{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T14:03:29Z","timestamp":1776175409833,"version":"3.50.1"},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20232ACB202012"],"award-info":[{"award-number":["20232ACB202012"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People&apos;s Republic of China","doi-asserted-by":"publisher","award":["BDFE-2024006"],"award-info":[{"award-number":["BDFE-2024006"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62362036"],"award-info":[{"award-number":["62362036"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72204077"],"award-info":[{"award-number":["72204077"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.sysarc.2026.103789","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:04:15Z","timestamp":1774929855000},"page":"103789","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["FLSAMW: Mitigating backdoor attacks in federated learning based on SVD and amplified model weight"],"prefix":"10.1016","volume":"176","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6347-7805","authenticated-orcid":false,"given":"Xingxing","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Junwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zuowen","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Xiangli","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Xiaojie","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Mengjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"18","key":"10.1016\/j.sysarc.2026.103789_b1","doi-asserted-by":"crossref","first-page":"13849","DOI":"10.1109\/JIOT.2021.3088875","article-title":"A survey of recent advances in edge-computing-powered artificial intelligence of things","volume":"8","author":"Chang","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"10.1016\/j.sysarc.2026.103789_b2","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/s10586-025-05145-y","article-title":"A secure federated learning privacy method for industrial IoT edge networks","volume":"28","author":"Odeh","year":"2025","journal-title":"Clust. Comput."},{"key":"10.1016\/j.sysarc.2026.103789_b3","doi-asserted-by":"crossref","first-page":"112","DOI":"10.58496\/BJN\/2023\/015","article-title":"Network security in AI-based healthcare systems","volume":"2023","author":"Al-Attar","year":"2023","journal-title":"Babylon. J. Netw."},{"key":"10.1016\/j.sysarc.2026.103789_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2025.103575","article-title":"Efficient dropout-resilient and verifiable federated learning scheme for aIoT healthcare system","volume":"168","author":"Kang","year":"2025","journal-title":"J. Syst. Archit.","ISSN":"https:\/\/id.crossref.org\/issn\/1383-7621","issn-type":"print"},{"key":"10.1016\/j.sysarc.2026.103789_b5","series-title":"International Conference on Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"54","author":"McMahan","year":"2017"},{"issue":"2","key":"10.1016\/j.sysarc.2026.103789_b6","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"2","key":"10.1016\/j.sysarc.2026.103789_b7","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TSUSC.2024.3441658","article-title":"Efficient federated learning via adaptive model pruning for internet of vehicles with a constrained latency","volume":"10","author":"Chang","year":"2025","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"10.1016\/j.sysarc.2026.103789_b8","first-page":"1","article-title":"GPAFed: Gradient projection-guided adaptive aggregation strategy for federated learning under non-IID data","author":"Chang","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.sysarc.2026.103789_b9","doi-asserted-by":"crossref","first-page":"46","DOI":"10.70470\/SHIFRA\/2025\/002","article-title":"Federated learning in healthcare: A bibliometric analysis of privacy, security, and adversarial threats (2021\u20132024)","volume":"2025","author":"Almaiah","year":"2025","journal-title":"SHIFRA"},{"key":"10.1016\/j.sysarc.2026.103789_b10","series-title":"International Conference on Artificial Intelligence and Statistics","first-page":"2938","article-title":"How to backdoor federated learning","volume":"108","author":"Bagdasaryan","year":"2020"},{"key":"10.1016\/j.sysarc.2026.103789_b11","series-title":"International Conference on Learning Representations","first-page":"1","article-title":"DBA: distributed backdoor attacks against federated learning","author":"Xie","year":"2020"},{"key":"10.1016\/j.sysarc.2026.103789_b12","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1145\/3649316","article-title":"BapFL: You can backdoor personalized federated learning","volume":"18","author":"Ye","year":"2024","journal-title":"ACM Trans. Knowl. Discov. Data."