{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:21:01Z","timestamp":1753600861400,"version":"3.40.4"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10279255","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:10Z","timestamp":1698083650000},"page":"33-38","source":"Crossref","is-referenced-by-count":3,"title":["FedCom: Byzantine-Robust Federated Learning Using Data Commitment"],"prefix":"10.1109","author":[{"given":"Bo","family":"Zhao","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics"}]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics"}]},{"given":"Liming","family":"Fang","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Shenzhen Research Institute"}]}],"member":"263","reference":[{"key":"ref13","first-page":"6893","article-title":"Zeno: Distributed stochastic gradient descent with suspicion-based fault-tolerance","volume":"97","author":"xie","year":"2019","journal-title":"Proceedings of the 36th International Conference on Machine Learning ICML 2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref14","first-page":"10495","article-title":"Zeno+i-: Robust fully asynchronous SGD","volume":"119","year":"2020","journal-title":"Proceedings of the 37th International Conference on Machine Learning ICML 2020"},{"key":"ref20","article-title":"From GAN to WGAN","volume":"abs 1904 8994","author":"weng","year":"2019","journal-title":"CoRR"},{"key":"ref11","first-page":"5636","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume":"80","author":"yin","year":"2018","journal-title":"Proceedings of the 35th International Conference on Machine Learning ICML 2018"},{"key":"ref22","article-title":"Lotteryfl: Personalized and communication-efficient federated learning with lottery ticket hypoth-esis on non-iid datasets","volume":"abs 2008 3371","author":"li","year":"2020","journal-title":"CoRR"},{"key":"ref10","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","author":"blanchard","year":"2017","journal-title":"Advances in Neural Information Processing Systems 30 Annual Conference on Neural Information Processing Systems 2017"},{"key":"ref21","article-title":"A public domain dataset for human activity recognition using smartphones","author":"anguita","year":"2013","journal-title":"21st European Symposium on Artificial Neural Networks ESANN 2013"},{"key":"ref2","article-title":"Advances and open problems in federated learning","volume":"abs 1912 4977","author":"kairouz","year":"2019","journal-title":"CoRR"},{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"54","author":"mcmahan","year":"2017","journal-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics AISTATS 2017"},{"key":"ref17","article-title":"Badnets: Identifying vulner-abilities in the machine learning model supply chain","volume":"abs 1708 6733","author":"gu","year":"2017","journal-title":"CoRR"},{"key":"ref16","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"Proceedings of the 29th International Conference on Machine Learning ICML 2012"},{"key":"ref19","article-title":"Fedmix: Approximation of mixup under mean augmented federated learning","author":"yoon","year":"2021","journal-title":"9th International Conference on Learning Representations ICLR 2021 Virtual Event"},{"key":"ref18","first-page":"3518","article-title":"The hidden vulnerability of distributed learning in byzantium","volume":"80","author":"mhamdi","year":"2018","journal-title":"Proceedings of the 35th International Conference on Machine Learning ICML 2018"},{"key":"ref8","first-page":"1605","article-title":"Local model poisoning attacks to byzantine-robust federated learning","author":"fang","year":"2020","journal-title":"29th USENIX Security Sym-posium USENIX Security 2020"},{"key":"ref7","first-page":"6282","article-title":"Min-max optimization without gradients: Convergence and applications to black-box evasion and poisoning attacks","volume":"119","author":"liu","year":"2020","journal-title":"Proceedings of the 37th International Conference on Machine Learning ICML 2020"},{"key":"ref9","first-page":"2938","article-title":"How to backdoor federated learning","volume":"108","author":"bagdasaryan","year":"2020","journal-title":"The 23rd International Conference on Artificial Intelligence and Statistics AISTATS 2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3132381"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3194569"},{"key":"ref6","first-page":"27","article-title":"Towards poisoning of deep learning algorithms with back-gradient optimization","author":"mu\u00f1oz-gonzalez","year":"2017","journal-title":"Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security AISec CCS 2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10279255.pdf?arnumber=10279255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T17:50:19Z","timestamp":1746467419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10279255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10279255","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}