{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:14:55Z","timestamp":1742973295698,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031804076"},{"type":"electronic","value":"9783031804083"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80408-3_9","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T10:30:18Z","timestamp":1733999418000},"page":"129-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DLShield: A Defense Approach Against Dirty Label Attacks in\u00a0Heterogeneous Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3152-5568","authenticated-orcid":false,"given":"K. M.","family":"Sameera","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5403-898X","authenticated-orcid":false,"given":"M.","family":"Abhinav","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4017-5486","authenticated-orcid":false,"given":"P. P.","family":"Amal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5367-2825","authenticated-orcid":false,"given":"T. Babu","family":"Abhiram","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5658-3033","authenticated-orcid":false,"given":"Raj K.","family":"Abishek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0428-1885","authenticated-orcid":false,"given":"Tomichen","family":"Amal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1819-7787","authenticated-orcid":false,"given":"P.","family":"Anaina","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6078-2014","authenticated-orcid":false,"given":"P.","family":"Vinod","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7330-1178","authenticated-orcid":false,"given":"Rehiman K. A.","family":"Rafidha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Conti","family":"Mauro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3624010","volume":"56","author":"M Rigaki","year":"2023","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM Comput. Surv. 56(4), 1\u201334 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"7","key":"9_CR2","doi-asserted-by":"publisher","first-page":"5476","DOI":"10.1109\/JIOT.2020.3030072","volume":"8","author":"S AbdulRahman","year":"2020","unstructured":"AbdulRahman, S., Tout, H., Ould-Slimane, H., Mourad, A., Talhi, C., Guizani, M.: A survey on federated learning: the journey from centralized to distributed on-site learning and beyond. IEEE Internet Things J. 8(7), 5476\u20135497 (2020)","journal-title":"IEEE Internet Things J."},{"key":"9_CR3","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Ag\u00fcera y\u00a0Arcas, B.: Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629, 2:2 (2016)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri, V., Parizi, R.M., Pouriyeh, S., Huang, Y., Dehghantanha, A., Srivastava, G.: A survey on security and privacy of federated learning. Future Generation Comput. Syst. 115, 619\u2013640 (2021)","journal-title":"Future Generation Comput. Syst."},{"key":"9_CR5","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: International conference on artificial intelligence and statistics, pp. 2938\u20132948. PMLR (2020)"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.inffus.2022.09.011","volume":"90","author":"N Rodr\u00edguez-Barroso","year":"2023","unstructured":"Rodr\u00edguez-Barroso, N., Jim\u00e9nez-L\u00f3pez, D., Victoria Luz\u00f3n, M., Herrera, F., Mart\u00ednez-C\u00e1mara, E.: Survey on federated learning threats: concepts, taxonomy on attacks and defences, experimental study and challenges. Inf. Fusion 90, 148\u2013173 (2023)","journal-title":"Inf. Fusion"},{"key":"9_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121192","volume":"235","author":"H Kasyap","year":"2024","unstructured":"Kasyap, H., Tripathy, S.: Beyond data poisoning in federated learning. Expert Syst. Appl. 235, 121192 (2024)","journal-title":"Expert Syst. Appl."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Tolpegin, V., Truex, S., Gursoy, M.E., Liu, L.: Data poisoning attacks against federated learning systems. In: Computer Security\u2013ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I 25, pp. 480\u2013501. Springer (2020)","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Zang, L., Li, Y.: Detection and mitigation of label-flipping attacks in fl systems with kl divergence. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3424188"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"M\u00fcller, N., Kowatsch, D., B\u00f6ttinger, K.: Data poisoning attacks on regression learning and corresponding defenses. In: 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 80\u201389. IEEE (2020)","DOI":"10.1109\/PRDC50213.2020.00019"},{"key":"9_CR11","unstructured":"Blanchard, P., El\u00a0Mhamdi, E.M., Guerraoui, R., Stainer, J.: Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in neural information processing systems, 30 (2017)"},{"key":"9_CR12","unstructured":"Yin, D., Chen, Y., Kannan, R., Bartlett, P.: Byzantine-robust distributed learning: towards optimal statistical rates. In: International Conference on Machine Learning, pp. 5650\u20135659. Pmlr (2018)"},{"key":"9_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119784","volume":"653","author":"X Lina Ni","year":"2024","unstructured":"Lina Ni, X., Gong, J.L., Tang, Y., Luan, Z., Zhang, J.: rfedfw: Secure and trustable aggregation scheme for byzantine-robust federated learning in internet of things. Inf. Sci. 653, 119784 (2024)","journal-title":"Inf. Sci."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Jebreel, N.M., Domingo-Ferrer, J.: Fl-defender: combating targeted attacks in federated learning. Knowl.-Based Syst. 260, 110178 (2023)","DOI":"10.1016\/j.knosys.2022.110178"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Awan, S., Luo, B., Li, F.: Contra: defending against poisoning attacks in federated learning. In: Computer Security\u2013ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4\u20138, 2021, Proceedings, Part I 26, pp. 455\u2013475. Springer (2021)","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"9_CR16","unstructured":"Fung, C., Yoon, C.J.M., Beschastnikh, I.: Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866 (2018)"},{"key":"9_CR17","volume-title":"An experimental study of byzantine-robust aggregation schemes in federated learning","author":"S Li","year":"2023","unstructured":"Li, S., Ngai, E.C.-H., Voigt, T.: An experimental study of byzantine-robust aggregation schemes in federated learning. IEEE Trans, Big Data (2023)"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"1212","DOI":"10.1109\/JIOT.2021.3079104","volume":"9","author":"Z Song","year":"2021","unstructured":"Song, Z., Sun, H., Yang, H.H., Wang, X., Zhang, Y., Quek, T.Q.S.: Reputation-based federated learning for secure wireless networks. IEEE Internet Things J. 9(2), 1212\u20131226 (2021)","journal-title":"IEEE Internet Things J."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Li, P., Al\u00a0Hammadi, A.Y., Guo, F., Damiani, E., Yeun, C.Y.: Reputation-based federated learning defense to mitigate threats in eeg signal classification. In: 2024 16th International Conference on Computer and Automation Engineering (ICCAE), pp. 173\u2013180. IEEE (2024)","DOI":"10.1109\/ICCAE59995.2024.10569874"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.future.2024.01.005","volume":"154","author":"G Luo","year":"2024","unstructured":"Luo, G., Chen, N., He, J., Jin, B., Zhang, Z., Li, Y.: Privacy-preserving clustering federated learning for non-iid data. Futur. Gener. Comput. Syst. 154, 384\u2013395 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9_CR21","unstructured":"Fung, C., Yoon, C.J.M., Beschastnikh, I.: The limitations of federated learning in sybil settings. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pp. 301\u2013316 (2020)"},{"key":"9_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103270","volume":"130","author":"P Gupta","year":"2023","unstructured":"Gupta, P., Yadav, K., Gupta, B.B., Alazab, M., Gadekallu, T.R.: A novel data poisoning attack in federated learning based on inverted loss function. Comput. Secur. 130, 103270 (2023)","journal-title":"Comput. Secur."},{"key":"9_CR23","unstructured":"Bhagoji, A.N., Chakraborty, S., Mittal, P., Calo, S.: Analyzing federated learning through an adversarial lens. In: International Conference on Machine Learning, pp. 634\u2013643. PMLR (2019)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, J., Wu, D., Chen, B., Yu, S.: Poisoning attack in federated learning using generative adversarial nets. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 374\u2013380. IEEE (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Li, D., Wong, W.E., Wang, W., Yao, Y., Chau, M.: Detection and mitigation of label-flipping attacks in federated learning systems with kpca and k-means. In: 2021 8th International Conference on Dependable Systems and Their Applications (DSA), pp. 551\u2013559. IEEE (2021)","DOI":"10.1109\/DSA52907.2021.00081"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1109\/TIFS.2023.3249568","volume":"18","author":"Y Jiang","year":"2023","unstructured":"Jiang, Y., Zhang, W., Chen, Y.: Data quality detection mechanism against label flipping attacks in federated learning. IEEE Trans. Inf. Forensics Secur. 