},{"key":"10.1016\/j.sysarc.2026.103789_b13","series-title":"ACM SIGSAC Conference on Computer and Communications Security","first-page":"1526","article-title":"MESAS: poisoning defense for federated learning resilient against adaptive attackers","author":"Krau\u00df","year":"2023"},{"key":"10.1016\/j.sysarc.2026.103789_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103205","article-title":"Two-phase defense against poisoning attacks on federated learning-based intrusion detection","volume":"129","author":"Lai","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.sysarc.2026.103789_b15","series-title":"Advances in Neural Information Processing Systems","first-page":"10876","article-title":"Lockdown: Backdoor defense for federated learning with isolated subspace training","volume":"36","author":"Huang","year":"2023"},{"key":"10.1016\/j.sysarc.2026.103789_b16","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/TIFS.2023.3333555","article-title":"AgrAmplifier: Defending federated learning against poisoning attacks through local update amplification","volume":"19","author":"Gong","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sysarc.2026.103789_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2024.103258","article-title":"BR-FEEL: a backdoor resilient approach for federated edge learning with fragment-sharing","volume":"155","author":"Qi","year":"2024","journal-title":"J. Syst. Archit.","ISSN":"https:\/\/id.crossref.org\/issn\/1383-7621","issn-type":"print"},{"key":"10.1016\/j.sysarc.2026.103789_b18","series-title":"USENIX Security Symposium","first-page":"1415","article-title":"FLAME: taming backdoors in federated learning","author":"Nguyen","year":"2022"},{"key":"10.1016\/j.sysarc.2026.103789_b19","series-title":"International Conference on Machine Learning","first-page":"11372","article-title":"CRFL: certifiably robust federated learning against backdoor attacks","volume":"139","author":"Xie","year":"2021"},{"key":"10.1016\/j.sysarc.2026.103789_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111511","article-title":"FLMAAcBD: defending against backdoors in federated learning via model anomalous activation behavior detection","volume":"289","author":"Cai","year":"2024","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.sysarc.2026.103789_b21","series-title":"ACM Asia Conference on Computer and Communications Security","first-page":"946","article-title":"FLARE: defending federated learning against model poisoning attacks via latent space representations","author":"Wang","year":"2022"},{"key":"10.1016\/j.sysarc.2026.103789_b22","series-title":"Network and Distributed System Security Symposium","first-page":"1","article-title":"FLTrust: Byzantine-robust federated learning via trust bootstrapping","author":"Cao","year":"2021"},{"key":"10.1016\/j.sysarc.2026.103789_b23","doi-asserted-by":"crossref","first-page":"2951","DOI":"10.1109\/TIFS.2024.3352415","article-title":"RoseAgg: robust defense against targeted collusion attacks in federated learning","volume":"19","author":"Yang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sysarc.2026.103789_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111660","article-title":"RoPE: defending against backdoor attacks in federated learning systems","volume":"293","author":"Wang","year":"2024","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.sysarc.2026.103789_b25","series-title":"IEEE European Symposium on Security and Privacy","first-page":"1179","article-title":"Watermarking graph neural networks based on backdoor attacks","author":"Xu","year":"2023"},{"key":"10.1016\/j.sysarc.2026.103789_b26","series-title":"Advances in Neural Information Processing Systems","first-page":"8011","article-title":"Spectral signatures in backdoor attacks","volume":"31","author":"Tran","year":"2018"},{"issue":"5","key":"10.1016\/j.sysarc.2026.103789_b27","first-page":"2088","article-title":"Invisible backdoor attacks on deep neural networks via steganography and regularization","volume":"18","author":"Li","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.sysarc.2026.103789_b28","series-title":"International Conference on Machine Learning","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume":"97","author":"Bhagoji","year":"2019"},{"key":"10.1016\/j.sysarc.2026.103789_b29","series-title":"European Symposium on Research in Computer Security","first-page":"480","article-title":"Data poisoning attacks against federated learning systems","volume":"12308","author":"Tolpegin","year":"2020"},{"key":"10.1016\/j.sysarc.2026.103789_b30","series-title":"AAAI Conference on Artificial Intelligence","first-page":"9020","article-title":"Poisoning with Cerberus: stealthy and colluded backdoor attack against federated learning","author":"Lyu","year":"2023"},{"issue":"Part