{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:50:05Z","timestamp":1753923005713,"version":"3.28.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Lanzhou Talent Innovation and Entrepreneurship Project (2019) of Lanzhou Science and Technology Bureau","award":["2019-RC-114"],"award-info":[{"award-number":["2019-RC-114"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s12083-024-01794-9","type":"journal-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T09:02:49Z","timestamp":1725267769000},"page":"3750-3764","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning"],"prefix":"10.1007","volume":"17","author":[{"given":"Guozhi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hongsen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shuyan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"1794_CR1","unstructured":"Bagdasaryan E, Veit A, Hua Y et al (2020) How to backdoor federated learning. In: International conference on artificial intelligence and statistics, PMLR, pp 2938\u20132948"},{"key":"1794_CR2","unstructured":"Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389"},{"key":"1794_CR3","unstructured":"Blanchard P, El Mhamdi EM, Guerraoui R et al (2017) Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in neural information processing systems 30"},{"key":"1794_CR4","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1007\/s00362-019-01148-1","volume":"62","author":"E Cabana","year":"2021","unstructured":"Cabana E, Lillo RE, Laniado H (2021) Multivariate outlier detection based on a robust mahalanobis distance with shrinkage estimators. Statistical papers 62:1583\u20131609","journal-title":"Statistical papers"},{"key":"1794_CR5","unstructured":"Caldas S, Duddu SMK, Wu P et al (2018) Leaf: A benchmark for federated settings. arXiv preprint arXiv:1812.01097"},{"key":"1794_CR6","doi-asserted-by":"crossref","unstructured":"Cao X, Gong NZ (2022) Mpaf: Model poisoning attacks to federated learning based on fake clients. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 3396\u20133404","DOI":"10.1109\/CVPRW56347.2022.00383"},{"issue":"6","key":"1794_CR7","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng L (2012) The mnist database of handwritten digit images for machine learning research [best of the web]. IEEE signal processing magazine 29(6):141\u2013142","journal-title":"IEEE signal processing magazine"},{"key":"1794_CR8","unstructured":"Fang M, Cao X, Jia J et al (2020) Local model poisoning attacks to $$\\{$$Byzantine-Robust$$\\}$$ federated learning. In: 29th USENIX security symposium (USENIX Security 20), pp 1605\u20131622"},{"key":"1794_CR9","doi-asserted-by":"crossref","unstructured":"Jagielski M, Oprea A, Biggio B et al (2018) Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. In: 2018 IEEE symposium on security and privacy (SP), IEEE, pp 19\u201335","DOI":"10.1109\/SP.2018.00057"},{"issue":"2","key":"1794_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSEC.2020.3039941","volume":"19","author":"MS Jere","year":"2020","unstructured":"Jere MS, Farnan T, Koushanfar F (2020) A taxonomy of attacks on federated learning. IEEE Security & Privacy 19(2):20\u201328","journal-title":"IEEE Security & Privacy"},{"key":"1794_CR11","doi-asserted-by":"crossref","unstructured":"Kairouz P, McMahan HB, Avent B et al (2021) Advances and open problems in federated learning. Foundations and trends\u00ae in machine learning 14(1\u20132):1\u2013210","DOI":"10.1561\/9781680837896"},{"key":"1794_CR12","unstructured":"Kamoi R, Kobayashi K (2020) Why is the mahalanobis distance effective for anomaly detection? arXiv preprint arXiv:2003.00402"},{"key":"1794_CR13","unstructured":"Krizhevsky A, Hinton G et al (2009) Learning multiple layers of features from tiny images"},{"key":"1794_CR14","first-page":"35007","volume":"35","author":"H Li","year":"2022","unstructured":"Li H, Sun X, Zheng Z (2022) Learning to attack federated learning: A model-based reinforcement learning attack framework. Advances in Neural Information Processing Systems 35:35007\u201335020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"1794_CR15","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.future.2023.11.015","volume":"153","author":"XY Liang","year":"2024","unstructured":"Liang XY, Zhang HR, Tang W et al (2024) Robust federated learning with voting and scaling. Future Generation Computer Systems 153:113\u2013124","journal-title":"Future Generation Computer Systems"},{"key":"1794_CR16","first-page":"1","volume-title":"ICASSP 2023\u20132023 IEEE International Conference on Acoustics","author":"C Luo","year":"2023","unstructured":"Luo C, Li Y, Jiang Y et al (2023) Untargeted backdoor attack against object detection. ICASSP 2023\u20132023 IEEE International Conference on Acoustics. Speech and Signal Processing (ICASSP), IEEE, pp 1\u20135"},{"key":"1794_CR17","doi-asserted-by":"publisher","unstructured":"Lyu L, Yu H, Ma X et al (2022) Privacy and robustness in federated learning: Attacks and defenses. IEEE Transactions on Neural Networks and Learning Systems pp 1\u201321. https:\/\/doi.org\/10.1109\/TNNLS.2022.3216981","DOI":"10.1109\/TNNLS.2022.3216981"},{"key":"1794_CR18","unstructured":"McMahan B, Moore E, Ramage D et al (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR, pp 