{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:52:06Z","timestamp":1776275526856,"version":"3.50.1"},"reference-count":300,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/comst.2023.3317242","type":"journal-article","created":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T18:36:04Z","timestamp":1695148564000},"page":"2654-2713","source":"Crossref","is-referenced-by-count":132,"title":["Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0632-3172","authenticated-orcid":false,"given":"Mohamed Amine","family":"Ferrag","sequence":"first","affiliation":[{"name":"AI and Digital Science Research Center, Technology Innovation Institute, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1160-2846","authenticated-orcid":false,"given":"Othmane","family":"Friha","sequence":"additional","affiliation":[{"name":"Networks and Systems Laboratory, Badji Mokhtar-Annaba University, Annaba, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0220-7956","authenticated-orcid":false,"given":"Burak","family":"Kantarci","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9002-5935","authenticated-orcid":false,"given":"Norbert","family":"Tihanyi","sequence":"additional","affiliation":[{"name":"AI and Digital Science Research Center, Technology Innovation Institute, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6235-4272","authenticated-orcid":false,"given":"Lucas","family":"Cordeiro","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Manchester, Manchester, U.K"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8941-8080","authenticated-orcid":false,"given":"Merouane","family":"Debbah","sequence":"additional","affiliation":[{"name":"Khalifa University 6G Research Center, Khalifa University of Science and Technology, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2168-4192","authenticated-orcid":false,"given":"Djallel","family":"Hamouda","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Labstic Laboratory, Guelma University, Guelma, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4690-2256","authenticated-orcid":false,"given":"Muna","family":"Al-Hawawreh","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Burwood, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900488"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.019.2300122"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3143098"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900103"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3273507"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC55113.2022.9824403"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118642"},{"key":"ref11","article-title":"Security and privacy for artificial intelligence: Opportunities and challenges","author":"Oseni","year":"2021","journal-title":"arXiv:2102.04661"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-020-00001-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833647"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011561"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024715"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100227"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068596"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3058573"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3063686"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3203890"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3073009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072611"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3119038"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089681"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.05.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3224279"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3151028"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3191697"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205505"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3190835"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109048"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.12.002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-022-01937-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3199901"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2022.3156756"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2023.3306773"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.004.2100182"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3244274"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3244674"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100715"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3555802"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2023.3251404"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238823"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3560816"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3570953"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3243918"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3249835"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3297241"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126076"},{"key":"ref56","article-title":"6G white paper on machine learning in wireless communication networks","author":"Ali","year":"2020","journal-title":"arXiv:2004.13875"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2000082"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref60","article-title":"Extreme URLLC: Vision, challenges, and key enablers","author":"Park","year":"2020","journal-title":"arXiv:2001.09683"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/s22051969"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3282363"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3571072"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2022.3228399"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2023.3239599"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3182539"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.006.2200407"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.011.2100643"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2022.3219999"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03328-2"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2023.10105159"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3239512"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.032"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2023.3239189"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TTHZ.2021.3128677"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00018"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.133.2200509"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.006.2200730"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1201\/9781003109952-5"},{"key":"ref80","volume-title":"White Paper: 5G Evolution and 6G","year":"2022"},{"key":"ref81","volume-title":"IMT Traffic Estimates for the Years 2020 to 2030","year":"2023"},{"key":"ref82","volume-title":"Cisco Annual Internet Report (2018\u20132023) White Paper","year":"2020"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2022.05.005"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100338"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0005.2200044"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3234284"},{"key":"ref87","article-title":"6G white paper on edge