{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:11:43Z","timestamp":1769551903516,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811597381","type":"print"},{"value":"9789811597398","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9739-8_7","type":"book-chapter","created":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:05:09Z","timestamp":1604577909000},"page":"83-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Defending Poisoning Attacks in Federated Learning via Adversarial Training Method"],"prefix":"10.1007","author":[{"given":"Jiale","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Di","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chengyong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ribeiro, M., Grolinger, K., Capretz, M.A.: MLaaS: machine learning as a service. In: Proceedings of ICMLA, pp. 896\u2013902 (2015)","DOI":"10.1109\/ICMLA.2015.152"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Lim, W.Y.B.: Federated learning in mobile edge networks: a comprehensive survey. IEEE Commun. Surv. Tutorials (2020)","DOI":"10.1109\/COMST.2020.2986024"},{"key":"7_CR3","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of AISTATS, pp. 1\u201310 (2017)"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., Li, B.: Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. In: Proceedings of IEEE S&P, pp. 19\u201335 (2018)","DOI":"10.1109\/SP.2018.00057"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: Proceedings of IEEE S&P, pp. 691\u2013706 (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: Proceedings of IEEE S&P, pp. 793\u2013753 (2019)","DOI":"10.1109\/SP.2019.00065"},{"issue":"6","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/JBHI.2014.2344095","volume":"19","author":"M Mozaffari-Kermani","year":"2015","unstructured":"Mozaffari-Kermani, M., Sur-Kolay, S., Raghunathan, A., Jha, N.K.: Systematic Poisoning attacks on and defenses for machine learning in healthcare. IEEE J. Biomed. Health Inform. 19(6), 1893\u20131905 (2015)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"7_CR9","unstructured":"Shen, S., Tople, S., Saxena, P.: Auror: defending against poisoning attacks in collaborative deep learning systems. In: Proceedings of ACSAC, pp. 508\u2013519 (2016)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Baracaldo, N., Chen, B., Ludwig, H., Safavi, J.A.: Mitigating poisoning attacks on machine learning models: a data provenance based approach. In: Proceedings of ACM AISec, pp. 103\u2013110 (2017)","DOI":"10.1145\/3128572.3140450"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Han, B., Tsang, I.W., Chen, L.: On the convergence of a family of robust losses for stochastic gradient descent. In: Frasconi, P., Landwehr, N., Manco, G., Vreeken, J. (eds.) ECML PKDD, pp. 665\u2013680. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-46128-1_42","DOI":"10.1007\/978-3-319-46128-1_42"},{"key":"7_CR12","unstructured":"Steinhardt, J., Koh, P.W., Liang, P.S.: Certified defenses for data poisoning attacks. In: Proceedings of NIPS, pp. 3517\u20133529 (2017)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: Proceedings of IEEE S & P, pp. 707\u2013723 (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-030-38991-8_39","volume-title":"Algorithms and Architectures for Parallel Processing","author":"Y Zhao","year":"2020","unstructured":"Zhao, Y., Chen, J., Zhang, J., Wu, D., Teng, J., Yu, S.: PDGAN: a novel poisoning defense method in federated learning using generative adversarial network. In: Wen, S., Zomaya, A., Yang, L.T. (eds.) ICA3PP 2019. LNCS, vol. 11944, pp. 595\u2013609. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-38991-8_39"},{"key":"7_CR15","unstructured":"Hayes, J., Ohrimenko, O.: Contamination attacks and mitigation in multi-party machine learning. In: Proceedings of NIPS, pp. 6604\u20136616 (2018)"},{"key":"7_CR16","unstructured":"Louppe, G., Kagan, M. and Cranmer, K.: Learning to pivot with adversarial networks. In: Proceedings of NIPS, pp. 981\u2013990 (2017)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B.I., Tygar, J.D.: Adversarial machine learning. In: Proceedings of ACM AISec, pp. 43\u201358 (2011)","DOI":"10.1145\/2046684.2046692"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, J., Wu, D., Chen, B., Yu, S.: Poisoning attack in federated learning using generative adversarial nets. In: Proceedings of IEEE Trustcom, pp. 374\u2013380 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9739-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T12:06:14Z","timestamp":1604577974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9739-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811597381","9789811597398"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9739-8_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icfcs.com.cn\/fcs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}