{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:06:47Z","timestamp":1730203607764,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,8]]},"DOI":"10.1109\/ccnc49033.2022.9700723","type":"proceedings-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T15:29:11Z","timestamp":1644506951000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["On Attacks To Federated Learning and a Blockchain-empowered Protection"],"prefix":"10.1109","author":[{"given":"Christian","family":"Esposito","sequence":"first","affiliation":[{"name":"University of Salerno,Fisciano (SA),Italy"}]},{"given":"Giancarlo","family":"Sperli","sequence":"additional","affiliation":[{"name":"University of Napoli &#x201C;Federico II&#x201D;,Napoli,Italy"}]},{"given":"Vincenzo","family":"Moscato","sequence":"additional","affiliation":[{"name":"University of Napoli &#x201C;Federico II&#x201D;,Napoli,Italy"}]},{"given":"Zhongliang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Beihang University,Beijing,China"}]}],"member":"263","reference":[{"article-title":"Ipfs-content addressed, versioned, p2p file system","year":"2014","author":"benet","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.11.017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000263"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3017377"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/155870.155881"},{"article-title":"Flower: A friendly federated learning research framework","year":"2020","author":"beutel","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3039941"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104468"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3102121"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3093711"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2990686"},{"key":"ref16","article-title":"Byzantine-resilient secure federated learning","author":"so","year":"2020","journal-title":"IEEE Journal on Selected Areas in Communications"},{"article-title":"Byzantine-robust variance-reduced federated learning over distributed non-iid data","year":"2020","author":"peng","key":"ref17"},{"article-title":"Fltrust: Byzantine-robust federated learning via trust bootstrapping","year":"2020","author":"cao","key":"ref18"},{"key":"ref19","first-page":"1605","article-title":"Local model poisoning attacks to byzantine-robust federated learning","author":"fang","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892848"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942190"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2990686"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000430"},{"key":"ref8","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","author":"bhagoji","year":"0"},{"key":"ref7","first-page":"2938","article-title":"How to backdoor federated learning","volume":"108","author":"bagdasaryan","year":"2020","journal-title":"Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2964162"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"article-title":"Towards realistic byzantine-robust federated learning","year":"2020","author":"portnoy","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5967-2_7"},{"key":"ref21","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2292894"},{"article-title":"Very deep convolutional networks for large-scale image recognition","year":"2014","author":"simonyan","key":"ref23"},{"key":"ref26","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"nguyen","year":"2018","journal-title":"Journal of Information Processing Systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"}],"event":{"name":"2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2022,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2022,1,11]]}},"container-title":["2022 IEEE 19th Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9700484\/9700495\/09700723.pdf?arnumber=9700723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T17:15:13Z","timestamp":1655140513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9700723\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ccnc49033.2022.9700723","relation":{},"subject":[],"published":{"date-parts":[[2022,1,8]]}}}