{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:20:52Z","timestamp":1765484452493,"version":"3.41.0"},"reference-count":34,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2025,7,4]]},"DOI":"10.1080\/19393555.2024.2434586","type":"journal-article","created":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T17:44:07Z","timestamp":1732902247000},"page":"310-326","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Label flipping attacks in hierarchical federated learning for intrusion detection in IoT"],"prefix":"10.1080","volume":"34","author":[{"given":"Ennaji","family":"Elmahfoud","sequence":"first","affiliation":[{"name":"Sultan Moulay Slimane University","place":["Beni Mellal, Morocco"]}]},{"given":"Salah","family":"El Hajla","sequence":"additional","affiliation":[{"name":"Sultan Moulay Slimane University","place":["Beni Mellal, Morocco"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4704-5364","authenticated-orcid":false,"given":"Yassine","family":"Maleh","sequence":"additional","affiliation":[{"name":"Sultan Moulay Slimane University","place":["Beni Mellal, Morocco"]}]},{"given":"Soufyane","family":"Mounir","sequence":"additional","affiliation":[{"name":"Sultan Moulay Slimane University","place":["Beni Mellal, Morocco"]}]},{"given":"Karim","family":"Ouazzane","sequence":"additional","affiliation":[{"name":"London Metropolitan University, London, UK"}]}],"member":"301","published-online":{"date-parts":[[2024,11,29]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"crossref","first-page":"8866","DOI":"10.1109\/ICASSP40776.2020.9054634","volume-title":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"Abad M. S. H.","year":"2020","unstructured":"Abad, M. S. H., Ozfatura, E., GUndUz, D., & Ercetin, O. (2020). \u201cHierarchical federated learning across heterogeneous cellular networks,\u2019\u2019. ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 8866\u20138870)."},{"key":"e_1_3_3_3_1","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.future.2021.10.016","article-title":"Communication-efficient hierarchical federated learning for iot heterogeneous systems with imbalanced data","volume":"128","author":"Abdellatif A. A.","year":"2022","unstructured":"Abdellatif, A. A., Mhaisen, N., Mohamed, A., Erbad, A., Guizani, M., Dawy, Z., & Nasreddine, W. (2022). [Online]. Available: Communication-efficient hierarchical federated learning for iot heterogeneous systems with imbalanced data. Future Generation Computer Systems, 128, 406\u2013419. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X2100412X","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_3_4_1","first-page":"1","volume-title":"2024 2nd International Conference on Cyber Resilience (ICCR)","author":"Alsereidi M.","year":"2024","unstructured":"Alsereidi, M., Awadallah, A., Alkaabi, A., Yoon, S., & Yeun, C. Y. (2024). \u201cData poisoning against federated learning: Comparative analysis under label-flipping attacks and gan-generated eeg data,\u2019\u2019. 2024 2nd International Conference on Cyber Resilience (ICCR) (pp. 1\u20135)."},{"key":"e_1_3_3_5_1","unstructured":"Annual number of internet of things (iot) malware attacks worldwide from 2018 to 2022 \u2019\u2019 accessed: 2024-06-03. [Online]. Available: https:\/\/www.statista.com\/statistics\/1377569\/worldwide-annual-internet-of-things-attacks\/"},{"key":"e_1_3_3_6_1","first-page":"2938","volume-title":"International Conference on Artificial Intelligence and Statistics. 1em plus 0.5em minus 0.4em PMLR","author":"Bagdasaryan E.","year":"2020","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., & Shmatikov, V. (2020). \u201cHow to backdoor federated learning,\u2019\u2019. International Conference on Artificial Intelligence and Statistics. 1em plus 0.5em minus 0.4em PMLR (pp. 2938\u20132948)."},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455062"},{"key":"e_1_3_3_8_1","unstructured":"Beutel D. J. Topal T. Qian A. Kumar A. T. Gordon S. Qiu S. Makhija V. Wilkiewicz J. Kleiner A. & McMillan L. (2020). Flower: A friendly federated learning research framework. arXiv preprint arXiv:2007.14390."},{"key":"e_1_3_3_9_1","first-page":"634","volume-title":"International Conference on Machine Learning. 