1273\u20131282"},{"issue":"7\u20138","key":"1794_CR19","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/S0895-7177(01)00109-1","volume":"34","author":"T Pham-Gia","year":"2001","unstructured":"Pham-Gia T, Hung TL (2001) The mean and median absolute deviations. Mathematical and computer Modelling 34(7\u20138):921\u2013936","journal-title":"Mathematical and computer Modelling"},{"issue":"4","key":"1794_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3524104","volume":"55","author":"Y Qu","year":"2022","unstructured":"Qu Y, Uddin MP, Gan C et al (2022) Blockchain-enabled federated learning: A survey. ACM Computing Surveys 55(4):1\u201335","journal-title":"ACM Computing Surveys"},{"key":"1794_CR21","doi-asserted-by":"crossref","unstructured":"Rong D, Ye S, Zhao R et al (2022) Fedrecattack: Model poisoning attack to federated recommendation. In: 2022 IEEE 38th International Conference on Data Engineering (ICDE), IEEE, pp 2643\u20132655","DOI":"10.1109\/ICDE53745.2022.00243"},{"issue":"424","key":"1794_CR22","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1080\/01621459.1993.10476408","volume":"88","author":"PJ Rousseeuw","year":"1993","unstructured":"Rousseeuw PJ, Croux C (1993) Alternatives to the median absolute deviation. Journal of the American Statistical association 88(424):1273\u20131283","journal-title":"Journal of the American Statistical association"},{"key":"1794_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106495","volume":"140","author":"H Sarmadi","year":"2020","unstructured":"Sarmadi H, Karamodin A (2020) A novel anomaly detection method based on adaptive mahalanobis-squared distance and one-class knn rule for structural health monitoring under environmental effects. Mechanical systems and signal processing 140:106495","journal-title":"Mechanical systems and signal processing"},{"key":"1794_CR24","doi-asserted-by":"crossref","unstructured":"Shrivastava A, Vamsi PR (2023) Anomaly detection using minimum covariant determinant as feature in multivariate data. In: Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, pp 501\u2013514","DOI":"10.1145\/3607947.3608054"},{"issue":"5","key":"1794_CR25","doi-asserted-by":"publisher","first-page":"3047","DOI":"10.1109\/TNSE.2022.3153519","volume":"10","author":"J Song","year":"2023","unstructured":"Song J, Wang W, Gadekallu TR et al (2023) Eppda: An efficient privacy-preserving data aggregation federated learning scheme. IEEE Transactions on Network Science and Engineering 10(5):3047\u20133057. https:\/\/doi.org\/10.1109\/TNSE.2022.3153519","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"1794_CR26","unstructured":"Sun Z, Kairouz P, Suresh AT et al (2019) Can you really backdoor federated learning? arXiv preprint arXiv:1911.07963"},{"issue":"8","key":"1794_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3551636","volume":"55","author":"Z Tian","year":"2022","unstructured":"Tian Z, Cui L, Liang J et al (2022) A comprehensive survey on poisoning attacks and countermeasures in machine learning. ACM Computing Surveys 55(8):1\u201335","journal-title":"ACM Computing Surveys"},{"key":"1794_CR28","doi-asserted-by":"publisher","unstructured":"Wan Y, Qu Y, Ni W et al (2024) Data and model poisoning backdoor attacks on wireless federated learning, and the defense mechanisms: A comprehensive survey. IEEE Communications Surveys & Tutorials pp 1\u20131. https:\/\/doi.org\/10.1109\/COMST.2024.3361451","DOI":"10.1109\/COMST.2024.3361451"},{"key":"1794_CR29","first-page":"16070","volume":"33","author":"H Wang","year":"2020","unstructured":"Wang H, Sreenivasan K, Rajput S et al (2020) Attack of the tails: Yes, you really can backdoor federated learning. Advances in Neural Information Processing Systems 33:16070\u201316084","journal-title":"Advances in Neural Information Processing Systems"},{"key":"1794_CR30","unstructured":"Xie C, Koyejo O, Gupta I (2018) Generalized byzantine-tolerant sgd. arXiv preprint arXiv:1802.10116"},{"key":"1794_CR31","unstructured":"Yang C, Wu Q, Li H et al (2017) Generative poisoning attack method against neural networks. arXiv preprint arXiv:1703.01340"},{"key":"1794_CR32","unstructured":"Yin D, Chen Y, Kannan R et al (2018) Byzantine-robust distributed learning: Towards optimal statistical rates. In: International Conference on Machine Learning, PMLR, pp 5650\u20135659"},{"issue":"3","key":"1794_CR33","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/fi13030073","volume":"13","author":"X Zhou","year":"2021","unstructured":"Zhou X, Xu M, Wu Y et al (2021) Deep model poisoning attack on federated learning. Future Internet 13(3):73","journal-title":"Future Internet"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01794-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01794-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01794-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T15:28:43Z","timestamp":1731425323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01794-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["1794"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01794-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,9,2]]},"assertion":[{"value":"9 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No potential conflict of interest was reported by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}