{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T06:26:22Z","timestamp":1773815182761,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s00607-026-01646-9","type":"journal-article","created":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:33:26Z","timestamp":1773812006000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FedDefuse: a data-free self-training framework for reliable open-world federated defense"],"prefix":"10.1007","volume":"108","author":[{"given":"Hongxin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Turab","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Diao","sequence":"additional","affiliation":[]},{"given":"Farhan","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,18]]},"reference":[{"key":"1646_CR1","unstructured":"McMahan HB, Moore E, Ramage D, Hampson S, y\u00a0Arcas BA (2017) Communication-Efficient Learning of Deep Networks from Decentralized Data. In: Proceedings of international conference on artificial intelligence and statistics (AISTATS), PMLR, vol.\u00a054, pp\u00a01273\u20131282"},{"key":"1646_CR2","unstructured":"Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V (2020) How to backdoor federated learning. In: Proceedings of international conference on artificial intelligence and statistics (AISTATS), PMLR, vol.\u00a0108, pp\u00a02938\u20132948"},{"key":"1646_CR3","unstructured":"Xie C, Huang K, Chen P-Y, Li B (2020) DBA: distributed backdoor attacks against federated learning. In: Proceedings of international conference on learning representations (ICLR)"},{"key":"1646_CR4","unstructured":"Fang M, Cao X, Jia J, Gong NZ (2020) Local model poisoning attacks to byzantine-robust federated learning. In: Proceedings of USENIX security symposium (USENIX Security), pp\u00a01623\u20131640"},{"key":"1646_CR5","unstructured":"Blanchard P, El\u00a0Mhamdi EM, Guerraoui R, Stainer J (2017) Machine Learning with adversaries: byzantine tolerant gradient descent. Adv Neural Inf Process Syst (NeurIPS) 30:1\u201311"},{"key":"1646_CR6","unstructured":"Yin D, Chen Y, Ramchandran K, Bartlett P (2018) Byzantine-robust distributed learning: towards optimal statistical rates. In: Proceedings of international conference on machine learning (ICML), PMLR, vol.\u00a080, pp\u00a05650\u20135659"},{"key":"1646_CR7","unstructured":"Zhao Y, Li M, Lai L, Suda N, Civin D, Chandra V (2018) Federated learning with non-IID data. arXiv preprint arXiv:1806.00582"},{"key":"1646_CR8","unstructured":"Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2020) Federated optimization in heterogeneous networks. In: Proceedings conference on Machine Learning and Systems (MLSys)"},{"key":"1646_CR9","unstructured":"Jothimurugesan E, Hsieh K, Wang J, Joshi G, Gibbons PB (2023) federated learning under distributed concept drift. In: Proceedings of international conference on artificial intelligence and statistics (AISTATS), PMLR, vol.\u00a0206, pp\u00a05834\u20135853"},{"key":"1646_CR10","doi-asserted-by":"crossref","unstructured":"Cao X, Fang M, Liu J, Gong NZ (2021) FLTrust: byzantine-robust federated learning via trust bootstrapping. In: Proceedings of network and distributed system security symposium (NDSS)","DOI":"10.14722\/ndss.2021.24434"},{"key":"1646_CR11","doi-asserted-by":"crossref","unstructured":"Zhang Z, Cao X, Jia J, Gong NZ (2022) FLDetector: defending federated learning against model poisoning attacks via detecting malicious clients. In: Proceedings of ACM SIGKDD international conference on knowledge discovery and data mining (KDD)","DOI":"10.1145\/3534678.3539231"},{"key":"1646_CR12","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L, Co KT, Lupu EC (2019) Byzantine-robust federated learning through adaptive model averaging. arXiv:1909.05125"},{"key":"1646_CR13","unstructured":"Yald\u0131z DN, Zhang T, Avestimehr S (2023) Secure federated learning against model poisoning attacks via client filtering. arXiv:2304.00160"},{"issue":"9","key":"1646_CR14","first-page":"10711","volume":"37","author":"G Yan","year":"2023","unstructured":"Yan G, Wang H, Yuan X, Li J (2023) DeFL: defending against model poisoning attacks in federated learning via critical learning periods awareness. Proc AAAI Conf Artif Intell (AAAI) 37(9):10711\u201310719","journal-title":"Proc AAAI Conf Artif Intell (AAAI)"},{"key":"1646_CR15","doi-asserted-by":"crossref","unstructured":"Yan