{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T17:08:20Z","timestamp":1745428100630,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031697654"},{"type":"electronic","value":"9783031697661"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69766-1_31","type":"book-chapter","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T19:02:05Z","timestamp":1724612525000},"page":"454-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FLUK: Protecting Federated Learning Against Malicious Clients for\u00a0Internet of\u00a0Vehicles"],"prefix":"10.1007","author":[{"given":"Mengde","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Wanyi","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Jingyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zirui","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,26]]},"reference":[{"key":"31_CR1","unstructured":"Baruch, G., Baruch, M., Goldberg, Y.: A little is enough: circumventing defenses for distributed learning. In: NeurIPS 2019, pp. 8632\u20138642 (2019)"},{"key":"31_CR2","unstructured":"Bhagoji, A.N., Chakraborty, S., Mittal, P., et al.: Analyzing federated learning through an adversarial lens. In: ICML 2019, vol. 97, pp. 634\u2013643 (2019)"},{"key":"31_CR3","unstructured":"Bojarski, M., Del Testa, D., Dworakowski, D., et al.: End to end learning for self-driving cars. CoRR arXiv:1604.07316 (2016)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Buyval, A., Gabdullin, A., Mystafin, R., et al.: Realtime vehicle and pedestrian tracking for didi udacity self-driving car challenge. In: IEEE ICRA 2018, pp. 2064\u20132069 (2018)","DOI":"10.1109\/ICRA.2018.8460913"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Cao, X., Fang, M., Liu, J., et al.: FLTrust: byzantine-robust federated learning via trust bootstrapping. In: NDSS 2021 (2021)","DOI":"10.14722\/ndss.2021.24434"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Elbir, M., Soner, B., Coleri, S., et al.: Federated learning in vehicular networks. In: IEEE MeditCom 2022, pp. 72\u201377 (2022)","DOI":"10.1109\/MeditCom55741.2022.9928621"},{"key":"31_CR7","unstructured":"Eugene, B., Veit, A., Hua, Y., et al.: How to backdoor federated learning. In: PMLR AISTATS, vol. 108, pp. 2938\u20132948 (2020)"},{"key":"31_CR8","unstructured":"Fang, M., Cao, X., Jia, J., et al.: Local model poisoning attacks to byzantine-robust federated learning. In: USENIX Security 2020, pp. 1605\u20131622 (2020)"},{"key":"31_CR9","unstructured":"Fung, C., Yoon, C.J.M., Beschastnikh, I.: The limitations of federated learning in sybil settings. In: USENIX RAID 2020, pp. 301\u2013316 (2020)"},{"key":"31_CR10","unstructured":"McMahan, B., Moore, E., Ramage, D., et al.: Communication-efficient learning of deep networks from decentralized data. In: PMLR AISTATS 2017, vol. 54, pp. 1273\u20131282 (2017)"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"M\u00fcller, N.M., Kowatsch, D., B\u00f6ttinger, K.: Data poisoning attacks on regression learning and corresponding defenses. In: IEEE PRDC 2020, pp. 80\u201389 (2020)","DOI":"10.1109\/PRDC50213.2020.00019"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Wang, N., Xiao, Y., Chen, Y., et al.: FLARE: defending federated learning against model poisoning attacks via latent space representations. In: ACM ASIA CCS 2022, pp. 946\u2013958 (2022)","DOI":"10.1145\/3488932.3517395"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Cao, X., Jia, J., et al.: FLDetector: defending federated learning against model poisoning attacks via detecting malicious clients. In: ACM KDD 2022, pp. 2545\u20132555 (2022)","DOI":"10.1145\/3534678.3539231"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Zheng, X., Dong Q., Fu, A.: WMDefense: using watermark to defense byzantine attacks in federated learning. In: IEEE INFOCOM 2022 - Workshops, pp. 1\u20136 (2022)","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798217"},{"key":"31_CR15","unstructured":"Li, S., Cheng, Y., Wang, W., et al.: Learning to detect malicious clients for robust federated learning. CoRR arXiv:2002.00211 (2020)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Awan, S., Luo, B., Li, F.: CONTRA: defending against poisoning attacks in federated learning. In: ESORICS 2021, vol. 12972, pp. 455\u2013475 (2021)","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Shejwalkar, V., Houmansadr, A.: Manipulating the byzantine: optimizing model poisoning attacks and defenses for federated learning. In: NDSS 2021 (2021)","DOI":"10.14722\/ndss.2021.24498"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Yang, H., Zhang, X., Fang, M., et al.: Byzantine-resilient stochastic gradient descent for distributed learning: a lipschitz-inspired coordinate-wise median approach. In: IEEE CDC 2019, pp. 5832\u20135837 (2019)","DOI":"10.1109\/CDC40024.2019.9029245"},{"key":"31_CR19","unstructured":"Blanchard, P., Mhamdi, M., Guerraoui, R., et al.: Machine learning with adversaries: byzantine tolerant gradient descent. In: NuerIPS 2017, pp. 119\u2013129 (2017)"},{"key":"31_CR20","unstructured":"Yin, D., Chen, Y., Ramchandran, K., et al.: Byzantine-robust distributed learning: towards optimal statistical rates. In: ICML 2018, pp. 5636\u20135645 (2018)"},{"key":"31_CR21","unstructured":"Mhamdi, M., Guerraoui, R., Rouault, S., et al.: The hidden vulnerability of distributed learning in byzantium. In: ICML 2018, vol. 80, pp. 3518\u20133527 (2018)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2024: Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69766-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T19:11:46Z","timestamp":1724613106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69766-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031697654","9783031697661"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69766-1_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Euro-Par","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"europar2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.euro-par.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}