A","key":"10.1016\/j.sysarc.2026.103789_b31","article-title":"Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions","volume":"127","author":"Nguyen","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"10.1016\/j.sysarc.2026.103789_b32","doi-asserted-by":"crossref","first-page":"1861","DOI":"10.1109\/COMST.2024.3361451","article-title":"Data and model poisoning backdoor attacks on wireless federated learning, and the defense mechanisms: A comprehensive survey","volume":"26","author":"Wan","year":"2024","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.sysarc.2026.103789_b33","series-title":"International Symposium on Research in Attacks, Intrusions and Defenses","first-page":"301","article-title":"The limitations of federated learning in sybil settings","author":"Fung","year":"2020"},{"key":"10.1016\/j.sysarc.2026.103789_b34","series-title":"Network and Distributed System Security Symposium","first-page":"1","article-title":"DeepSight: mitigating backdoor attacks in federated learning through deep model inspection","author":"Rieger","year":"2022"},{"key":"10.1016\/j.sysarc.2026.103789_b35","series-title":"AAAI Conference on Artificial Intelligence","first-page":"9268","article-title":"Defending against backdoors in federated learning with robust learning rate","author":"\u00d6zdayi","year":"2021"},{"key":"10.1016\/j.sysarc.2026.103789_b36","series-title":"International Conference on Learning Representations","first-page":"1","article-title":"signSGD with majority vote is communication efficient and fault tolerant","author":"Bernstein","year":"2019"},{"issue":"3\u20134","key":"10.1016\/j.sysarc.2026.103789_b37","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"10.1016\/j.sysarc.2026.103789_b38","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2025.103582","article-title":"A survey of optimization algorithms for differential privacy in federated learning","volume":"168","author":"Shan","year":"2025","journal-title":"J. Syst. Archit.","ISSN":"https:\/\/id.crossref.org\/issn\/1383-7621","issn-type":"print"},{"key":"10.1016\/j.sysarc.2026.103789_b39","doi-asserted-by":"crossref","first-page":"13","DOI":"10.70470\/ESTIDAMAA\/2025\/002","article-title":"Federated learning for smart and sustainable forest fire detection in green internet of things","volume":"2025","author":"Ali","year":"2025","journal-title":"ESTIDAMAA"},{"key":"10.1016\/j.sysarc.2026.103789_b40","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103414","article-title":"SCFL: mitigating backdoor attacks in federated learning based on SVD and clustering","volume":"133","author":"Wang","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.sysarc.2026.103789_b41","series-title":"ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"2545","article-title":"FLDetector: defending federated learning against model poisoning attacks via detecting malicious clients","author":"Zhang","year":"2022"},{"key":"10.1016\/j.sysarc.2026.103789_b42","doi-asserted-by":"crossref","first-page":"26","DOI":"10.70470\/EDRAAK\/2024\/004","article-title":"Fortifying AI against cyber threats advancing resilient systems to combat adversarial attacks","volume":"2024","author":"Hussain","year":"2024","journal-title":"EDRAAK."},{"key":"10.1016\/j.sysarc.2026.103789_b43","series-title":"Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"10.1016\/j.sysarc.2026.103789_b44","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"Citeseer"},{"key":"10.1016\/j.sysarc.2026.103789_b45","series-title":"International Joint Conference on Neural Networks","first-page":"2921","article-title":"EMNIST: extending MNIST to handwritten letters","author":"Cohen","year":"2017"},{"key":"10.1016\/j.sysarc.2026.103789_b46","doi-asserted-by":"crossref","first-page":"121","DOI":"10.58496\/ADSA\/2024\/011","article-title":"Adversarial attacks in machine learning: Key insights and defense approaches","volume":"2024","author":"Khaleel","year":"2024","journal-title":"Appl. Data Sci. Anal."}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762126001074?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762126001074?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T13:20:57Z","timestamp":1776172857000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762126001074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":46,"alternative-id":["S1383762126001074"],"URL":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103789","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"FLSAMW: Mitigating backdoor attacks in federated learning based on SVD and amplified model weight","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems Architecture","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103789","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103789"}}