{"id":"https://openalex.org/W4390603618","doi":"https://doi.org/10.1109/tnse.2024.3350365","title":"Trustworthy Federated Learning Against Malicious Attacks in Web 3.0","display_name":"Trustworthy Federated Learning Against Malicious Attacks in Web 3.0","publication_year":2024,"publication_date":"2024-01-05","ids":{"openalex":"https://openalex.org/W4390603618","doi":"https://doi.org/10.1109/tnse.2024.3350365"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3350365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3350365","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102255581","display_name":"Yuan Zheng","orcid":"https://orcid.org/0009-0004-9322-9345"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zheng Yuan","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087443104","display_name":"Zhou Zhou","orcid":"https://orcid.org/0000-0001-5436-7674"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Zhou","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040395332","display_name":"Ta Li","orcid":"https://orcid.org/0000-0001-7837-9602"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ta Li","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328364","display_name":"Shuai Wang","orcid":"https://orcid.org/0009-0001-3395-8181"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Wang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060659901","display_name":"Jinbo Xiong","orcid":"https://orcid.org/0000-0001-9985-1953"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinbo Xiong","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102255581"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":null,"apc_paid":null,"fwci":9.4254,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.98268406,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":"5","first_page":"3969","last_page":"3982"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9136999845504761,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7955459356307983},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.701061487197876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6659768223762512},{"id":"https://openalex.org/keywords/unavailability","display_name":"Unavailability","score":0.651197612285614},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4828908443450928},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.4741218388080597},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42901700735092163},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.42577847838401794},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.425426185131073},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.4231041669845581},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2204756736755371},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2182689905166626},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21684104204177856},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17849591374397278},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08794015645980835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7955459356307983},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.701061487197876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6659768223762512},{"id":"https://openalex.org/C2780505938","wikidata":"https://www.wikidata.org/wiki/Q17093282","display_name":"Unavailability","level":2,"score":0.651197612285614},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4828908443450928},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.4741218388080597},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42901700735092163},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.42577847838401794},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.425426185131073},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.4231041669845581},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2204756736755371},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2182689905166626},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21684104204177856},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17849591374397278},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08794015645980835},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3350365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3350365","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7699999809265137}],"awards":[{"id":"https://openalex.org/G132680173","display_name":null,"funder_award_id":"[2020]5017","funder_id":"https://openalex.org/F4320336617","funder_display_name":"Science and Technology Program of Guizhou Province"},{"id":"https://openalex.org/G4006813409","display_name":null,"funder_award_id":"62262058","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7339968161","display_name":null,"funder_award_id":"62272102","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8933663338","display_name":null,"funder_award_id":"[2022]065","funder_id":"https://openalex.org/F4320336617","funder_display_name":"Science and Technology Program of Guizhou Province"},{"id":"https://openalex.org/G968270831","display_name":null,"funder_award_id":"62272123","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336617","display_name":"Science and Technology Program of Guizhou Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1490653284","https://openalex.org/W1972284826","https://openalex.org/W2007339694","https://openalex.org/W2112796928","https://openalex.org/W2116665252","https://openalex.org/W2132172731","https://openalex.org/W2273387967","https://openalex.org/W2326245332","https://openalex.org/W2535690855","https://openalex.org/W2750384547","https://openalex.org/W2767072011","https://openalex.org/W2767079719","https://openalex.org/W2963540401","https://openalex.org/W2970606380","https://openalex.org/W2985527074","https://openalex.org/W2998977406","https://openalex.org/W3087391814","https://openalex.org/W3108672920","https://openalex.org/W3109723249","https://openalex.org/W3111919937","https://openalex.org/W3138597937","https://openalex.org/W3185309611","https://openalex.org/W3198262235","https://openalex.org/W3200805806","https://openalex.org/W3212539584","https://openalex.org/W3213597499","https://openalex.org/W4226047321","https://openalex.org/W4289656845","https://openalex.org/W4311166734","https://openalex.org/W4312056672","https://openalex.org/W4312646739","https://openalex.org/W4312731257","https://openalex.org/W4313142254","https://openalex.org/W4313563646","https://openalex.org/W4323065874","https://openalex.org/W4386280834","https://openalex.org/W6686674283","https://openalex.org/W6728757088","https://openalex.org/W6743688258","https://openalex.org/W6743821447","https://openalex.org/W6748786018","https://openalex.org/W6770634426","https://openalex.org/W6779821316","https://openalex.org/W6798563395"],"related_works":["https://openalex.org/W4237235066","https://openalex.org/W207884067","https://openalex.org/W3127016596","https://openalex.org/W2026539069","https://openalex.org/W2365973415","https://openalex.org/W2950475743","https://openalex.org/W4386603768","https://openalex.org/W2886711096","https://openalex.org/W1482423459","https://openalex.org/W3146085540"],"abstract_inverted_index":{"In":[0,155],"the":[1,72,118],"era":[2],"of":[3,50,120,144,164],"Web":[4,184],"3.0,":[5],"federated":[6,25,65],"learning":[7,26,66],"has":[8],"emerged":[9],"as":[10,151],"a":[11,63,80,140,162,179],"crucial":[12],"technical":[13],"method":[14,83],"in":[15],"resolving":[16],"conflicts":[17],"between":[18],"data":[19],"security":[20,119,125],"and":[21,38,53,104,112,127,134,153],"open":[22],"sharing.":[23],"However,":[24],"is":[27,172,178],"susceptible":[28],"to":[29,46,89,108,147,174],"various":[30],"malicious":[31,74],"behaviors,":[32],"including":[33],"inference":[34,97],"attacks,":[35,37],"poisoning":[36,110],"free-riding":[39,113],"attacks.":[40,75,98,114],"These":[41],"adversarial":[42],"activities":[43],"can":[44,70,158],"lead":[45],"privacy":[47,186],"breaches,":[48],"unavailability":[49],"global":[51],"models,":[52],"unfair":[54],"training":[55],"processes.":[56],"To":[57],"tackle":[58],"these":[59],"challenges,":[60],"we":[61,77,100,116],"propose":[62,79],"trustworthy":[64,180],"scheme":[67,122],"(TWFL)":[68],"that":[69,137,176],"resist":[71,109,161],"above":[73],"Specifically,":[76],"firstly":[78],"novel":[81],"adaptive":[82],"based":[84],"on":[85,132],"two-trapdoor":[86],"homomorphic":[87],"encryption":[88],"encrypt":[90],"gradients":[91],"uploaded":[92],"by":[93],"users,":[94],"thereby":[95],"resisting":[96],"Secondly,":[99],"design":[101],"confidence":[102],"calculation":[103,106],"contribution":[105],"mechanisms":[107],"attacks":[111,165],"Finally,":[115],"prove":[117,175],"our":[121],"through":[123,129],"formal":[124],"analysis,":[126],"demonstrate":[128],"experiments":[130],"conducted":[131],"MNIST":[133],"FASHIONMNIST":[135],"datasets":[136],"TWFL":[138,157],"achieves":[139],"higher":[141],"model":[142],"accuracy":[143],"2%\u20133%":[145],"compared":[146],"traditional":[148],"methods":[149],"such":[150],"Median":[152],"Trim-mean.":[154],"summary,":[156],"not":[159],"only":[160],"variety":[163],"but":[166],"also":[167],"ensure":[168],"improved":[169],"accuracy,":[170],"which":[171],"enough":[173],"it":[177],"solution":[181],"suitable":[182],"for":[183],"3.0":[185],"protection":[187],"scenarios.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":14}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
