{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T03:15:04Z","timestamp":1769397304425,"version":"3.49.0"},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["420201152030"],"award-info":[{"award-number":["420201152030"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4252030"],"award-info":[{"award-number":["4252030"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272322"],"award-info":[{"award-number":["62272322"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008344","name":"Changchun Normal University","doi-asserted-by":"publisher","award":["JCKXYJY2019018"],"award-info":[{"award-number":["JCKXYJY2019018"]}],"id":[{"id":"10.13039\/501100008344","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1016\/j.neucom.2025.129975","type":"journal-article","created":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T13:27:50Z","timestamp":1742304470000},"page":"129975","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Privacy-preserving and Byzantine-robust federated broad learning with chain-loop structure"],"prefix":"10.1016","volume":"636","author":[{"given":"Nan","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7348-6337","authenticated-orcid":false,"given":"Chang-E","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Siyao","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2025.129975_b1","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"issue":"2","key":"10.1016\/j.neucom.2025.129975_b2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.neucom.2025.129975_b3","article-title":"Personalized federated learning with adaptive batchnorm for healthcare","author":"Lu","year":"2022","journal-title":"IEEE Trans. Big Data"},{"key":"10.1016\/j.neucom.2025.129975_b4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41666-020-00082-4","article-title":"Federated learning for healthcare informatics","volume":"5","author":"Xu","year":"2021","journal-title":"J. Heal. Inform. Res."},{"issue":"3","key":"10.1016\/j.neucom.2025.129975_b5","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1109\/COMST.2021.3090430","article-title":"Federated learning for internet of things: Recent advances, taxonomy, and open challenges","volume":"23","author":"Khan","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"10.1016\/j.neucom.2025.129975_b6","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated learning for internet of things: A comprehensive survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"10.1016\/j.neucom.2025.129975_b7","first-page":"1365","article-title":"Heterogeneous fairness algorithm based on federated learning in intelligent transportation system","volume":"21","author":"Jiang","year":"2021","journal-title":"J. Comput. Methods Sci. Eng."},{"issue":"1","key":"10.1016\/j.neucom.2025.129975_b8","doi-asserted-by":"crossref","first-page":"136","DOI":"10.3390\/electronics13010136","article-title":"Boppcl: Blockchain-enabled opportunistic federated learning applied in intelligent transportation systems","volume":"13","author":"Li","year":"2023","journal-title":"Electronics"},{"issue":"1\u20132","key":"10.1016\/j.neucom.2025.129975_b9","first-page":"1","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends\u00ae Mach. Learn."},{"key":"10.1016\/j.neucom.2025.129975_b10","series-title":"IEEE INFOCOM 2019-IEEE Conference on Computer Communications","first-page":"2512","article-title":"Beyond inferring class representatives: User-level privacy leakage from federated learning","author":"Wang","year":"2019"},{"issue":"4","key":"10.1016\/j.neucom.2025.129975_b11","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/MNET.001.1900506","article-title":"On safeguarding privacy and security in the framework of federated learning","volume":"34","author":"Ma","year":"2020","journal-title":"IEEE Netw."},{"key":"10.1016\/j.neucom.2025.129975_b12","series-title":"Idlg: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"key":"10.1016\/j.neucom.2025.129975_b13","series-title":"2023 IEEE International Conference on Systems, Man, and Cybernetics","first-page":"611","article-title":"Fbl-bp: Byzantine-resilient and privacy-preserving federated broad learning","author":"Cheng","year":"2023"},{"key":"10.1016\/j.neucom.2025.129975_b14","series-title":"Secure byzantine-robust machine learning","author":"He","year":"2020"},{"key":"10.1016\/j.neucom.2025.129975_b15","unstructured":"Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Gong, Local model poisoning attacks to {Byzantine-Robust} federated learning, in: 29th USENIX Security Symposium, 2020, pp. 1605\u20131622."