{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:54:03Z","timestamp":1730213643963,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927914","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning"],"prefix":"10.1109","author":[{"given":"Pinar","family":"Erbil","sequence":"first","affiliation":[{"name":"Koc University,Department of Computer Engineering,Istanbul,Turkey"}]},{"given":"M. Emre","family":"Gursoy","sequence":"additional","affiliation":[{"name":"Koc University,Department of Computer Engineering,Istanbul,Turkey"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900461"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2019.103291"},{"key":"ref12","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","author":"bhagoji","year":"2019","journal-title":"International Conference on Machine Learning"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref15","article-title":"Demystifying membership inference attacks in machine learning as a service","author":"truex","year":"2019","journal-title":"IEEE Transactions on Services Computing"},{"key":"ref16","article-title":"Dba: Distributed backdoor attacks against federated learning","author":"xie","year":"2019","journal-title":"International Conference on Learning Representations"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_27"},{"key":"ref19","first-page":"14 747","article-title":"Deep leakage from gradients","author":"zhu","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991125"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.33"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref6","first-page":"1605","article-title":"Local model poisoning attacks to byzantine-robust federated learning","author":"fang","year":"2020","journal-title":"29th USENIX Security Symposium USENIX Security 20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref8","first-page":"2938","article-title":"How to backdoor federated learning","author":"bagdasaryan","year":"2020","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref7","first-page":"1467","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"Proceedings of the 29th International Coference on International Conference on Machine Learning"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref9","first-page":"6103","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","author":"shafahi","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref22","first-page":"301","article-title":"The limitations of federated learning in sybil settings","author":"fung","year":"2020","journal-title":"23rd International Symposium on Research in Attacks Intrusions and Defenses (RAID)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00042"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015408"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007487"},{"key":"ref25","first-page":"727","article-title":"X-means: Extending k-means with effi-cient estimation of the number of clusters","volume":"1","author":"pelleg","year":"2000","journal-title":"International Conference on Machine Learning"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2022,9,12]]},"location":"Falerna, Italy","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09927914.pdf?arnumber=9927914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:39Z","timestamp":1674504759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927914","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}