1em plus 0.5em minus 0.4em PMLR","author":"Bhagoji A. N.","year":"2019","unstructured":"Bhagoji, A. N., Chakraborty, S., Mittal, P., & Calo, S. B. (2019). \u201cAnalyzing federated learning through an adversarial lens,\u2019\u2019. International Conference on Machine Learning. 1em plus 0.5em minus 0.4em PMLR (pp. 634\u2013643)."},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3294771.3294783"},{"key":"e_1_3_3_11_1","unstructured":"Bonawitz K. Eichner H. Grieskamp W. Huba D. Ingerman A. Ivanov V. Kiddon C. Konen J. Mazzocchi S. McMahan B. Overveldt T. Petrou D. Ramage D. & Roselander J. (2019). Towards federated learning at scale: System design. In SysML 2019.https:\/\/arxiv.org\/abs\/1902.01046"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28581-3_7"},{"key":"e_1_3_3_13_1","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.procs.2024.05.054","article-title":"Machine learning algorithms for intrusion detection in iot prediction and performance analysis","volume":"236","author":"Elmahfoud E.","year":"2024","unstructured":"Elmahfoud, E., Elhajla, S., Maleh, Y., & Mounir, S. (2024). international Symposium on Green Technologies and Applications (ISGTA\u20192023). [Online]. Available: Machine learning algorithms for intrusion detection in iot prediction and performance analysis. Procedia Computer Science, 236, 460\u2013467. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050924010706","journal-title":"Procedia Computer Science"},{"key":"e_1_3_3_14_1","volume-title":"Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security, ser. NISS \u201824. 1em plus 0.5em minus 0.4em","author":"Ennaji E. M.","year":"2024","unstructured":"Ennaji, E. M., El Hajla, S., Maleh, Y., & Mounir, S. (2024. [Online]. Available: \u201cFederated deep learning models for intrusion detection in iot,\u2019\u2019. Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security, ser. NISS \u201824. 1em plus 0.5em minus 0.4em, Association for Computing Machinery, New York, NY, USA: https:\/\/doi.org\/10.1145\/3659677.3659837."},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"e_1_3_3_16_1","unstructured":"Fung C. Yoon C. J. & Beschastnikh I. (2018) Mitigating sybils in federated learning poisoning arXiv preprint arXiv:1808.04866."},{"key":"e_1_3_3_17_1","volume-title":"In 23rd International Symposium on Research in Attacks","author":"Fung C.","year":"2020","unstructured":"Fung, C., Yoon, C. J., & Beschastnikh, I. (2020). The limitations of federated learning in Sybil settings. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID (pp. 301\u2013316)."},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v35.i3.pp2010-2020"},{"key":"e_1_3_3_19_1","first-page":"1","volume-title":"2023 10th International Conference on Wireless Networks and Mobile Communications","author":"Hajla S. E.","year":"2023","unstructured":"Hajla, S. E., Mahfoud, E., Maleh, Y., & Mounir, S. (2023). \u201cAttack and anomaly detection in iot networks using machine learning approaches,\u2019\u2019. 2023 10th International Conference on Wireless Networks and Mobile Communications (pp. 1\u20137). WINCOM."},{"key":"e_1_3_3_20_1","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.neunet.2023.11.019","article-title":"Lfighter: Defending against the label-flipping attack in federated learning","volume":"170","author":"Jebreel N. M.","year":"2024","unstructured":"Jebreel, N. M., Domingo-Ferrer, J., S\u00e1nchez, D., & Blanco-Justicia, A. (2024). [Online]. Available: Lfighter: Defending against the label-flipping attack in federated learning. Neural Networks, 170, 111\u2013126. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0893608023006421","journal-title":"Neural Networks"},{"key":"e_1_3_3_21_1","unstructured":"Kone\u00c4n\u00c3\u00bd J. McMahan H. B. Yu F. X. Richt\u00c3\u00a1rik P. Suresh A. T. & Bacon D. (2017). Federated learning: Strategies for improving communication efficiency. 1. https:\/\/doi.org\/10.1109\/1610.05492"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_3_3_23_1","article-title":"Honest score client selection scheme: Preventing federated learning label flipping attacks in non-iid scenarios","author":"Li Y.","year":"2023","unstructured":"Li, Y., Chen, H., Bao, W., Xu, Z., & Yuan, D. (2023). [Online]. Available: Honest score client selection scheme: Preventing federated learning label flipping attacks in non-iid scenarios. arXiv. https:\/\/api.semanticscholar.org\/CorpusID:265128728","journal-title":"arXiv"},{"key":"e_1_3_3_24_1","first-page":"1","volume-title":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","author":"Liu L.","year":"2020","unstructured":"Liu, L., Zhang, J., Song, S., & Letaief, K. B. (2020). \u201cClient-edge-cloud hierarchical federated learning,\u2019\u2019. ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland (pp. 1\u20136). IEEE. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148862"},{"key":"e_1_3_3_25_1","unstructured":"McMahan H. B. Moore E. Ramage D. Hampson S. & Arcas B. A. Y. (2016 February). Communication-efficient learning of deep networks from decentralized data. [Online]. Available: http:\/\/arxiv.org\/abs\/1602.05629"},{"key":"e_1_3_3_26_1","volume-title":"2022 Cloud Continuum","author":"Rana O.","year":"2023","unstructured":"Rana, O., Spyridopoulos, T., Hudson, N., Baughman, M., Chard, K., Foster, I., & Khan, A. (2023). Hierarchical and decentralised federated learning. 2022 Cloud Continuum, Los Alamitos, CA, USA. IEEE. https:\/\/doi.org\/10.1109\/CloudContinuum57429.2022.00008"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05017-0"},{"key":"e_1_3_3_28_1","volume-title":"Proceedings of the 2022 IEEE Symposium on Security and Privacy","author":"Shejwalkar V.","year":"2022","unstructured":"Shejwalkar, V., & Houmansadr, A. (2022). Manipulating the byzantine: Optimizing model poisoning attacks and defenses for federated learning. Proceedings of the 2022 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_3_29_1","unstructured":"Sun J. Kairouz P. Suresh A. T. Vaikuntanathan V. & Thakurta A. (2019). Can you really backdoor federated learning? arXiv preprint arXiv:1911.07963."},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100167"},{"key":"e_1_3_3_31_1","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/978-3-030-58951-6_24","volume-title":"in Computer Security \u2013 ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings","author":"Tolpegin V.","year":"2020","unstructured":"Tolpegin, V., Tolpegin, V., Truex, S., Gursoy, M. E., & Liu, L. (2020). Data poisoning attacks against federated learning systems,\u2019. in Computer Security \u2013 ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I. 1em plus 0.5em minus 0.4em 480\u2013501. [Online]. Available: Springer-Verlag, Berlin, Heidelberg: https:\/\/doi.org\/10.1007\/978-3-030-58951-6_24."},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v13.i1.pp459-466"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3074382"},{"key":"e_1_3_3_34_1","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.iotcps.2023.04.001","article-title":"Security of federated learning with iot systems: Issues, limitations, challenges, and solutions","volume":"3","author":"Yaacoub J.-P. A.","year":"2023","unstructured":"Yaacoub, J.-P. A., Noura, H. N., & Salman, O. (2023). [Online]. Available: Security of federated learning with iot systems: Issues, limitations, challenges, and solutions. Internet of Things and Cyber-Physical Systems, 3, 155\u2013179. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2667345223000226","journal-title":"Internet of Things and Cyber-Physical Systems"},{"issue":"1","key":"e_1_3_3_35_1","doi-asserted-by":"crossref","first-page":"112","DOI":"10.3390\/electronics12010112","article-title":"Robust hierarchical federated learning with anomaly detection in cloud-edge-end cooperation networks","volume":"12","author":"Zhou Y.","year":"2022","unstructured":"Zhou, Y., Wang, R., Mo, X., Li, Z., & Tang, T. (2022). [Online]. Available: Robust hierarchical federated learning with anomaly detection in cloud-edge-end cooperation networks. Electronics, 12(1), 112. https:\/\/www.mdpi.com\/2079-9292\/12\/1\/112","journal-title":"Electronics"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2024.2434586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T11:06:25Z","timestamp":1750417585000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2024.2434586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,29]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7,4]]}},"alternative-id":["10.1080\/19393555.2024.2434586"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2024.2434586","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2024,11,29]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-11-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}