{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T21:38:17Z","timestamp":1776807497295,"version":"3.51.2"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002766","name":"Beijing University of Posts and Telecommunications","doi-asserted-by":"publisher","award":["SKLNST-2024-1-06"],"award-info":[{"award-number":["SKLNST-2024-1-06"]}],"id":[{"id":"10.13039\/501100002766","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["72293583"],"award-info":[{"award-number":["72293583"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["72293580"],"award-info":[{"award-number":["72293580"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1016\/j.jnca.2025.104165","type":"journal-article","created":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T15:59:48Z","timestamp":1742054388000},"page":"104165","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":53,"special_numbering":"C","title":["CBRFL: A framework for Committee-based Byzantine-Resilient Federated Learning"],"prefix":"10.1016","volume":"238","author":[{"given":"Gang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Lele","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Yanhui","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Zongpeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9715-6076","authenticated-orcid":false,"given":"Kejia","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2025.104165_b1","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"vol. 30","author":"Blanchard","year":"2017"},{"key":"10.1016\/j.jnca.2025.104165_b2","doi-asserted-by":"crossref","first-page":"63229","DOI":"10.1109\/ACCESS.2021.3075203","article-title":"Vulnerabilities in federated learning","volume":"9","author":"Bouacida","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jnca.2025.104165_b3","doi-asserted-by":"crossref","unstructured":"Briggs, C., Fan, Z., Andras, P., 2020. Federated learning with hierarchical clustering of local updates to improve training on non-IID data. In: 2020 International Joint Conference on Neural Networks. IJCNN, pp. 1\u20139.","DOI":"10.1109\/IJCNN48605.2020.9207469"},{"key":"10.1016\/j.jnca.2025.104165_b4","series-title":"Fltrust: Byzantine-robust federated learning via trust bootstrapping","author":"Cao","year":"2020"},{"key":"10.1016\/j.jnca.2025.104165_b5","doi-asserted-by":"crossref","first-page":"4783","DOI":"10.1109\/TPDS.2022.3202887","article-title":"A decentralized federated learning framework via committee mechanism with convergence guarantee","volume":"33","author":"Che","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.jnca.2025.104165_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2021.100379","article-title":"A survey on deep learning and its applications","volume":"40","author":"Dong","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.jnca.2025.104165_b7","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N., 2020. Local model poisoning attacks to {Byzantine-Robust} federated learning. In: 29th USENIX Security Symposium. USENIX Security 20, pp. 1605\u20131622."},{"key":"10.1016\/j.jnca.2025.104165_b8","series-title":"Robust federated learning in a heterogeneous environment","author":"Ghosh","year":"2019"},{"key":"10.1016\/j.jnca.2025.104165_b9","series-title":"Distributed Applications and Interoperable Systems","first-page":"74","article-title":"Gossip learning as a decentralized alternative to federated learning","author":"Heged\u0171s","year":"2019"},{"key":"10.1016\/j.jnca.2025.104165_b10","series-title":"Decentralized federated learning: A segmented gossip approach","author":"Hu","year":"2019"},{"key":"10.1016\/j.jnca.2025.104165_b11","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2023.03.014","article-title":"LAFED: A lightweight authentication mechanism for blockchain-enabled federated learning system","volume":"145","author":"Ji","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2025.104165_b12","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/TITS.2019.2962338","article-title":"A survey of deep learning applications to autonomous vehicle control","volume":"22","author":"Kuutti","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.jnca.2025.104165_b13","author":"LeCun"},{"key":"10.1016\/j.jnca.2025.104165_b14","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/MNET.011.2000263","article-title":"A blockchain-based decentralized federated learning framework with committee consensus","volume":"35","author":"Li","year":"2021","journal-title":"IEEE Netw."},{"key":"10.1016\/j.jnca.2025.104165_b15","doi-asserted-by":"crossref","unstructured":"Li, Z., Liu, L., Zhang, J., Liu, J., 2021b. Byzantine-robust federated learning through spatial-temporal analysis of local model updates. In: 2021 IEEE 27th International Conference on Parallel and Distributed Systems. ICPADS, pp. 372\u2013379.","DOI":"10.1109\/ICPADS53394.2021.00052"},{"key":"10.1016\/j.jnca.2025.104165_b16","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"vol. 2","author":"Li","year":"2020"},{"key":"10.1016\/j.jnca.2025.104165_b17","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"vol. 54","author":"McMahan","year":"2017"},{"key":"10.1016\/j.jnca.2025.104165_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3578938","article-title":"Efficient deep learning: A survey on making deep learning models smaller, faster, and better","volume":"55","author":"Menghani","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jnca.2025.104165_b19","doi-asserted-by":"crossref","first-page":"5171","DOI":"10.1109\/JIOT.2020.2977383","article-title":"Decentralized privacy using blockchain-enabled federated learning in fog computing","volume":"7","author":"Qu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jnca.2025.104165_b20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3524104","article-title":"Blockchain-enabled federated learning: A survey","volume":"55","author":"Qu","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jnca.2025.104165_b21","doi-asserted-by":"crossref","first-page":"4449","DOI":"10.1109\/JIOT.2022.3218704","article-title":"Blockchain-based decentralized model aggregation for cross-silo federated learning in industry 4.0","volume":"10","author":"Ranathunga","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jnca.2025.104165_b22","series-title":"Computer Security \u2013 ESORICS 2020","first-page":"480","article-title":"Data poisoning attacks against federated learning systems","author":"Tolpegin","year":"2020"},{"key":"10.1016\/j.jnca.2025.104165_b23","doi-asserted-by":"crossref","first-page":"3305","DOI":"10.1109\/JSAC.2022.3213347","article-title":"A platform-free proof of federated learning consensus mechanism for sustainable blockchains","volume":"40","author":"Wang","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.jnca.2025.104165_b24","series-title":"Fedhyper: A universal and robust learning rate scheduler for federated learning with hypergradient descent","author":"Wang","year":"2023"},{"key":"10.1016\/j.jnca.2025.104165_b25","series-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"10.1016\/j.jnca.2025.104165_b26","doi-asserted-by":"crossref","first-page":"2530","DOI":"10.1109\/JIOT.2024.3468443","article-title":"A model value transfer incentive mechanism for federated learning with smart contracts in AIoT","volume":"12","author":"Xu","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jnca.2025.104165_b27","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume":"vol. 80","author":"Yin","year":"2018"},{"key":"10.1016\/j.jnca.2025.104165_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3158369","article-title":"Security and privacy on blockchain","volume":"52","author":"Zhang","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jnca.2025.104165_b29","doi-asserted-by":"crossref","first-page":"1817","DOI":"10.1109\/JIOT.2020.3017377","article-title":"Privacy-preserving blockchain-based federated learning for IoT devices","volume":"8","author":"Zhao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jnca.2025.104165_b30","doi-asserted-by":"crossref","first-page":"73","DOI":"10.3390\/fi13030073","article-title":"Deep model poisoning attack on federated learning","volume":"13","author":"Zhou","year":"2021","journal-title":"Futur. Internet"}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804525000621?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804525000621?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T17:36:21Z","timestamp":1762364181000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804525000621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":30,"alternative-id":["S1084804525000621"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2025.104165","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"CBRFL: A framework for Committee-based Byzantine-Resilient Federated Learning","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2025.104165","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104165"}}