{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T04:30:32Z","timestamp":1777523432314,"version":"3.51.4"},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172042"],"award-info":[{"award-number":["62172042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFC2006204"],"award-info":[{"award-number":["2020YFC2006204"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1016\/j.eswa.2022.119036","type":"journal-article","created":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T04:29:09Z","timestamp":1666067349000},"page":"119036","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":84,"special_numbering":"PB","title":["Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications"],"prefix":"10.1016","volume":"213","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7597-1184","authenticated-orcid":false,"given":"Junbao","family":"Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3087-9701","authenticated-orcid":false,"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1572-068X","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5131-6441","authenticated-orcid":false,"given":"Lu","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5166-4873","authenticated-orcid":false,"given":"Thar","family":"Baker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3369-1429","authenticated-orcid":false,"given":"Zhixiong","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2022.119036_b1","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.inffus.2020.06.008","article-title":"A smart healthcare monitoring system for heart disease prediction based on ensemble deep learning and feature fusion","volume":"63","author":"Ali","year":"2020","journal-title":"Information Fusion"},{"key":"10.1016\/j.eswa.2022.119036_b2","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Aono","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2022.119036_b3","series-title":"Proceedings of the 2019 ACM SIGSAC conference on computer and communications security","first-page":"2561","article-title":"Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain","author":"Awan","year":"2019"},{"key":"10.1016\/j.eswa.2022.119036_b4","series-title":"International conference on artificial intelligence and statistics","first-page":"2938","article-title":"How to backdoor federated learning","author":"Bagdasaryan","year":"2020"},{"key":"10.1016\/j.eswa.2022.119036_b5","series-title":"Proceedings of the 2017 ACM SIGSAC conference on computer and communications security","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz","year":"2017"},{"key":"10.1016\/j.eswa.2022.119036_b6","series-title":"28th {USENIX} security symposium ({USENIX} security 19)","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","author":"Carlini","year":"2019"},{"key":"10.1016\/j.eswa.2022.119036_b7","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.eswa.2022.119036_b8","series-title":"2016 IEEE conference on computer vision and pattern recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.eswa.2022.119036_b9","series-title":"Proceedings of the 2017 ACM SIGSAC conference on computer and communications security","first-page":"603","article-title":"Deep models under the GAN: information leakage from collaborative deep learning","author":"Hitaj","year":"2017"},{"key":"10.1016\/j.eswa.2022.119036_b10","series-title":"NDSS","article-title":"Trojaning attack on neural networks","author":"Liu","year":"2018"},{"key":"10.1016\/j.eswa.2022.119036_b11","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial IoT","volume":"16","author":"Lu","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.eswa.2022.119036_b12","series-title":"Artificial intelligence and statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.eswa.2022.119036_b13","series-title":"2019 IEEE symposium on security and privacy","first-page":"691","article-title":"Exploiting unintended feature leakage in collaborative learning","author":"Melis","year":"2019"},{"key":"10.1016\/j.eswa.2022.119036_b14","doi-asserted-by":"crossref","first-page":"2848","DOI":"10.1109\/TIFS.2022.3196274","article-title":"Privacy-preserving Byzantine-robust federated learning via blockchain systems","volume":"17","author":"Miao","year":"2022","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2022.119036_b15","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.eswa.2022.119036_b16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.future.2019.10.043","article-title":"HealthFog: An ensemble deep learning based smart healthcare system for automatic diagnosis of heart diseases in integrated IoT and fog computing environments","volume":"104","author":"Tuli","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.eswa.2022.119036_b17","article-title":"User-level privacy-preserving federated learning: Analysis and performance optimization","author":"Wei","year":"2021","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10.1016\/j.eswa.2022.119036_b18","series-title":"2020 IEEE international conference on artificial intelligence and computer applications","first-page":"217","article-title":"Fedbc: Blockchain-based decentralized federated learning","author":"Wu","year":"2020"},{"key":"10.1016\/j.eswa.2022.119036_b19","series-title":"International conference on learning representations","article-title":"Dba: Distributed backdoor attacks against federated learning","author":"Xie","year":"2019"},{"key":"10.1016\/j.eswa.2022.119036_b20","series-title":"2019 IEEE international conference on data mining","first-page":"668","article-title":"Privacy-preserving auto-driving: a GAN-based approach to protect vehicular camera data","author":"Xiong","year":"2019"},{"key":"10.1016\/j.eswa.2022.119036_b21","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","article-title":"Verifynet: Secure and verifiable federated learning","volume":"15","author":"Xu","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.eswa.2022.119036_b22","series-title":"International petroleum technology conference","article-title":"Smart autopilot drone system for surface surveillance and anomaly detection via customizable deep neural network","author":"Zhai","year":"2020"},{"key":"10.1016\/j.eswa.2022.119036_b23","series-title":"2020 USENIX annual technical conference","first-page":"493","article-title":"Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning","author":"Zhang","year":"2020"},{"key":"10.1016\/j.eswa.2022.119036_b24","first-page":"1","article-title":"Aggregation service for federated learning: An efficient, secure, and more resilient realization","author":"Zheng","year":"2022","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10.1016\/j.eswa.2022.119036_b25","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2022.3174394","article-title":"PFLF: Privacy-preserving federated learning framework for edge computing","volume":"17","author":"Zhou","year":"2022","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417422020541?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417422020541?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:10:02Z","timestamp":1760681402000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417422020541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":25,"alternative-id":["S0957417422020541"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2022.119036","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2022.119036","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"119036"}}