{"id":"https://openalex.org/W4367277161","doi":"https://doi.org/10.1109/tifs.2023.3271268","title":"VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning","display_name":"VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4367277161","doi":"https://doi.org/10.1109/tifs.2023.3271268"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3271268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3271268","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109192907","display_name":"Sheng Gao","orcid":"https://orcid.org/0000-0002-6090-1965"},"institutions":[{"id":"https://openalex.org/I137867983","display_name":"Central University of Finance and Economics","ror":"https://ror.org/008e3hf02","country_code":"CN","type":"education","lineage":["https://openalex.org/I137867983"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sheng Gao","raw_affiliation_strings":["School of Information, Central University of Finance and Economics, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8118-411X","affiliations":[{"raw_affiliation_string":"School of Information, Central University of Finance and Economics, Beijing, China","institution_ids":["https://openalex.org/I137867983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109604083","display_name":"Jingjie Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I137867983","display_name":"Central University of Finance and Economics","ror":"https://ror.org/008e3hf02","country_code":"CN","type":"education","lineage":["https://openalex.org/I137867983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingjie Luo","raw_affiliation_strings":["School of Information, Central University of Finance and Economics, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information, Central University of Finance and Economics, Beijing, China","institution_ids":["https://openalex.org/I137867983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111114715","display_name":"Jianming Zhu","orcid":"https://orcid.org/0000-0003-4923-9939"},"institutions":[{"id":"https://openalex.org/I137867983","display_name":"Central University of Finance and Economics","ror":"https://ror.org/008e3hf02","country_code":"CN","type":"education","lineage":["https://openalex.org/I137867983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianming Zhu","raw_affiliation_strings":["School of Information, Central University of Finance and Economics, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4923-9939","affiliations":[{"raw_affiliation_string":"School of Information, Central University of Finance and Economics, Beijing, China","institution_ids":["https://openalex.org/I137867983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066750506","display_name":"Xuewen Dong","orcid":"https://orcid.org/0000-0001-5745-0545"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuewen Dong","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0001-5745-0545","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100651611","display_name":"Weisong Shi","orcid":"https://orcid.org/0000-0001-5864-4675"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weisong Shi","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Delaware, Newark, DE, USA"],"raw_orcid":"https://orcid.org/0000-0001-5864-4675","affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Delaware, Newark, DE, USA","institution_ids":["https://openalex.org/I86501945"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5109192907"],"corresponding_institution_ids":["https://openalex.org/I137867983"],"apc_list":null,"apc_paid":null,"fwci":6.2951,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.97251545,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"3760","last_page":"3773"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.9076149463653564},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8558051586151123},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7602503299713135},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6511338949203491},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.5036575198173523},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.4837667942047119},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.47909215092658997},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4584680497646332},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4405905604362488},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43874457478523254},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3933989107608795},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3918769955635071},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36056381464004517},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3500116467475891},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3330124616622925},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24106711149215698},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21718686819076538},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.20143401622772217},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.10003313422203064},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09038886427879333}],"concepts":[{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.9076149463653564},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8558051586151123},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7602503299713135},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6511338949203491},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.5036575198173523},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.4837667942047119},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.47909215092658997},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4584680497646332},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4405905604362488},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43874457478523254},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3933989107608795},