{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:03:43Z","timestamp":1766138623506},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T00:00:00Z","timestamp":1704499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T00:00:00Z","timestamp":1704499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission in SPATIAL","doi-asserted-by":"publisher","award":["101021808"],"award-info":[{"award-number":["101021808"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["13\/RC\/2077_P2"],"award-info":[{"award-number":["13\/RC\/2077_P2"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,6]]},"DOI":"10.1109\/ccnc51664.2024.10454789","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:53:49Z","timestamp":1710788029000},"page":"956-962","source":"Crossref","is-referenced-by-count":2,"title":["Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications"],"prefix":"10.1109","author":[{"given":"Yushan","family":"Siriwardhana","sequence":"first","affiliation":[{"name":"University of Oulu,Centre for Wireless Communications,Finland"}]},{"given":"Pawani","family":"Porambage","sequence":"additional","affiliation":[{"name":"VTT Technical Research Centre,Finland"}]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin,Ireland"}]},{"given":"Samuel","family":"Marchal","sequence":"additional","affiliation":[{"name":"WithSecure Corp. &#x0026; Aalto University"}]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[{"name":"University of Oulu,Centre for Wireless Communications,Finland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103061"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3143495"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054634"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148862"},{"key":"ref6","first-page":"301","article-title":"The Limitations of Federated Learning in Sybil Settings","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses","author":"Fung","year":"2020"},{"key":"ref7","first-page":"118","article-title":"Machine Learning with Adversaries: Byzantine tolerant Gradient Descent","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"Blanchard","year":"2017"},{"key":"ref8","first-page":"3521","article-title":"The Hidden Vulnerability of Distributed Learning in Byzantium","volume-title":"International Conference on Machine Learning","author":"Guerraoui","year":"2018"},{"key":"ref9","first-page":"1415","article-title":"{FLAME}: Taming Backdoors in Federated Learning","volume-title":"31st USENIX Security Symposium","author":"Nguyen","year":"2022"},{"key":"ref10","first-page":"5650","article-title":"Byzantine-robust Distributed Learning: Towards Optimal Statistical Rates","volume-title":"International Conference on Machine Learning","author":"Yin","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3093711"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000200"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2956472"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000410"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref17","first-page":"1605","article-title":"Local Model Poisoning Attacks to {Byzantine-Robust} Federated Learning","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Fang","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13453-2_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3061981"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE53722.2022.9823716"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3135422"}],"event":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","start":{"date-parts":[[2024,1,6]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,9]]}},"container-title":["2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10454139\/10454627\/10454789.pdf?arnumber=10454789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T13:34:08Z","timestamp":1711460048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10454789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ccnc51664.2024.10454789","relation":{},"subject":[],"published":{"date-parts":[[2024,1,6]]}}}