{"id":"https://openalex.org/W7131303118","doi":"https://doi.org/10.1109/tnsm.2026.3667167","title":"Privacy-Preserving Digital Publishing Framework for Next-Generation Communication Networks: A Verifiable Homomorphic Federated Learning Approach","display_name":"Privacy-Preserving Digital Publishing Framework for Next-Generation Communication Networks: A Verifiable Homomorphic Federated Learning Approach","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7131303118","doi":"https://doi.org/10.1109/tnsm.2026.3667167"},"language":null,"primary_location":{"id":"doi:10.1109/tnsm.2026.3667167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2026.3667167","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126682997","display_name":"Yanxu Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I85430964","display_name":"Jinzhou Medical University","ror":"https://ror.org/02yd1yr68","country_code":"CN","type":"education","lineage":["https://openalex.org/I85430964"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanxu Lin","raw_affiliation_strings":["Jinzhou Medical University, Jinzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Jinzhou Medical University, Jinzhou, China","institution_ids":["https://openalex.org/I85430964"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126699758","display_name":"Renzhong Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I85430964","display_name":"Jinzhou Medical University","ror":"https://ror.org/02yd1yr68","country_code":"CN","type":"education","lineage":["https://openalex.org/I85430964"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renzhong Zhong","raw_affiliation_strings":["Jinzhou Medical University, Jinzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Jinzhou Medical University, Jinzhou, China","institution_ids":["https://openalex.org/I85430964"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jingnan Xie","orcid":"https://orcid.org/0009-0003-6000-9234"},"institutions":[{"id":"https://openalex.org/I85430964","display_name":"Jinzhou Medical University","ror":"https://ror.org/02yd1yr68","country_code":"CN","type":"education","lineage":["https://openalex.org/I85430964"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingnan Xie","raw_affiliation_strings":["Jinzhou Medical University, Jinzhou, China"],"raw_orcid":"https://orcid.org/0009-0003-6000-9234","affiliations":[{"raw_affiliation_string":"Jinzhou Medical University, Jinzhou, China","institution_ids":["https://openalex.org/I85430964"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126672167","display_name":"Yueting Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I85430964","display_name":"Jinzhou Medical University","ror":"https://ror.org/02yd1yr68","country_code":"CN","type":"education","lineage":["https://openalex.org/I85430964"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueting Zhu","raw_affiliation_strings":["Jinzhou Medical University, Jinzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Jinzhou Medical University, Jinzhou, China","institution_ids":["https://openalex.org/I85430964"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126710001","display_name":"Byung-Gyu Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I31766871","display_name":"Sookmyung Women's University","ror":"https://ror.org/00vvvt117","country_code":"KR","type":"education","lineage":["https://openalex.org/I31766871"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byung-Gyu Kim","raw_affiliation_strings":["Sookmyung Women&#x2019;s University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0001-6555-3464","affiliations":[{"raw_affiliation_string":"Sookmyung Women&#x2019;s University, Seoul, South Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120988934","display_name":"Saru Kumari","orcid":null},"institutions":[{"id":"https://openalex.org/I303593345","display_name":"Chaudhary Charan Singh University","ror":"https://ror.org/01hzdv945","country_code":"IN","type":"education","lineage":["https://openalex.org/I303593345"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saru Kumari","raw_affiliation_strings":["Chaudhary Charan Singh University, Meerut, India"],"raw_orcid":"https://orcid.org/0000-0003-4929-5383","affiliations":[{"raw_affiliation_string":"Chaudhary Charan Singh University, Meerut, India","institution_ids":["https://openalex.org/I303593345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084680817","display_name":"Shakila Basheer","orcid":"https://orcid.org/0000-0001-9032-9560"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Shakila Basheer","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-9032-9560","affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084530422","display_name":"Fatimah Alhayan","orcid":"https://orcid.org/0000-0003-1982-4117"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Fatimah