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3918769955635071},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36056381464004517},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3500116467475891},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3330124616622925},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24106711149215698},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21718686819076538},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.20143401622772217},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.10003313422203064},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09038886427879333},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3271268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3271268","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3281275430","display_name":null,"funder_award_id":"M21036","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"},{"id":"https://openalex.org/G3675703319","display_name":null,"funder_award_id":"61972310","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8212482623","display_name":null,"funder_award_id":"LD22F020002","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"},{"id":"https://openalex.org/G8452217791","display_name":null,"funder_award_id":"62072487","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W114517082","https://openalex.org/W2141420453","https://openalex.org/W2535690855","https://openalex.org/W2591882872","https://openalex.org/W2767079719","https://openalex.org/W2774000609","https://openalex.org/W2781091734","https://openalex.org/W2912213068","https://openalex.org/W2963456518","https://openalex.org/W2963540401","https://openalex.org/W2964162474","https://openalex.org/W2970408908","https://openalex.org/W2977797911","https://openalex.org/W2984693664","https://openalex.org/W3013124972","https://openalex.org/W3015636663","https://openalex.org/W3016632787","https://openalex.org/W3043303805","https://openalex.org/W3045670331","https://openalex.org/W3095859802","https://openalex.org/W3110845456","https://openalex.org/W3120721446","https://openalex.org/W3187574650","https://openalex.org/W3192324887","https://openalex.org/W4318619660","https://openalex.org/W6728757088","https://openalex.org/W6746839373","https://openalex.org/W6754199392","https://openalex.org/W6764838729","https://openalex.org/W6780438843"],"related_works":["https://openalex.org/W2950475743","https://openalex.org/W4386603768","https://openalex.org/W2886711096","https://openalex.org/W4380078352","https://openalex.org/W3046591097","https://openalex.org/W2590796488","https://openalex.org/W1975861567","https://openalex.org/W207307977","https://openalex.org/W2380100599","https://openalex.org/W2350941479"],"abstract_inverted_index":{"Federated":[0],"learning":[1,8],"(FL)":[2],"is":[3,146,191,246],"essentially":[4],"a":[5,16,30,58,116,224],"distributed":[6],"machine":[7],"paradigm":[9],"that":[10,153,243],"enables":[11],"the":[12,77,126,132,143,171,177,185,192,205,214,257],"joint":[13],"training":[14],"of":[15,104,179,187,216,226,259],"global":[17],"model":[18],"by":[19,95],"aggregating":[20],"gradients":[21],"from":[22],"participating":[23],"clients":[24,154],"without":[25,39],"exchanging":[26],"raw":[27],"data.":[28],"However,":[29],"malicious":[31],"aggregation":[32,144],"server":[33,145],"may":[34],"deliberately":[35],"return":[36],"designed":[37],"results":[38],"any":[40],"operation":[41],"to":[42,85,159,175,195,255],"save":[43],"computation":[44],"overhead,":[45],"or":[46,141],"even":[47],"launch":[48],"privacy":[49,110],"inference":[50],"attacks":[51],"using":[52,120],"crafted":[53],"gradients.":[54],"There":[55],"are":[56],"only":[57],"few":[59],"schemes":[60],"focusing":[61],"on":[62,182,228],"verifiable":[63],"FL,":[64],"and":[65,81,98,166,199,208,222,233,239,253],"yet":[66],"they":[67],"cannot":[68],"achieve":[69,196],"collusion-resistant":[70,197],"verification.":[71],"In":[72],"this":[73,87,190],"paper,":[74],"we":[75,90,114,169,211],"propose":[76,115],"first":[78,91,193],"Verifiable,":[79],"Collusion-resistant,":[80],"Dynamic":[82],"FL":[83],"(VCD-FL)":[84],"tackle":[86],"issue.":[88],"Specifically,":[89],"optimize":[92],"Lagrange":[93],"interpolation":[94],"gradient":[96,122],"grouping":[97],"compression":[99],"for":[100],"achieving":[101],"efficient":[102,128],"verifiability":[103],"FL.":[105,183,260],"To":[106,184],"protect":[107],"clients\u2019":[108],"data":[109],"against":[111,250],"collusion":[112,149,200,251],"attacks,":[113,252],"lightweight":[117],"commitment":[118,134],"scheme":[119],"irreversible":[121],"transformation.":[123],"By":[124],"integrating":[125],"proposed":[127],"verification":[129,198],"mechanism":[130],"with":[131,203,231],"novel":[133],"scheme,":[135],"our":[136,188,217,244],"VCD-FL":[137,245],"can":[138],"detect":[139],"whether":[140],"not":[142],"involved":[147],"in":[148],"attacks.":[150],"Moreover,":[151],"considering":[152],"might":[155],"go":[156],"offline":[157],"due":[158],"some":[160],"reason":[161],"such":[162],"as":[163],"network":[164],"anomaly":[165],"client":[167],"crash,":[168],"adopt":[170],"secret":[172],"sharing":[173],"technique":[174],"eliminate":[176],"effect":[178],"federation":[180],"dynamics":[181,258],"best":[186],"knowledge,":[189],"work":[194],"attack":[201],"detection":[202],"supporting":[204],"correctness,":[206],"privacy,":[207],"dynamics.":[209],"Finally,":[210],"theoretically":[212],"prove":[213],"effectiveness":[215],"VCD-FL,":[218],"make":[219],"comprehensive":[220],"comparisons,":[221],"conduct":[223],"series":[225],"experiments":[227],"MNIST":[229],"dataset":[230],"MLP":[232],"CNN":[234],"models.":[235],"The":[236],"theoretical":[237],"proof":[238],"experimental":[240],"analysis":[241],"demonstrate":[242],"computationally":[247],"efficient,":[248],"robust":[249],"able":[254],"support":[256]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-26T08:31:28.666265","created_date":"2025-10-10T00:00:00"}
