{"id":"https://openalex.org/W4410852248","doi":"https://doi.org/10.1109/tdsc.2025.3574745","title":"Robust and Secure Federated Learning With Verifiable Differential Privacy","display_name":"Robust and Secure Federated Learning With Verifiable Differential Privacy","publication_year":2025,"publication_date":"2025-05-29","ids":{"openalex":"https://openalex.org/W4410852248","doi":"https://doi.org/10.1109/tdsc.2025.3574745"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3574745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3574745","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045567250","display_name":"Chushan Zhang","orcid":"https://orcid.org/0009-0005-7814-9563"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210087931","display_name":"Institute for Security Studies","ror":"https://ror.org/004zjze34","country_code":"KE","type":"nonprofit","lineage":["https://openalex.org/I4210087931","https://openalex.org/I4210093398"]}],"countries":["CN","KE"],"is_corresponding":true,"raw_author_name":"Chushan Zhang","raw_affiliation_strings":["College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0009-0005-7814-9563","affiliations":[{"raw_affiliation_string":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","institution_ids":["https://openalex.org/I4210087931"]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":"https://orcid.org/0000-0003-4067-8230"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]},{"id":"https://openalex.org/I4210087931","display_name":"Institute for Security Studies","ror":"https://ror.org/004zjze34","country_code":"KE","type":"nonprofit","lineage":["https://openalex.org/I4210087931","https://openalex.org/I4210093398"]}],"countries":["CN","KE"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4067-8230","affiliations":[{"raw_affiliation_string":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","institution_ids":["https://openalex.org/I4210087931"]},{"raw_affiliation_string":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","institution_ids":["https://openalex.org/I2799850029"]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025556550","display_name":"Jiasi Weng","orcid":"https://orcid.org/0000-0002-5876-7875"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]},{"id":"https://openalex.org/I4210087931","display_name":"Institute for Security Studies","ror":"https://ror.org/004zjze34","country_code":"KE","type":"nonprofit","lineage":["https://openalex.org/I4210087931","https://openalex.org/I4210093398"]}],"countries":["CN","KE"],"is_corresponding":false,"raw_author_name":"Jiasi Weng","raw_affiliation_strings":["College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-5876-7875","affiliations":[{"raw_affiliation_string":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","institution_ids":["https://openalex.org/I4210087931"]},{"raw_affiliation_string":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","institution_ids":["https://openalex.org/I2799850029"]},{"raw_affiliation_string":"the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045580016","display_name":"Yijian Zhong","orcid":"https://orcid.org/0000-0001-8249-2034"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210087931","display_name":"Institute for Security Studies","ror":"https://ror.org/004zjze34","country_code":"KE","type":"nonprofit","lineage":["https://openalex.org/I4210087931","https://openalex.org/I4210093398"]}],"countries":["CN","KE"],"is_corresponding":false,"raw_author_name":"Yijian Zhong","raw_affiliation_strings":["College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-8249-2034","affiliations":[{"raw_affiliation_string":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","institution_ids":["https://openalex.org/I4210087931"]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000372510","display_name":"Jia-Nan Liu","orcid":"https://orcid.org/0000-0003-3140-2320"},"institutions":[{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia-Nan Liu","raw_affiliation_strings":["School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China"],"raw_orcid":"https://orcid.org/0000-0003-3140-2320","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","institution_ids":["https://openalex.org/I2799850029"]}]},{"author_position":"last","author":{"id":null,"display_name":"Cunle Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210087931","display_name":"Institute for Security Studies","ror":"https://ror.org/004zjze34","country_code":"KE","type":"nonprofit","lineage":["https://openalex.org/I4210087931","https://openalex.org/I4210093398"]}],"countries":["CN","KE"],"is_corresponding":false,"raw_author_name":"Cunle Deng","raw_affiliation_strings":["College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","College of Cyber Security of Jinan University, Guangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Cyber Security, the National Joint Engineering Research Center of Network Security Detection and Protection Technology, the Guangdong Key Laboratory of Data Security and Privacy Preserving, and the Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving, Guangzhou, China","institution_ids":["https://openalex.org/I4210087931"]},{"raw_affiliation_string":"College of Cyber Security of Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5045567250"],"corresponding_institution_ids":["https://openalex.org/I159948400","https://openalex.org/I4210087931"],"apc_list":null,"apc_paid":null,"fwci":12.3418,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.98290886,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"22","issue":"5","first_page":"5713","last_page":"5729"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8370183706283569},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.830689549446106},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8277736902236938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4994537830352783},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42976611852645874},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42053499817848206},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4201143980026245},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32184767723083496},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16952171921730042}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8370183706283569},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.830689549446106},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8277736902236938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4994537830352783},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42976611852645874},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42053499817848206},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4201143980026245},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32184767723083496},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16952171921730042},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3574745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3574745","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7563880721","display_name":null,"funder_award_id":"2024A1515011341","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G8395670599","display_name":null,"funder_award_id":"62332007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8825203574","display_name":null,"funder_award_id":"U22B2028","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W827005847","https://openalex.org/W1513692111","https://openalex.org/W1873763122","https://openalex.org/W1885156594","https://openalex.org/W1892798954","https://openalex.org/W2095317991","https://openalex.org/W2108777864","https://openalex.org/W2112796928","https://openalex.org/W2402235285","https://openalex.org/W2767079719","https://openalex.org/W2970408908","https://openalex.org/W3016560828","https://openalex.org/W3016632787","https://openalex.org/W3021654819","https://openalex.org/W3027749727","https://openalex.org/W3030742901","https://openalex.org/W3096328345","https://openalex.org/W3107632872","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3183165740","https://openalex.org/W3211470872","https://openalex.org/W3212079419","https://openalex.org/W4226249052","https://openalex.org/W4285607018","https://openalex.org/W4289126832","https://openalex.org/W4308632285","https://openalex.org/W4317796249","https://openalex.org/W4362653687","https://openalex.org/W4376626946","https://openalex.org/W4385299238","https://openalex.org/W4388925648","https://openalex.org/W4391462029"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W3038283795","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W4391095118"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
