{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:16:50Z","timestamp":1759364210615,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032027245","type":"print"},{"value":"9783032027252","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02725-2_3","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:37:10Z","timestamp":1759279030000},"page":"27-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Resilience Under Attack: Benchmarking Optimizers Against Poisoning in\u00a0Federated Learning for\u00a0Image Classification Using CNN"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5808-1849","authenticated-orcid":false,"given":"Yohannes","family":"Biadgligne","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1943-1471","authenticated-orcid":false,"given":"Yassine","family":"Baghoussi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0517-2392","authenticated-orcid":false,"given":"Kai","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5475-1382","authenticated-orcid":false,"given":"Al\u00edpio","family":"Jorge","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,1]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"208518","DOI":"10.1109\/ACCESS.2020.3038676","volume":"8","author":"L Ahmed","year":"2020","unstructured":"Ahmed, L., Ahmad, K., Said, N., Qolomany, B., Qadir, J., Al-Fuqaha, A.: Active learning based federated learning for waste and natural disaster image classification. IEEE Access 8, 208518\u2013208531 (2020)","journal-title":"IEEE Access"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Alam, E.: Enhancing image classification with federated learning: a comparative study of VGG16 and MobileNet on CIFAR-10. SSRN 4813254 (2024)","DOI":"10.31224\/3720"},{"key":"3_CR3","unstructured":"Albahaca, J.: Federated machine learning architectures for image classification (2024)"},{"key":"3_CR4","unstructured":"Alparslan, Y., Alparslan, K., Keim-Shenk, J., Khade, S., Greenstadt, R.: Adversarial attacks on convolutional neural networks in facial recognition domain (2021). https:\/\/arxiv.org\/abs\/2001.11137"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Aryal, K., Gupta, M., Abdelsalam, M.: Analysis of label-flip poisoning attack on machine learning based malware detector. In: 2022 IEEE International Conference on Big Data (Big Data), pp. 4236\u20134245. IEEE (2022)","DOI":"10.1109\/BigData55660.2022.10020528"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dogo, E.M., Afolabi, O., Nwulu, N., Twala, B., Aigbavboa, C.: A comparative analysis of gradient descent-based optimization algorithms on convolutional neural networks. In: 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), pp. 92\u201399. IEEE (2018)","DOI":"10.1109\/CTEMS.2018.8769211"},{"key":"3_CR7","unstructured":"Felbab, V., Kiss, P., Horv\u00e1th, T.: Optimization in federated learning. In: ITAT, pp. 58\u201365 (2019)"},{"issue":"11","key":"3_CR8","doi-asserted-by":"publisher","first-page":"16591","DOI":"10.1007\/s11042-022-13820-0","volume":"82","author":"E Hassan","year":"2023","unstructured":"Hassan, E., Shams, M.Y., Hikal, N.A., Elmougy, S.: The effect of choosing optimizer algorithms to improve computer vision tasks: a comparative study. Multimedia Tools Appl. 82(11), 16591\u201316633 (2023)","journal-title":"Multimedia Tools Appl."},{"key":"3_CR9","unstructured":"He, C., Annavaram, M., Avestimehr, S.: Group knowledge transfer: federated learning of large CNNs at the edge (2020). https:\/\/arxiv.org\/abs\/2007.14513"},{"key":"3_CR10","unstructured":"Hsu, T.M.H., Qi, H., Brown, M.: Measuring the effects of non-identical data distribution for federated visual classification. arXiv preprint arXiv:1909.06335 (2019)"},{"key":"3_CR11","unstructured":"Koskela, A., Honkela, A.: Learning rate adaptation for federated and differentially private learning. arXiv preprint arXiv:1809.03832 (2018)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Li, D., Wong, W.E., Wang, W., Yao, Y., Chau, M.: Detection and mitigation of label-flipping attacks in federated learning systems with KPCA and K-means. In: 2021 8th International Conference on Dependable Systems and Their Applications (DSA), pp. 551\u2013559. IEEE (2021)","DOI":"10.1109\/DSA52907.2021.00081"},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TNNLS.2024.3394252","volume":"36","author":"K Li","year":"2025","unstructured":"Li, K., Yuan, X., Zheng, J., Ni, W., Dressler, F., Jamalipour, A.: Leverage variational graph representation for model poisoning on federated learning. IEEE Trans. Neural Netw. Learn. Syst. 36(1), 116\u2013128 (2025). https:\/\/doi.org\/10.1109\/TNNLS.2024.3394252","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"3_CR14","unstructured":"Li, K., Zhang, Z., Pourkabirian, A., Ni, W., Dressler, F., Akan, O.B.: Towards resilient federated learning in CyberEdge networks: recent advances and future trends (2025). https:\/\/arxiv.org\/abs\/2504.01240"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Li, K., Zheng, J., Yuan, X., Ni, W., Akan, O.B., Poor, H.V.: Data-agnostic model poisoning against federated learning: a graph autoencoder approach. IEEE Trans. Inf. Forensics Secur. 