USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Stevens Institute of Technology, USA","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Mohamed Bin Zayed University of Artificial Intelligence,UAE","Mohamed Bin Zayed University of Artificial Intelligence, UAE"],"affiliations":[{"raw_affiliation_string":"Mohamed Bin Zayed University of Artificial Intelligence,UAE","institution_ids":["https://openalex.org/I4210113480"]},{"raw_affiliation_string":"Mohamed Bin Zayed University of Artificial Intelligence, UAE","institution_ids":["https://openalex.org/I4210113480"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5045731515"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":1.194,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82647282,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"36","issue":"5","first_page":"173","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8840030431747437},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8120253086090088},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6177412271499634},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5290821194648743},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5126540064811707},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4883837103843689},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48730647563934326},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.459879994392395},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42541781067848206},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3784588873386383},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.13865619897842407}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8840030431747437},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8120253086090088},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6177412271499634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5290821194648743},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5126540064811707},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4883837103843689},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48730647563934326},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.459879994392395},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42541781067848206},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3784588873386383},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.13865619897842407},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.001.2200214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.001.2200214","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1743877615","https://openalex.org/W2114428623","https://openalex.org/W2767079719","https://openalex.org/W2779833539","https://openalex.org/W2977247807","https://openalex.org/W2983640973","https://openalex.org/W2984242138","https://openalex.org/W3013310637","https://openalex.org/W3088123628","https://openalex.org/W3105440754","https://openalex.org/W3138725718","https://openalex.org/W3153680037","https://openalex.org/W3183232464","https://openalex.org/W4318619660","https://openalex.org/W6728757088","https://openalex.org/W6783183097","https://openalex.org/W6794187937"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2365629437","https://openalex.org/W2072918937","https://openalex.org/W2023935927","https://openalex.org/W2610450802","https://openalex.org/W2377996584","https://openalex.org/W2887779253","https://openalex.org/W1970057761","https://openalex.org/W2064724095"],"abstract_inverted_index":{"In":[0,97],"the":[1,13,30,40,43,79,101,108,154,158,169,182,189,205,208],"Internet":[2,14],"of":[3,42,47,65,69,160,171,184,207],"things":[4],"(IoT)":[5],"networks,":[6],"largescale":[7],"IoT":[8],"devices":[9],"are":[10,84],"connected":[11],"to":[12,15,60,94,148,156,203],"collect":[16],"users'":[17],"data.":[18],"As":[19],"a":[20,62,73,113,195],"distributed":[21,36],"machine":[22],"learning":[23,26,51,131],"paradigm,":[24],"federated":[25,130],"(FL)":[27],"collaboratively":[28],"trains":[29],"global":[31],"model":[32,66],"by":[33,106,199],"utilizing":[34],"large-scale":[35],"devices,":[37],"while":[38,152],"protecting":[39],"privacy":[41],"local":[44],"data":[45,109,172],"sets":[46],"each":[48,70],"participant.":[49],"Federated":[50],"with":[52],"secure":[53,74,127,150],"aggregation":[54,57,128],"employs":[55],"an":[56,123,136],"server":[58],"(aggregator)":[59],"compute":[61],"multiparty":[63],"sum":[64],"parameter":[67],"updates":[68],"participants":[71],"in":[72],"manner":[75],"and":[76,125,144,174,193],"further":[77],"realizes":[78],"updates.":[80],"However,":[81],"existing":[82],"schemes":[83,192],"usually":[85],"based":[86,139],"on":[87,140],"semi-honest":[88],"assumptions,":[89],"which":[90,111],"make":[91],"them":[92],"vulnerable":[93],"malicious":[95,163,178],"clients.":[96,179],"addition,":[98],"they":[99],"address":[100],"random":[102],"client":[103],"dropouts":[104],"problem":[105],"increasing":[107],"size,":[110],"brings":[112],"large":[114],"communication":[115],"overhead.":[116],"To":[117,180],"solve":[118],"these":[119],"issues,":[120],"we":[121,134,187],"propose":[122],"accountable":[124,176],"verifiable":[126],"for":[129,162,177],"framework.":[132,209],"Specifically,":[133],"employ":[135],"SMC":[137],"protocol":[138],"homomorphic":[141,145],"proxy":[142,146],"re-authenticators":[143],"re-encryption":[147],"execute":[149],"aggregation,":[151],"integrating":[153],"blockchain":[155],"realize":[157],"function":[159],"penalty":[161],"behavior.":[164],"Our":[165],"framework":[166],"can":[167],"guarantee":[168],"verifiability":[170],"provenance":[173],"is":[175],"demonstrate":[181],"usability":[183],"our":[185],"framework,":[186],"evaluate":[188],"specific":[190],"cryptography":[191],"develop":[194],"blockchain-based":[196],"prototype":[197],"system":[198],"using":[200],"solidity":[201],"language":[202],"test":[204],"performance":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
