{"id":"https://openalex.org/W7127293233","doi":"https://doi.org/10.48550/arxiv.2602.01185","title":"FedBGS: A Blockchain Approach to Segment Gossip Learning in Decentralized Systems","display_name":"FedBGS: A Blockchain Approach to Segment Gossip Learning in Decentralized Systems","publication_year":2026,"publication_date":"2026-02-01","ids":{"openalex":"https://openalex.org/W7127293233","doi":"https://doi.org/10.48550/arxiv.2602.01185"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.01185","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.01185","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.01185","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124879109","display_name":"Fabio Turazza","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Turazza, Fabio","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121400711","display_name":"Marcello Pietri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pietri, Marcello","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123349802","display_name":"Marco Picone","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Picone, Marco","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122930766","display_name":"Marco Mamei","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mamei, Marco","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124879109"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.010300000198185444,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.003599999938160181,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.6644999980926514},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5985000133514404},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5644999742507935},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5184000134468079},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5001999735832214},{"id":"https://openalex.org/keywords/gossip-protocol","display_name":"Gossip protocol","score":0.46140000224113464},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.40230000019073486},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3871000111103058}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8068000078201294},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.6644999980926514},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5985000133514404},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5644999742507935},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5184000134468079},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5001999735832214},{"id":"https://openalex.org/C145928361","wikidata":"https://www.wikidata.org/wiki/Q5587504","display_name":"Gossip protocol","level":3,"score":0.46140000224113464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4603999853134155},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40230000019073486},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3871000111103058},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3305000066757202},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.33009999990463257},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32749998569488525},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.29440000653266907},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.26669999957084656},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2547000050544739},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.01185","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.01185","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.01185","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.01185","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5174973607063293,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Privacy-Preserving":[0],"Federated":[1,102,138,166],"Learning":[2,136],"(PPFL)":[3],"is":[4,58],"a":[5,17,45,59,79,110,127],"Decentralized":[6,129],"machine":[7],"learning":[8],"paradigm":[9],"that":[10,132],"enables":[11],"multiple":[12],"participants":[13],"to":[14,32,85,114,144],"collaboratively":[15],"train":[16],"global":[18,38,88],"model":[19,74],"without":[20],"sharing":[21],"their":[22],"data":[23,56,163],"with":[24,78],"the":[25,34,37,87,92,95,100,104,107],"integration":[26],"of":[27,36,94,106,119,155],"cryptographic":[28],"and":[29,72,121,161],"privacy-based":[30],"techniques":[31],"enhance":[33],"security":[35,120,160],"system.":[39],"This":[40,123],"privacy-oriented":[41],"approach":[42],"makes":[43],"PPFL":[44],"highly":[46],"suitable":[47],"solution":[48],"for":[49],"training":[50],"shared":[51,77],"models":[52,66],"in":[53,99,117,165],"sectors":[54],"where":[55],"privacy":[57,97],"critical":[60],"concern.":[61],"In":[62],"traditional":[63],"FL,":[64],"local":[65],"are":[67,76],"trained":[68],"on":[69],"edge":[70],"devices,":[71],"only":[73],"updates":[75],"central":[80],"server,":[81],"which":[82],"aggregates":[83],"them":[84],"improve":[86],"model.":[89],"However,":[90],"despite":[91],"presence":[93],"aforementioned":[96],"techniques,":[98],"classical":[101],"structure,":[103],"issue":[105],"server":[108],"as":[109],"single-point-of-failure":[111],"remains,":[112],"leading":[113],"limitations":[115],"both":[116,158],"terms":[118],"scalability.":[122],"paper":[124],"introduces":[125],"FedBGS,":[126],"fully":[128],"Blockchain-based":[130],"framework":[131],"leverages":[133],"Segmented":[134],"Gossip":[135],"through":[137],"Analytics.":[139],"The":[140],"proposed":[141],"system":[142],"aims":[143],"optimize":[145],"blockchain":[146],"usage":[147],"while":[148],"providing":[149],"comprehensive":[150],"protection":[151],"against":[152],"all":[153],"types":[154],"attacks,":[156],"ensuring":[157],"privacy,":[159],"non-IID":[162],"handling":[164],"environments.":[167]},"counts_by_year":[],"updated_date":"2026-02-04T23:14:21.375766","created_date":"2026-02-04T00:00:00"}