G, Wang H, Yuan X, Li J (2024) FedRoLA: robust federated learning against model poisoning via layer-based aggregation. In: Proceedings of ACM SIGKDD international conference on knowledge discovery and data mining (KDD), pp\u00a03667\u20133678","DOI":"10.1145\/3637528.3671906"},{"key":"1646_CR16","doi-asserted-by":"crossref","unstructured":"Li Q, He B, Song D (2021) Model-contrastive federated learning. In: Proceedings of IEEE\/ CVF conference on computer vision and pattern recognition (CVPR), pp\u00a010713\u201310722","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"1646_CR17","unstructured":"Li Y, Zhang X, Chen T (2023) Adaptive thresholding for robust federated learning under non-IID drift. In: Proceedings of international conference on learning representations (ICLR)"},{"key":"1646_CR18","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: Proceedings of IEEE international conference on data mining (ICDM), pp\u00a0413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"issue":"7","key":"1646_CR19","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443\u20131471","journal-title":"Neural Comput"},{"key":"1646_CR20","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. In: Proceedings of ACM SIGMOD international conference on management of data (SIGMOD), pp\u00a093\u2013104","DOI":"10.1145\/342009.335388"},{"issue":"10","key":"1646_CR21","doi-asserted-by":"publisher","first-page":"3236","DOI":"10.3390\/s24103236","volume":"24","author":"A Alshehri","year":"2024","unstructured":"Alshehri A, Badr MM, Baza M, Alshahrani H (2024) Deep anomaly detection framework utilizing federated learning for electricity theft zero-day cyberattacks. Sensors 24(10):3236","journal-title":"Sensors"},{"key":"1646_CR22","doi-asserted-by":"publisher","first-page":"20269","DOI":"10.1038\/s41598-024-70375-w","volume":"14","author":"Z Ding","year":"2024","unstructured":"Ding Z, Wang W, Li X, Wang X, Zhao J, Mu C (2024) Identifying alternately poisoning attacks in federated learning online using trajectory anomaly detection method. Sci Rep 14:20269","journal-title":"Sci Rep"},{"key":"1646_CR23","unstructured":"Ruff L., Vandermeulen RA, G\u00f6rnitz N, Deecke L, Siddiqui SA, Binder A, M\u00fcller E, Kloft M (2018) Deep one-class classification. In: Proceedings of the 35th international conference on machine learning, vol.\u00a080, pp\u00a04393\u20134402"},{"key":"1646_CR24","unstructured":"Das S (2022) FGAN: federated generative adversarial networks for anomaly detection in network traffic. arXiv Preprint. https:\/\/arxiv.org\/abs\/2203.11106"},{"key":"1646_CR25","unstructured":"Baruch G, Baruch M, Goldberg Y (2019) A little is enough: circumventing defenses for distributed learning. In: Wallach HM, Larochelle H, Beygelzimer A, d\u2019Alch\u00e9-Buc F, Fox EB, Garnett R (eds) Advances in neural information processing systems 32: annual conference on neural information processing systems 2019, NeurIPS 2019, December 8\u201314, Vancouver, BC, Canada, pp 8632\u20138642"},{"key":"1646_CR26","unstructured":"Fang M, Cao X, Jia J, Gong NZ (2020) Local model poisoning attacks to byzantine-robust federated learning. In: Proceedings of USENIX security symposium (USENIX Security), pp\u00a01623\u20131640"},{"key":"1646_CR27","doi-asserted-by":"crossref","unstructured":"Alharbi F (2025) Adaptive Hierarchical Federated Learning for IoT Anomaly Detection. IEEE Access 13:190449\u2013190470","DOI":"10.1109\/ACCESS.2025.3628986"},{"key":"1646_CR28","unstructured":"Han Y, Wang L, Chen T (2023) KICK: kickstarting robust federated learning via adaptive client selection. In: Proceedings of international conference on Learning Representations (ICLR)"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-026-01646-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-026-01646-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-026-01646-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:33:53Z","timestamp":1773812033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-026-01646-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,18]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["1646"],"URL":"https:\/\/doi.org\/10.1007\/s00607-026-01646-9","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,18]]},"assertion":[{"value":"22 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"53"}}