intelligence","author":"Peltonen","year":"2020","journal-title":"arXiv:2004.14850"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2022.3199168"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473821"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3237854"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987958"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3107783"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3187471"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.03.003"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.124"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2022.3226861"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103097"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3236995"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3238038"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3235950"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3237367"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102966"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3130901"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2023.3245071"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900476"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.006.2200480"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2825478"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102630"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805680"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2987435"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3487890"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3136132"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.11.026"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3530812"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00105-6"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3039941"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118346"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3190330"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref123","article-title":"Holographic MIMO communications: Theoretical foundations, enabling technologies, and future directions","author":"Gong","year":"2022","journal-title":"arXiv:2212.01257"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.005.00334"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2022.3196481"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit54941.2022.9815574"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3143454"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.041513.00174"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3236448"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109515"},{"key":"ref132","volume-title":"Interplay between physical layer security and blockchain technology for 5G and beyond: A comprehensive survey.","author":"Ghourab","year":"2023"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1002\/9781119501121.ch14"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100674"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100667"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.12.017"},{"key":"ref137","volume-title":"NVIDIA edge AI chips.","year":"2023"},{"key":"ref138","volume-title":"Google cloud IoT edge.","year":"2023"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.23919\/VLSICircuits52068.2021.9492514"},{"key":"ref140","volume-title":"Philips RPM.","year":"2023"},{"key":"ref141","volume-title":"GE\u2014Predix platform.","year":"2023"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3234761"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.3390\/sym15010217"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3235773"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906789"},{"key":"ref146","volume-title":"5G-transformer.","year":"2023"},{"key":"ref147","volume-title":"5G mobile network architecture.","year":"2023"},{"key":"ref148","volume-title":"H2020 project 5G-picture.","year":"2023"},{"key":"ref149","volume-title":"5G-CORAL: A 5G convergent virtualised radio access network living at the edge.","year":"2023"},{"key":"ref150","volume-title":"5G-empower project.","year":"2023"},{"key":"ref151","volume-title":"6G flagship project.","year":"2023"},{"key":"ref152","volume-title":"5G open innovation lab.","year":"2023"},{"key":"ref153","volume-title":"ENCQOR 5G.","year":"2023"},{"key":"ref154","volume-title":"5G city.","year":"2023"},{"key":"ref155","volume-title":"5G-ACIA.","year":"2023"},{"key":"ref156","volume-title":"6G-platform.","year":"2023"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.01.014"},{"key":"ref159","article-title":"Generative adversarial networks for malware detection: A survey","author":"Dunmore","year":"2023","journal-title":"arXiv:2302.08558"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3205665"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078072"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2997475"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2022.301441"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3172432"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.04.105"},{"key":"ref167","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2018","journal-title":"arXiv:1808.04866"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3135422"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102280"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488730"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp51992.2021.00021"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.3390\/fi13030073"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3023126"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671910"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10584-w"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9659839"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00042"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671964"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105218"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3128646"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3060896"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11152393"},{"key":"ref183","article-title":"Neural predictor for black-box adversarial attacks on speech recognition","author":"Biolkov\u00e1","year":"2022","journal-title":"arXiv:2203.09849"},{"key":"ref184","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine\u2013Robust federated learning","volume-title":"Proc. 29th USENIX Security Symp. (USENIX Security)","author":"Fang"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3172310"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947237"},{"key":"ref188","article-title":"HotFlip: White-box adversarial examples for text classification","author":"Ebrahimi","year":"2017","journal-title":"arXiv:1712.06751"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1002\/int.22720"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC55113.2022.9825004"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.04.010"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369581"},{"key":"ref193","article-title":"Defending against the label-flipping attack in federated learning","author":"Jebreel","year":"2022","journal-title":"arXiv:2207.01982"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3103919"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467214"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488902"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3047864"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500545"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3210029"},{"key":"ref201","volume-title":"KDD cup 1999.","year":"2022"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref205","volume-title":"TON_IOT