{"id":"https://openalex.org/W4417169470","doi":"https://doi.org/10.1109/tsc.2025.3641964","title":"SEPP-FLBC: A Secure and Efficient Privacy Protection Scheme Using Federate Learning and Blockchain for Edge-End-Cloud Devices","display_name":"SEPP-FLBC: A Secure and Efficient Privacy Protection Scheme Using Federate Learning and Blockchain for Edge-End-Cloud Devices","publication_year":2025,"publication_date":"2025-12-09","ids":{"openalex":"https://openalex.org/W4417169470","doi":"https://doi.org/10.1109/tsc.2025.3641964"},"language":null,"primary_location":{"id":"doi:10.1109/tsc.2025.3641964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3641964","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Libo Feng","orcid":"https://orcid.org/0000-0001-7804-3535"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Libo Feng","raw_affiliation_strings":["Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China"],"raw_orcid":"https://orcid.org/0000-0001-7804-3535","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junwei Guo","orcid":"https://orcid.org/0009-0003-7947-2851"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junwei Guo","raw_affiliation_strings":["Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China"],"raw_orcid":"https://orcid.org/0009-0003-7947-2851","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112553402","display_name":"Fake Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fake Fang","raw_affiliation_strings":["Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101623518","display_name":"Zhenli He","orcid":"https://orcid.org/0000-0002-7986-2222"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenli He","raw_affiliation_strings":["Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China"],"raw_orcid":"https://orcid.org/0000-0002-7986-2222","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111330259","display_name":"Yimin Yu","orcid":"https://orcid.org/0009-0002-2839-8869"},"institutions":[{"id":"https://openalex.org/I49185572","display_name":"Yunnan University of Finance And Economics","ror":"https://ror.org/04rhev598","country_code":"CN","type":"education","lineage":["https://openalex.org/I49185572"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yimin Yu","raw_affiliation_strings":["School of Information, Yunnan University of Finance and Economics, Kunming, China"],"raw_orcid":"https://orcid.org/0009-0002-2839-8869","affiliations":[{"raw_affiliation_string":"School of Information, Yunnan University of Finance and Economics, Kunming, China","institution_ids":["https://openalex.org/I49185572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000436275","display_name":"Shaowen Yao","orcid":"https://orcid.org/0000-0003-1516-4246"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaowen Yao","raw_affiliation_strings":["Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China"],"raw_orcid":"https://orcid.org/0000-0003-1516-4246","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Cyberspace and the Yunnan Key Laboratory of Software Engineering, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xiaohui Peng","orcid":"https://orcid.org/0000-0003-2706-6379"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohui Peng","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2706-6379","affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I189210763"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20071245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"1","first_page":"657","last_page":"670"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9125999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9125999808311462,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.01810000091791153,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.012299999594688416,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7498999834060669},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.611299991607666},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.609000027179718},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5720999836921692},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5527999997138977},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5242999792098999},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4496999979019165},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4187000095844269},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.3822000026702881}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8723999857902527},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7498999834060669},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.611299991607666},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.609000027179718},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5720999836921692},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5527999997138977},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5242999792098999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5008999705314636},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4496999979019165},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4187000095844269},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3725000023841858},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3587999939918518},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.3474000096321106},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32120001316070557},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.30799999833106995},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3027999997138977},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2906999886035919},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.2870999872684479},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.27219998836517334},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.25440001487731934},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25130000710487366},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.25060001015663147},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2025.3641964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3641964","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1304786301","display_name":null,"funder_award_id":"62441214","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2890961286","display_name":null,"funder_award_id":"62462065","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7443881005","display_name":null,"funder_award_id":"62362068","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W2734358244","https://openalex.org/W2744353112","https://openalex.org/W2974429275","https://openalex.org/W2982409974","https://openalex.org/W3014517104","https://openalex.org/W3019945581","https://openalex.org/W3051272477","https://openalex.org/W3058760796","https://openalex.org/W3107632872","https://openalex.org/W3113075536","https://openalex.org/W3120721446","https://openalex.org/W3122294042","https://openalex.org/W3156173029","https://openalex.org/W3205478485","https://openalex.org/W3212036903","https://openalex.org/W4224231904","https://openalex.org/W4226407702","https://openalex.org/W4285153754","https://openalex.org/W4296045111","https://openalex.org/W4310050331","https://openalex.org/W4310055000","https://openalex.org/W4310055702","https://openalex.org/W4316660683","https://openalex.org/W4366607520","https://openalex.org/W4385486485","https://openalex.org/W4388068390","https://openalex.org/W4388756035","https://openalex.org/W4391341949","https://openalex.org/W4392158746","https://openalex.org/W4397001643","https://openalex.org/W4400188335","https://openalex.org/W4401508190","https://openalex.org/W4403936749"],"related_works":[],"abstract_inverted_index":{"The":[0],"convergence":[1,112],"of":[2,92],"federated":[3],"learning":[4],"(FL)":[5],"and":[6,29,45,54,69,85,120,139,149],"blockchain":[7,61],"in":[8,146],"edge-end-cloud":[9],"systems":[10],"offers":[11],"promising":[12],"opportunities":[13],"for":[14,33],"privacy-preserving":[15],"collaborative":[16],"intelligence.":[17],"However,":[18],"existing":[19],"blockchain-enhanced":[20],"FL":[21],"(BFL)":[22],"approaches":[23],"remain":[24],"vulnerable":[25],"to":[26,65,82,101,104,107,116],"malicious":[27],"participants":[28],"lack":[30],"robust":[31],"protection":[32],"model":[34,67,102,118],"updates.":[35],"To":[36],"address":[37],"these":[38],"issues,":[39],"we":[40],"propose":[41],"SEPP-FLBC,":[42],"a":[43,59,77],"Secure":[44],"Efficient":[46],"Privacy":[47],"Protection":[48],"framework":[49],"based":[50],"on":[51,125],"Federated":[52],"Learning":[53],"Blockchain":[55],"Committees.":[56],"SEPP-FLBC":[57,130],"introduces":[58],"novel":[60],"committee":[62],"consensus":[63],"mechanism":[64],"validate":[66],"updates":[68,103],"defend":[70],"against":[71],"unreliable":[72],"nodes.":[73],"It":[74],"further":[75],"employs":[76],"refined":[78],"multi-party":[79],"communication":[80,140],"paradigm":[81],"facilitate":[83],"indirect":[84],"secure":[86],"data":[87],"interactions,":[88],"reducing":[89],"the":[90],"risk":[91],"information":[93],"leakage.":[94],"Additionally,":[95],"differential":[96],"privacy":[97,137],"noise":[98],"is":[99,114],"applied":[100],"enhance":[105],"resistance":[106],"inference":[108],"attacks.":[109],"A":[110],"formal":[111],"analysis":[113],"conducted":[115],"ensure":[117],"stability":[119],"minimize":[121],"overhead.":[122],"Extensive":[123],"experiments":[124],"benchmark":[126],"datasets":[127],"demonstrate":[128],"that":[129],"achieves":[131],"superior":[132],"accuracy":[133],"while":[134],"maintaining":[135],"strong":[136],"guarantees":[138],"efficiency,":[141],"outperforming":[142],"state-of-the-art":[143],"BFL":[144],"methods":[145],"both":[147],"security":[148],"performance.":[150]},"counts_by_year":[],"updated_date":"2026-02-09T05:59:30.833894","created_date":"2025-12-09T00:00:00"}
