{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:14:17Z","timestamp":1755800057441,"version":"3.44.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2230609,2226612"],"award-info":[{"award-number":["2230609,2226612"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/fmec65595.2025.11119362","type":"proceedings-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:07:46Z","timestamp":1755626866000},"page":"186-193","source":"Crossref","is-referenced-by-count":0,"title":["Explainability-Aware Adversarial Threats and Mitigation in Federated Learning Based Anomaly Detection for Cooperative Smart Farming"],"prefix":"10.1109","author":[{"given":"Lopamudra","family":"Praharaj","sequence":"first","affiliation":[{"name":"Tennessee Tech University,Dept. of Computer Science,Cookeville,Tennessee,USA,38505"}]},{"given":"Maanak","family":"Gupta","sequence":"additional","affiliation":[{"name":"Tennessee Tech University,Dept. of Computer Science,Cookeville,Tennessee,USA,38505"}]},{"given":"Deepti","family":"Gupta","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University - Central Texas,Dept. of Computer Information Systems,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1183899"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s19173796"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825128"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.atech.2024.100727"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022763"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00037"},{"volume-title":"Cyber Attacks On the Rise in the Agriculture Industry","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00044"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.03.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3322785"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3233793"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2020.23003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE61278.2024.10613665"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-8540-7_16"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEAI55464.2022.00041"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386345"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652916"},{"key":"ref20","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"International conference on artificial intelligence and statistics","author":"Bagdasaryan","year":"2020"},{"key":"ref21","article-title":"Poisoning attacks against support vector machines","author":"Biggio","year":"2012","journal-title":"arXiv preprint"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref23","first-page":"1605","article-title":"Local model poisoning attacks to \\{Byzantine-Robust\\} federated learning","volume-title":"29th USENIX security symposium (USENIX Security 20)","author":"Fang","year":"2020"},{"key":"ref24","article-title":"Adversarial training in communication constrained federated learning","author":"Shah","year":"2021","journal-title":"arXiv preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc8010008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3307339.3343255"},{"volume-title":"Flower Team, Flower Framework","year":"2024","key":"ref27"},{"key":"ref28","article-title":"Efficient adversarial training in llms with continuous attacks","author":"Xhonneux","year":"2024","journal-title":"arXiv preprint"}],"event":{"name":"2025 10th International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2025,5,19]]},"location":"Tampa, FL, USA","end":{"date-parts":[[2025,5,22]]}},"container-title":["2025 10th International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11119239\/11119240\/11119362.pdf?arnumber=11119362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T06:31:19Z","timestamp":1755671479000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11119362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/fmec65595.2025.11119362","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}