Alhayan","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-1982-4117","affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5126682997"],"corresponding_institution_ids":["https://openalex.org/I85430964"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3450333,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"3419","last_page":"3432"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.004600000102072954,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5461999773979187},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.42570000886917114},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.39570000767707825},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.37400001287460327},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.3659000098705292},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3610999882221222},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.35659998655319214},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.3314000070095062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8840000033378601},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5461999773979187},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.42570000886917114},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40959998965263367},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.39570000767707825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38989999890327454},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3840999901294708},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.37400001287460327},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.3659000098705292},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35659998655319214},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.3314000070095062},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.32899999618530273},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.32170000672340393},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.29269999265670776},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.28200000524520874},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.27639999985694885},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2540999948978424},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2531999945640564},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.25110000371932983},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2026.3667167","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2026.3667167","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Next-generation":[0],"communication":[1,28],"networks":[2],"are":[3],"revolutionizing":[4],"digital":[5,50,103],"publishing":[6,51,104],"through":[7,66],"intelligent":[8,98],"content":[9],"distribution":[10],"and":[11,30,37,63,96,116,197],"collaborative":[12],"optimization":[13],"capabilities.":[14],"However,":[15],"existing":[16],"federated":[17,46],"learning":[18,47],"approaches":[19],"face":[20],"fundamental":[21],"limitations,":[22],"including":[23],"trusted":[24,78],"third-party":[25,79],"dependencies,":[26],"excessive":[27],"overhead,":[29],"vulnerability":[31],"to":[32,149,159,183],"collusion":[33],"attacks":[34,181],"between":[35],"servers":[36],"participants.":[38],"This":[39],"paper":[40],"introduces":[41],"VHFL-DP,":[42],"a":[43,70],"verifiable":[44],"homomorphic":[45],"framework":[48,59,141],"for":[49,186],"environments":[52],"operating":[53],"within":[54],"6G":[55],"network":[56],"infrastructures.":[57],"The":[58,140],"addresses":[60],"critical":[61],"privacy":[62],"scalability":[64],"challenges":[65],"four":[67],"key":[68,73],"innovations:":[69],"distributed":[71],"cryptographic":[72],"generation":[74],"protocol":[75],"that":[76,89,101,125],"eliminates":[77],"requirements,":[80],"Chinese":[81],"remainder":[82],"theorem-based":[83],"dimensionality":[84],"reduction,":[85],"auxiliary":[86],"validation":[87],"nodes":[88],"enable":[90],"independent":[91],"verification":[92,144],"with":[93,130,172],"constant-time":[94],"complexity,":[95],"an":[97],"incentive":[99],"mechanism":[100],"rewards":[102],"platforms":[105],"based":[106],"on":[107,114],"objective":[108],"contribution":[109],"quality":[110],"metrics.":[111],"Experimental":[112],"evaluation":[113,168],"MNIST":[115],"Amazon":[117],"reviews":[118],"datasets":[119],"across":[120],"six":[121],"baseline":[122,138,187],"methods":[123],"demonstrates":[124],"VHFL-DP":[126],"achieves":[127],"superior":[128],"performance":[129],"accuracy":[131,177],"improvements":[132],"of":[133,153],"4.2%":[134],"over":[135],"the":[136],"best":[137],"method.":[139],"maintains":[142],"constant":[143],"time":[145],"ranging":[146],"from":[147,157],"2.73":[148],"2.91":[150],"seconds":[151],"regardless":[152],"platform":[154],"count,":[155],"increasing":[156],"ten":[158],"fifty,":[160],"or":[161],"dropout":[162],"rates":[163],"reaching":[164],"thirty":[165],"percent.":[166],"Security":[167],"reveals":[169],"strong":[170],"resilience":[171],"only":[173],"2.4":[174],"percentage":[175],"point":[176],"degradation":[178],"under":[179,201],"poisoning":[180],"compared":[182],"6.7-7.0":[184],"points":[185],"method,":[188],"inference":[189],"attack":[190],"success":[191],"near":[192],"random":[193],"guessing":[194],"at":[195],"51.3%,":[196],"92.4%":[198],"successful":[199],"aggregation":[200],"Byzantine":[202],"adversaries.":[203]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-02-25T00:00:00"}