19, 3465\u20133480 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3362147","DOI":"10.1109\/TIFS.2024.3362147"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Maurya, M., Yadav, N.: A comparative analysis of gradient-based optimization methods for machine learning problems. In: Yadav, A., Gupta, G., Rana, P., Kim, J.H. (eds.) ICDAC 2022. LNDECT, vol. 175, pp. 85\u2013102. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-99-3432-4_7","DOI":"10.1007\/978-981-99-3432-4_7"},{"key":"3_CR17","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data (2023). https:\/\/arxiv.org\/abs\/1602.05629"},{"issue":"6","key":"3_CR18","doi-asserted-by":"publisher","first-page":"1804","DOI":"10.1109\/TC.2022.3212631","volume":"72","author":"J Mills","year":"2022","unstructured":"Mills, J., Hu, J., Min, G., Jin, R., Zheng, S., Wang, J.: Accelerating federated learning with a global biased optimiser. IEEE Trans. Comput. 72(6), 1804\u20131814 (2022)","journal-title":"IEEE Trans. Comput."},{"key":"3_CR19","unstructured":"Schmidt, R.M., Schneider, F., Hennig, P.: Descending through a crowded valley - benchmarking deep learning optimizers (2021). https:\/\/arxiv.org\/abs\/2007.01547"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-030-58951-6_24","volume-title":"Computer Security \u2013 ESORICS 2020","author":"V Tolpegin","year":"2020","unstructured":"Tolpegin, V., Truex, S., Gursoy, M.E., Liu, L.: Data poisoning attacks against federated learning systems. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 480\u2013501. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_24"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Vucovich, M., Quinn, D., Choi, K., Redino, C., Rahman, A., Bowen, E.: FedBayes: a zero-trust federated learning aggregation to defend against adversarial attacks. In: 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0028\u20130035. IEEE (2024)","DOI":"10.1109\/CCWC60891.2024.10427896"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Yao, K., Cao, X.: UAV land classification method based on federated learning. Acad. J. Comput. Inf. Sci. 5(7), 73\u201378 (2022)","DOI":"10.25236\/AJCIS.2022.050712"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Yazdinejad, A., Dehghantanha, A., Karimipour, H., Srivastava, G., Parizi, R.M.: A robust privacy-preserving federated learning model against model poisoning attacks. IEEE Trans. Inf. Forensics Secur. 19, 6693\u20136708 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3420126","DOI":"10.1109\/TIFS.2024.3420126"},{"key":"3_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118101","volume":"208","author":"FA Yerlikaya","year":"2022","unstructured":"Yerlikaya, F.A.: \u015eerif Bahtiyar: data poisoning attacks against machine learning algorithms. Expert Syst. Appl. 208, 118101 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.118101","journal-title":"Expert Syst. Appl."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Zaheer, R., Shaziya, H.: A study of the optimization algorithms in deep learning. In: 2019 Third International Conference on Inventive Systems and Control (ICISC), pp. 536\u2013539. IEEE (2019)","DOI":"10.1109\/ICISC44355.2019.9036442"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-IID data (2018). https:\/\/doi.org\/10.48550\/ARXIV.1806.00582. https:\/\/arxiv.org\/abs\/1806.00582","DOI":"10.48550\/ARXIV.1806.00582"},{"key":"3_CR27","unstructured":"Zhou, L., et al.: FedCAda: adaptive client-side optimization for accelerated and stable federated learning. arXiv preprint arXiv:2405.11811 (2024)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02725-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:37:21Z","timestamp":1759279041000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02725-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,1]]},"ISBN":["9783032027245","9783032027252"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02725-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,1]]},"assertion":[{"value":"1 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Work-Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"A Coru\u00f1a","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwann2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iwann.uma.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}