},{"issue":"1","key":"10.1016\/j.neucom.2025.129975_b16","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/TSP.2008.2007335","article-title":"Distributed detection in the presence of byzantine attacks","volume":"57","author":"Marano","year":"2008","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/j.neucom.2025.129975_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2021.103561","article-title":"Privacy-preserving byzantine-robust federated learning","volume":"80","author":"Ma","year":"2022","journal-title":"Comput. Stand. Interfaces"},{"issue":"12","key":"10.1016\/j.neucom.2025.129975_b18","doi-asserted-by":"crossref","first-page":"3690","DOI":"10.1109\/TPDS.2022.3167434","article-title":"Differentially private byzantine-robust federated learning","volume":"33","author":"Ma","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.neucom.2025.129975_b19","series-title":"2018 IEEE Data Science Workshop","first-page":"21","article-title":"Byrdie: A byzantine-resilient distributed learning algorithm","author":"Yang","year":"2018"},{"key":"10.1016\/j.neucom.2025.129975_b20","series-title":"16th IEEE Computer Security Foundations Workshop, 2003. Proceedings","first-page":"234","article-title":"The diffie-hellman key-agreement scheme in the strand-space model","author":"Herzog","year":"2003"},{"key":"10.1016\/j.neucom.2025.129975_b21","series-title":"Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"Dwork","year":"2006"},{"key":"10.1016\/j.neucom.2025.129975_b22","series-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"10.1016\/j.neucom.2025.129975_b23","series-title":"Semi-supervised knowledge transfer for deep learning from private training data","author":"Papernot","year":"2016"},{"key":"10.1016\/j.neucom.2025.129975_b24","series-title":"2019 IEEE 35th International Conference on Data Engineering","first-page":"638","article-title":"Collecting and analyzing multidimensional data with local differential privacy","author":"Wang","year":"2019"},{"issue":"11","key":"10.1016\/j.neucom.2025.129975_b25","doi-asserted-by":"crossref","first-page":"8836","DOI":"10.1109\/JIOT.2020.3037194","article-title":"Local differential privacy-based federated learning for internet of things","volume":"8","author":"Zhao","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.neucom.2025.129975_b26","doi-asserted-by":"crossref","unstructured":"Stacey Truex, Ling Liu, Ka-Ho Chow, Mehmet Emre Gursoy, Wenqi Wei, Ldp-fed: Federated learning with local differential privacy, in: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, pp. 61\u201366.","DOI":"10.1145\/3378679.3394533"},{"issue":"15","key":"10.1016\/j.neucom.2025.129975_b27","doi-asserted-by":"crossref","first-page":"6762","DOI":"10.3390\/s23156762","article-title":"Healthlock: Blockchain-based privacy preservation using homomorphic encryption in internet of things healthcare applications","volume":"23","author":"Ali","year":"2023","journal-title":"Sensors"},{"issue":"4","key":"10.1016\/j.neucom.2025.129975_b28","doi-asserted-by":"crossref","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","article-title":"A systematic review of homomorphic encryption and its contributions in healthcare industry","volume":"9","author":"Munjal","year":"2023","journal-title":"Complex Intell. Syst."},{"issue":"4","key":"10.1016\/j.neucom.2025.129975_b29","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3390\/fi13040094","article-title":"Privacy preserving machine learning with homomorphic encryption and federated learning","volume":"13","author":"Fang","year":"2021","journal-title":"Futur. Internet"},{"key":"10.1016\/j.neucom.2025.129975_b30","article-title":"Secure federated learning with fully homomorphic encryption for iot communications","author":"Hijazi","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.neucom.2025.129975_b31","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TDSC.2023.3264697","article-title":"Privacy-preserving and byzantine-robust federated learning","volume":"21","author":"Dong","year":"2023","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"issue":"9","key":"10.1016\/j.neucom.2025.129975_b32","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1109\/TPDS.2006.128","article-title":"Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis","volume":"17","author":"Chen","year":"2006","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.neucom.2025.129975_b33","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2025.129975_b34","series-title":"International Conference on Machine