18, 1625\u20131637 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR27","volume-title":"Dpfla: defending private federated learning against poisoning attacks","author":"X Feng","year":"2024","unstructured":"Feng, X., Cheng, W., Cao, C., Wang, L., Sheng, V.S.: Dpfla: defending private federated learning against poisoning attacks. IEEE Trans, Services Comput (2024)"},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.neunet.2023.11.019","volume":"170","author":"NM Jebreel","year":"2024","unstructured":"Jebreel, N.M., Domingo-Ferrer, J., S\u00e1nchez, D., Blanco-Justicia, A.: Lfighter: defending against the label-flipping attack in federated learning. Neural Netw. 170, 111\u2013126 (2024)","journal-title":"Neural Netw."},{"key":"9_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102827","volume":"121","author":"A Qayyum","year":"2022","unstructured":"Qayyum, A., Janjua, M.U., Qadir, J.: Making federated learning robust to adversarial attacks by learning data and model association. Comput. Secur. 121, 102827 (2022)","journal-title":"Comput. Secur."},{"key":"9_CR30","unstructured":"Steinhardt, J., Koh, P.W.W., Liang, P.S.: Certified defenses for data poisoning attacks. Advances in neural information processing systems 30 (2017)"},{"key":"9_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3420126","volume-title":"A robust privacy-preserving federated learning model against model poisoning attacks","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad, A., Dehghantanha, A., Karimipour, H., Srivastava, G., Parizi, R.M.: A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans. Inform, Forensics Secur (2024)"},{"key":"9_CR32","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1016\/j.ins.2022.07.104","volume":"609","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Zhang, J., Yeo, C.K.: Privacy-preserving knowledge transfer for intrusion detection with federated deep autoencoding gaussian mixture model. Inf. Sci. 609, 1204\u20131220 (2022)","journal-title":"Inf. Sci."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhang, J., Yeo, C.K.: Network anomaly detection using federated deep autoencoding gaussian mixture model. In: International Conference on Machine Learning for Networking, pp. 1\u201314. Springer (2019)","DOI":"10.1007\/978-3-030-45778-5_1"},{"key":"9_CR34","unstructured":"Zong, B., Song, Q., Min, M.R., Cheng, W., Lumezanu, C., Cho, D., Chen, H.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations (2018)"},{"key":"9_CR35","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to Byzantine-Robust federated learning. In: 29th USENIX security symposium (USENIX Security 20), pp. 1605\u20131622 (2020)"},{"key":"9_CR36","volume-title":"Feddef: defense against gradient leakage in federated learning-based network intrusion detection systems","author":"J Chen","year":"2023","unstructured":"Chen, J., Zhao, Y., Li, Q., Feng, Q., Xu, K.: Feddef: defense against gradient leakage in federated learning-based network intrusion detection systems. IEEE Trans. Inf. Forens, Secu (2023)"},{"key":"9_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103098","volume":"127","author":"N Rust-Nguyen","year":"2023","unstructured":"Rust-Nguyen, N., Sharma, S., Stamp, M.: Darknet traffic classification and adversarial attacks using machine learning. Comput. Secur. 127, 103098 (2023)","journal-title":"Comput. Secur."},{"key":"9_CR38","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.neucom.2021.07.098","volume":"465","author":"H Zhu","year":"2021","unstructured":"Zhu, H., Jinjin, X., Liu, S., Jin, Y.: Federated learning on non-iid data: A survey. Neurocomputing 465, 371\u2013390 (2021)","journal-title":"Neurocomputing"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Wazzeh, M., Ould-Slimane, H., Talhi, C., Mourad, A., Guizani, A.: Warmup and transfer knowledge-based federated learning approach for iot continuous authentication. arXiv preprint arXiv:2211.05662 (2022)","DOI":"10.1109\/CSNet59123.2023.10339744"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80408-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:55:14Z","timestamp":1741247714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80408-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9783031804076","9783031804083"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80408-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kottayam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2024.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}