{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T03:22:00Z","timestamp":1770348120855,"version":"3.49.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB2700600"],"award-info":[{"award-number":["2021YFB2700600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102297,62132013"],"award-info":[{"award-number":["62102297,62132013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,9]]},"DOI":"10.1109\/icc51166.2024.10622738","type":"proceedings-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T15:34:42Z","timestamp":1724168082000},"page":"2628-2633","source":"Crossref","is-referenced-by-count":1,"title":["Quality-aware Client Selection and Resource Optimization for Federated Learning in Computing Networks"],"prefix":"10.1109","author":[{"given":"Yanyan","family":"Liao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University,Xi&#x0027;an,China,710071"}]},{"given":"Jie","family":"Feng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University,Xi&#x0027;an,China,710071"}]},{"given":"Zongjie","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University,Xi&#x0027;an,China,710071"}]},{"given":"Bodong","family":"Shang","sequence":"additional","affiliation":[{"name":"Eastern Institute for Advanced Study, Eastern Institute of Technology,Ningbo,China,315200"}]},{"given":"Lei","family":"Liu","sequence":"additional","affiliation":[{"name":"Guangzhou Institute of Technology, Xidian University,Guangzhou,China,510555"}]},{"given":"Qingqi","family":"Pei","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks, Xidian University,Xi&#x0027;an,China,710071"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3318080"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3125565"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149138"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3088528"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3008091"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3100574"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3079104"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3345382"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3470817"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3313195"},{"key":"ref12","article-title":"Auror: Defending against poisoning attacks in collaborative deep learning systems","volume-title":"Conference on Computer Security Applications, 2016","author":"Shen"}],"event":{"name":"ICC 2024 - IEEE International Conference on Communications","location":"Denver, CO, USA","start":{"date-parts":[[2024,6,9]]},"end":{"date-parts":[[2024,6,13]]}},"container-title":["ICC 2024 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10622104\/10622158\/10622738.pdf?arnumber=10622738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T20:17:00Z","timestamp":1724962620000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10622738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icc51166.2024.10622738","relation":{},"subject":[],"published":{"date-parts":[[2024,6,9]]}}}