Learning","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","author":"Yin","year":"2018"},{"key":"10.1016\/j.neucom.2025.129975_b35","series-title":"International Conference on Machine Learning","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","author":"Guerraoui","year":"2018"},{"key":"10.1016\/j.neucom.2025.129975_b36","series-title":"2021 IEEE Wireless Communications and Networking Conference Workshops","first-page":"1","article-title":"Blockchain empowered reliable federated learning by worker selection: A trustworthy reputation evaluation method","author":"Zhang","year":"2021"},{"issue":"2","key":"10.1016\/j.neucom.2025.129975_b37","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MWC.001.1900119","article-title":"Reliable federated learning for mobile networks","volume":"27","author":"Kang","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"10.1016\/j.neucom.2025.129975_b38","series-title":"2021 IEEE Symposium on Computers and Communications","first-page":"1","article-title":"Flphish: Reputation-based phishing byzantine defense in ensemble federated learning","author":"Li","year":"2021"},{"key":"10.1016\/j.neucom.2025.129975_b39","article-title":"A credible and fair federated learning framework based on blockchain","author":"Chen","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"issue":"1","key":"10.1016\/j.neucom.2025.129975_b40","doi-asserted-by":"crossref","first-page":"96","DOI":"10.3390\/e26010096","article-title":"Fedtkd: A trustworthy heterogeneous federated learning based on adaptive knowledge distillation","volume":"26","author":"Chen","year":"2024","journal-title":"Entropy"},{"issue":"1","key":"10.1016\/j.neucom.2025.129975_b41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.31577\/cai_2024_1_1","article-title":"Feddrl: Trustworthy federated learning model fusion method based on staged reinforcement learning","volume":"43","author":"Chen","year":"2024","journal-title":"Comput. Inform."},{"key":"10.1016\/j.neucom.2025.129975_b42","series-title":"IEEE INFOCOM 2024-IEEE Conference on Computer Communications","first-page":"141","article-title":"Br-defedrl: Byzantine-robust decentralized federated reinforcement learning with fast convergence and communication efficiency","author":"Qiao","year":"2024"},{"issue":"5","key":"10.1016\/j.neucom.2025.129975_b43","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/2.144401","article-title":"Functional-link net computing: theory, system architecture, and functionalities","volume":"25","author":"Pao","year":"1992","journal-title":"Computer"},{"issue":"2","key":"10.1016\/j.neucom.2025.129975_b44","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/0925-2312(94)90053-1","article-title":"Learning and generalization characteristics of the random vector functional-link net","volume":"6","author":"Pao","year":"1994","journal-title":"Neurocomputing"},{"issue":"1","key":"10.1016\/j.neucom.2025.129975_b45","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/TNNLS.2017.2716952","article-title":"Broad learning system: An effective and efficient incremental learning system without the need for deep architecture","volume":"29","author":"Chen","year":"2017","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.neucom.2025.129975_b46","series-title":"Efficient neighbor list creation for cellular networks","author":"Vela","year":"2011"},{"issue":"8","key":"10.1016\/j.neucom.2025.129975_b47","doi-asserted-by":"crossref","first-page":"6178","DOI":"10.1109\/JIOT.2020.3022911","article-title":"Privacy-preserving federated learning framework based on chained secure multiparty computing","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.neucom.2025.129975_b48","doi-asserted-by":"crossref","first-page":"3874","DOI":"10.1109\/TCYB.2021.3090260","article-title":"Federated continuous learning with broad network architecture","volume":"51","author":"Le","year":"2021","journal-title":"IEEE Trans. Cybern."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231225006472?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231225006472?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:27:25Z","timestamp":1769311645000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231225006472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":48,"alternative-id":["S0925231225006472"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2025.129975","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Privacy-preserving and Byzantine-robust federated broad learning with chain-loop structure","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2025.129975","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"129975"}}