datasets.","year":"2011"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66402-6_22"},{"key":"ref207","volume-title":"The MNIST database of handwritten digits.","year":"2022"},{"key":"ref208","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv:1708.07747"},{"key":"ref209","article-title":"LEAF: A benchmark for federated settings","author":"Caldas","year":"2018","journal-title":"arXiv:1812.01097"},{"key":"ref210","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref212","first-page":"1","article-title":"Novel dataset for fine-grained image categorization: Stanford dogs","volume-title":"Proc. CVPR Workshop Fine grained Vis. Categorization (FGVC)","volume":"2","author":"Khosla"},{"key":"ref213","volume-title":"UCI machine learning repository: Breast cancer Wisconsin (diagnostic) data set.","author":"Wolberg","year":"2011"},{"key":"ref214","volume-title":"The database of faces.","author":"Cambridge","year":"2002"},{"key":"ref215","first-page":"5","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces Real-Life Images Detect. Alignment Recognit.","author":"Huang"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.59"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1901.00212"},{"key":"ref220","volume-title":"The UCR time series classification archive.","author":"Chen","year":"2015"},{"key":"ref221","first-page":"437","article-title":"A public domain dataset for human activity recognition using smartphones","volume-title":"Proc. 21th Int. Eur. Symp. Artif. Neural Netw. Comput. Intell. Mach. Learn.","author":"Anguita"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1186\/1475-925X-6-23"},{"key":"ref223","first-page":"142","article-title":"Learning word vectors for sentiment analysis","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguist. Human Lang. Technol.","author":"Maas"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-2009"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2723009"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.3233\/SW-140134"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO54536.2021.9616118"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/FG52635.2021.9667076"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652916"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2950398"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100615"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1145\/3597210"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3243086"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109604"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03662-8"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM49781.2020.9381434"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1145\/3453158"},{"key":"ref242","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Stat.","author":"Bagdasaryan"},{"key":"ref243","volume-title":"Poisoning attacks in federated edge learning for digital twin 6G-enabled IoTs: An anticipatory study.","author":"Ferrag","year":"2023"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/DSC50466.2020.00066"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3169217"},{"key":"ref246","article-title":"HOUDINI: Fooling deep structured prediction models","author":"Cisse","year":"2017","journal-title":"arXiv:1707.05373"},{"key":"ref247","article-title":"UPSET and ANGRI: Breaking high performance image classifiers","author":"Sarkar","year":"2017","journal-title":"arXiv:1707.01159"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref252","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref253","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.10.024"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.300"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/525"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795300"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref259","first-page":"6","article-title":"Bayesopt adversarial attack","volume-title":"Proc. Int. Conf. Learn. Rep.","author":"Ru"},{"key":"ref260","article-title":"Sign-OPT: A query-efficient hard-label adversarial attack","author":"Cheng","year":"2019","journal-title":"arXiv:1909.10773"},{"key":"ref261","article-title":"Approximating CNNs with bag-of-local-features models works surprisingly well on ImageNet","author":"Brendel","year":"2019","journal-title":"arXiv:1904.00760"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3218005"},{"key":"ref263","article-title":"Bridging mode connectivity in loss landscapes and adversarial robustness","author":"Zhao","year":"2020","journal-title":"arXiv:2005.00060"},{"key":"ref264","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"Papernot","year":"2016","journal-title":"arXiv:1605.07277"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450066"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441892"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3102056"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467405"},{"key":"ref269","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3007817"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016297"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/ISC253183.2021.9562816"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00081"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.10.016"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653139"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet52717.2021.9614278"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS49936.2021.00075"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.3390\/s21103335"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3044223"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107850"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.3390\/s22020684"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3112100"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.01.026"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3249568"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref288","first-page":"1433","article-title":"Mitigating membership inference attacks by self-distillation through a novel ensemble architecture","volume-title":"Proc. 31st USENIX Security Symp. (USENIX Security)","author":"Tang"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102393"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108238"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"ref292","article-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models","author":"Salem","year":"2018","journal-title":"arXiv:1806.01246"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2022.3164758"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278765"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref296","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"issue":"1","key":"ref297","first-page":"5485","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.500"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1145\/3374217"},{"key":"ref300","article-title":"Universal and transferable adversarial attacks on aligned language models","author":"Zou","year":"2023","journal-title":"arXiv:2307.15043"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10324457\/10255264.pdf?arnumber=10255264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T02:58:39Z","timestamp":1709348319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10255264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":300,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2023.3317242","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}