{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T18:43:22Z","timestamp":1774637002718,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427896","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:35:29Z","timestamp":1707867329000},"page":"0028-0035","source":"Crossref","is-referenced-by-count":11,"title":["FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks"],"prefix":"10.1109","author":[{"given":"Marc","family":"Vucovich","sequence":"first","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Devin","family":"Quinn","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Kevin","family":"Choi","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Christopher","family":"Redino","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Abdul","family":"Rahman","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]},{"given":"Edward","family":"Bowen","sequence":"additional","affiliation":[{"name":"Deloitte &amp; Touche LLP"}]}],"member":"263","reference":[{"key":"ref1","author":"McMahan","year":"2023","journal-title":"Communication-efficient learning of deep networks from decentralized data"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref3","author":"Boesch","year":"2023","journal-title":"What is adversarial machine learning? attack methods in 2023"},{"key":"ref4","author":"Chen","year":"2017","journal-title":"Targeted backdoor attacks on deep learning systems using data poisoning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207272"},{"key":"ref6","first-page":"870","article-title":"Adversarial label flips attack on support vector machines","volume-title":"ECAI 2012","author":"Xiao"},{"key":"ref7","author":"Gu","year":"2019","journal-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/app122412564"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CAC53003.2021.9727486"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00030"},{"key":"ref11","first-page":"6893","article-title":"Zeno: Distributed stochastic gradient descent with suspicion-based fault-tolerance","volume-title":"Proceedings of the 36th International Conference on Machine Learning, volume 97 of Proceedings of Machine Learning Research","author":"Xie"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2023.3322743"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10020923"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref16","author":"Krizhevsky","journal-title":"Cifar-10 (canadian institute for advanced research)"},{"key":"ref17","author":"Reddi","year":"2021","journal-title":"Adaptive federated optimization"},{"key":"ref18","article-title":"Flower: A friendly federated learning research framework","author":"Beutel","year":"2020"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2024,1,8]]},"end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427896.pdf?arnumber=10427896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T14:43:34Z","timestamp":1709477014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427896","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}