{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:24:37Z","timestamp":1771025077950,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1109\/eucnc\/6gsummit60053.2024.10597004","type":"proceedings-article","created":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T17:31:04Z","timestamp":1721410264000},"page":"1175-1180","source":"Crossref","is-referenced-by-count":4,"title":["Decentralized Learning for 6G Security: Open Issues and Future Directions"],"prefix":"10.1109","author":[{"given":"Janani","family":"Kehelwala","sequence":"first","affiliation":[{"name":"University of Oulu,Centre for Wireless Communications,Finland"}]},{"given":"Yushan","family":"Siriwardhana","sequence":"additional","affiliation":[{"name":"University of Oulu,Centre for Wireless Communications,Finland"}]},{"given":"Tharaka","family":"Hewa","sequence":"additional","affiliation":[{"name":"University of Oulu,Centre for Wireless Communications,Finland"}]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[{"name":"University College,School of Computer Science,Dublin,Ireland"}]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[{"name":"University of Oulu,Centre for Wireless Communications,Finland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2858"},{"key":"ref6","author":"Roy","year":"2019","journal-title":"Braintorrent: A peer-to-peer environment for decentralized federated learning"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000263"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00034"},{"key":"ref9","volume-title":"Peer-to-peer federated learning on graphs","author":"Lalitha","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054055"},{"key":"ref11","first-page":"22 593","article-title":"Distributed distillation for on-device learning","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems","author":"Bistritz"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3169917"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815428"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200940"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100338"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9621043"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3071496"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025032"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006216"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2016.2614898"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref22","first-page":"1605","article-title":"Stolen Memories: Leveraging Model Memorization for Calibrated {White-Box} Membership Inference","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Leino"},{"key":"ref23","first-page":"301","article-title":"The Limitations of Federated Learning in Sybil Settings","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)","author":"Fung"},{"key":"ref24","article-title":"Defense against poisoning in federated learning systems for autonomous driving","volume-title":"Demonstration","author":"Kehelwala"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007211"}],"event":{"name":"2024 Joint European Conference on Networks and Communications &amp; 6G Summit (EuCNC\/6G Summit)","location":"Antwerp, Belgium","start":{"date-parts":[[2024,6,3]]},"end":{"date-parts":[[2024,6,6]]}},"container-title":["2024 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC\/6G Summit)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10596997\/10596998\/10597004.pdf?arnumber=10597004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:07:11Z","timestamp":1721452031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10597004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/eucnc\/6gsummit60053.2024.10597004","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]}}}