{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T09:25:36Z","timestamp":1773998736951,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/globecom59602.2025.11432262","type":"proceedings-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:04:01Z","timestamp":1773950641000},"page":"2300-2305","source":"Crossref","is-referenced-by-count":0,"title":["Effective Dual-Layer Poison Attacks Detection in Privacy-preserving Federated Learning"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Zhang","sequence":"first","affiliation":[{"name":"China University of Mining and Technology,The Department of Information Science,Xuzhou,China,221116"}]},{"given":"Haotian","family":"Chi","sequence":"additional","affiliation":[{"name":"Shanxi University,School of Automation and Software Engineering,Taiyuan,China,030006"}]},{"given":"Yonggang","family":"Li","sequence":"additional","affiliation":[{"name":"China University of Mining and Technology,The Department of Information Science,Xuzhou,China,221116"}]},{"given":"Shunrong","family":"Jiang","sequence":"additional","affiliation":[{"name":"China University of Mining and Technology,The Department of Information Science,Xuzhou,China,221116"}]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology,Department of Electrical and Computer Engineering,Hoboken,NJ,USA"}]},{"given":"Danny","family":"Hughes","sequence":"additional","affiliation":[{"name":"KU Leuven,Department of Computer Science,Belgium"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3704633"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071278"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.10.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3616390.3618283"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.103992"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3420126"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2006.012471"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238823"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3363670"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3374590"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2013.03.013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3131402"},{"key":"ref14","article-title":"Federated learning of deep networks using model averaging","volume-title":"CoRR","author":"McMahan","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3354942"},{"key":"ref16","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref17","first-page":"261","article-title":"Fall of empires: Breaking byzantine-tolerant sgd by inner product manipulation","volume-title":"Uncertainty in Artificial Intelligence","author":"Xie","year":"2020"},{"key":"ref18","first-page":"1363","article-title":"Adversarial preprocessing: Understanding and preventing {Image-Scaling} attacks in machine learning","author":"Quiring","year":"2020","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref19","article-title":"A little is enough: Circumventing defenses for distributed learning","volume":"32","author":"Baruch","year":"2019","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","location":"Taipei, Taiwan","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["GLOBECOM 2025 - 2025 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11431620\/11431622\/11432262.pdf?arnumber=11432262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:45:59Z","timestamp":1773985559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11432262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/globecom59602.2025.11432262","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}