{"id":"https://openalex.org/W3172555720","doi":"https://doi.org/10.1109/tii.2021.3085960","title":"Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT","display_name":"Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT","publication_year":2021,"publication_date":"2021-06-09","ids":{"openalex":"https://openalex.org/W3172555720","doi":"https://doi.org/10.1109/tii.2021.3085960","mag":"3172555720"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2021.3085960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3085960","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003116103","display_name":"Bin Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Jia","raw_affiliation_strings":["Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"raw_orcid":"https://orcid.org/0000-0002-3725-1394","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-9886-1412","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003090897","display_name":"Jiewen Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiewen Liu","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103077355","display_name":"Yang Zhang","orcid":"https://orcid.org/0000-0001-9156-2823"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"raw_orcid":"https://orcid.org/0000-0001-9156-2823","affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002593637","display_name":"Ke Huang","orcid":"https://orcid.org/0000-0002-2681-530X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Huang","raw_affiliation_strings":["Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, College of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022800601","display_name":"Yongquan Liang","orcid":"https://orcid.org/0000-0001-7179-0079"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongquan Liang","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003116103"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":32.6026,"has_fulltext":false,"cited_by_count":316,"citation_normalized_percentile":{"value":0.99796535,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"18","issue":"6","first_page":"4049","last_page":"4058"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8105344772338867},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7945417761802673},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7783941030502319},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5749490857124329},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5268524885177612},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5062631368637085},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47917047142982483},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2653871178627014}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8105344772338867},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7945417761802673},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7783941030502319},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5749490857124329},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5268524885177612},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5062631368637085},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47917047142982483},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2653871178627014},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2021.3085960","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2021.3085960","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1778465555","display_name":null,"funder_award_id":"62002048","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8909702553","display_name":null,"funder_award_id":"U19A2066","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1988790447","https://openalex.org/W2038194220","https://openalex.org/W2077217970","https://openalex.org/W2132172731","https://openalex.org/W2145073242","https://openalex.org/W2155806188","https://openalex.org/W2306447822","https://openalex.org/W2380563120","https://openalex.org/W2606882085","https://openalex.org/W2769200374","https://openalex.org/W2769903624","https://openalex.org/W2793216106","https://openalex.org/W2912213068","https://openalex.org/W2918245750","https://openalex.org/W2951832089","https://openalex.org/W2958257718","https://openalex.org/W2963801886","https://openalex.org/W2964881778","https://openalex.org/W2974429275","https://openalex.org/W2980494508","https://openalex.org/W3021654819","https://openalex.org/W3025412407","https://openalex.org/W3036294266","https://openalex.org/W3044855437","https://openalex.org/W3088495999","https://openalex.org/W3091870957","https://openalex.org/W3097974940","https://openalex.org/W3102834148","https://openalex.org/W4211068006","https://openalex.org/W4212883601","https://openalex.org/W4248175462","https://openalex.org/W4294106961","https://openalex.org/W4298221930","https://openalex.org/W6681651645","https://openalex.org/W6746720608","https://openalex.org/W6749824362","https://openalex.org/W6758947373","https://openalex.org/W6771536673"],"related_works":["https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2558166297","https://openalex.org/W2734500670","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W2539930818","https://openalex.org/W2964481303","https://openalex.org/W1751413323","https://openalex.org/W4391095118"],"abstract_inverted_index":{"With":[0],"rapid":[1],"growth":[2],"in":[3,11,20,72,93,146,183],"data":[4,19,21,31,43,102,144,147],"volume":[5],"generated":[6],"from":[7],"different":[8],"industrial":[9],"devices":[10],"IoT,":[12],"the":[13,39,54,61,80,108,114,126,134,155,164,180,184],"protection":[14,103,145],"for":[15,30],"sensitive":[16],"and":[17,35,68,99,122,125,133,149,159,162,176],"private":[18],"sharing":[22,44,47,148],"has":[23,33],"become":[24],"crucial.":[25],"At":[26],"present,":[27],"federated":[28,73,91,160],"learning":[29,92],"security":[32,40,62,166],"arisen,":[34],"it":[36],"can":[37],"solve":[38],"concerns":[41],"on":[42,48,107,119],"by":[45],"model":[46,65,69,88,150],"Internet":[49,95],"of":[50,89,96],"mutual":[51],"distrust.":[52],"However,":[53],"hackers":[55],"still":[56],"launch":[57],"attack":[58,67],"aiming":[59],"at":[60],"vulnerabilities":[63],"(e.g.,":[64],"extraction":[66],"reverse":[70],"attack)":[71],"learning.":[74],"In":[75],"this":[76],"article,":[77],"to":[78],"address":[79],"above":[81,109],"problems,":[82],"we":[83,112,153],"first":[84],"design":[85],"an":[86],"application":[87],"blockchain-enabled":[90],"Industrial":[94],"Things":[97],"(IIoT),":[98],"formulate":[100],"our":[101,173],"aggregation":[104,174],"scheme":[105,175],"based":[106,118],"model.":[110],"Then,":[111],"give":[113],"distributed":[115,127,135],"K-means":[116],"clustering":[117],"differential":[120,131],"privacy":[121,132],"homomorphic":[123,138],"encryption,":[124],"random":[128],"forest":[129],"with":[130,137,157],"AdaBoost":[136],"encryption":[139],"methods,":[140],"which":[141],"enable":[142],"multiple":[143],"sharing.":[151],"Finally,":[152],"integrate":[154],"methods":[156],"blockchain":[158],"learning,":[161],"provide":[163],"complete":[165],"analysis.":[167],"Extensive":[168],"experimental":[169],"results":[170],"show":[171],"that":[172],"working":[177],"mechanism":[178],"have":[179],"better":[181],"performance":[182],"selected":[185],"indicators.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":75},{"year":2024,"cited_by_count":103},{"year":2023,"cited_by_count":79},{"year":2022,"cited_by_count":44},{"year":2021,"cited_by_count":7}],"updated_date":"2026-05-02T08:42:23.175194","created_date":"2025-10-10T00:00:00"}
