{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:02:32Z","timestamp":1768316552460,"version":"3.49.0"},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206231,62176048"],"award-info":[{"award-number":["62206231,62176048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,24]]},"DOI":"10.1109\/dsa66321.2025.00070","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:20Z","timestamp":1768242020000},"page":"535-536","source":"Crossref","is-referenced-by-count":0,"title":["Research on the Reliability of Cloud Edge Collaboration System for AI Applications"],"prefix":"10.1109","author":[{"given":"Liang","family":"Luo","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China,China"}]},{"given":"Sa","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Southwest Jiaotong University,Chengdu,Sichuan,China"}]},{"given":"Xiwei","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Southwest Jiaotong University,Chengdu,Sichuan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3338153"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3341145"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107490"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3216981"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref6","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume":"33","author":"Wang","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."}],"event":{"name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","location":"Sharjah, United Arab Emirates","start":{"date-parts":[[2025,11,24]]},"end":{"date-parts":[[2025,11,26]]}},"container-title":["2025 12th International Conference on Dependable Systems and Their Applications (DSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11320275\/11320347\/11320400.pdf?arnumber=11320400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:11:37Z","timestamp":1768295497000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11320400\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,24]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/dsa66321.2025.00070","relation":{},"subject":[],"published":{"date-parts":[[2025,11,24]]}}}