{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:20:25Z","timestamp":1725762025727},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/icc45041.2023.10279267","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T13:54:10Z","timestamp":1698069250000},"page":"5078-5084","source":"Crossref","is-referenced-by-count":1,"title":["Towards Defending Adaptive Backdoor Attacks in Federated Learning"],"prefix":"10.1109","author":[{"given":"Han","family":"Yang","sequence":"first","affiliation":[{"name":"University of Essex,Department of Computer science and Electronic Engineering,Essex,UK"}]},{"given":"Dongbing","family":"Gu","sequence":"additional","affiliation":[{"name":"University of Essex,Department of Computer science and Electronic Engineering,Essex,UK"}]},{"given":"Jianhua","family":"He","sequence":"additional","affiliation":[{"name":"University of Essex,Department of Computer science and Electronic Engineering,Essex,UK"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Dba: Distributed backdoor attacks against federated learning","author":"xie","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref12","first-page":"634","article-title":"Analyzing feder-ated learning through an adversarial lens","author":"bhagoji","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2020.23003"},{"key":"ref14","article-title":"Badnets: Identifying vulnera-bilities in the machine learning model supply chain","author":"gu","year":"2017","journal-title":"ArXiv Preprint"},{"journal-title":"Estimating a Dirichlet Distribution","year":"2000","author":"minka","key":"ref11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref2","first-page":"2938","article-title":"How to backdoor federated learning","author":"bagdasaryan","year":"0","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref17","first-page":"1415","article-title":"{FLAME}: Taming backdoors in federated learning","author":"nguyen","year":"0","journal-title":"31st USENIX Security Symposium (USENIX Security 22)"},{"key":"ref16","article-title":"Deep sight: Mitigating backdoor attacks in federated learning through deep model inspection","author":"rieger","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref8","article-title":"Learning to de-tect malicious clients for robust federated learning","author":"li","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref7","article-title":"Mitigating backdoor attacks in federated learning","author":"wu","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref9","article-title":"Flguard: Secure and private federated learning","author":"nguyen","year":"2021","journal-title":"Crytography and Security no Preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref3","first-page":"5650","article-title":"Byzantine-robust dis-tributed learning: Towards optimal statistical rates","author":"yin","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref6","first-page":"301","article-title":"The limitations of federated learning in sybil settings","author":"fung","year":"2020","journal-title":"RAID"},{"key":"ref5","first-page":"508","article-title":"Auror: Defending against poisoning attacks in collaborative deep learning systems","author":"shen","year":"0","journal-title":"Proceedings of the 32nd Annual Conference on Computer Security Applications"}],"event":{"name":"ICC 2023 - IEEE International Conference on Communications","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["ICC 2023 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10278505\/10278554\/10279267.pdf?arnumber=10279267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T14:03:17Z","timestamp":1699884197000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10279267\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icc45041.2023.10279267","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}