{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:25:32Z","timestamp":1762957532745,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T00:00:00Z","timestamp":1717891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272028"],"award-info":[{"award-number":["62272028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,9]]},"DOI":"10.1109\/icc51166.2024.10622742","type":"proceedings-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T15:34:42Z","timestamp":1724168082000},"page":"4275-4280","source":"Crossref","is-referenced-by-count":1,"title":["Towards Well-trained Model Robustness in Federated Learning: An Adversarial- Example-Generation- Efficiency Perspective"],"prefix":"10.1109","author":[{"given":"Jianhua","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University,P. R. China"}]},{"given":"Xuyang","family":"Lei","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University,P. R. China"}]},{"given":"Min","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China,P. R. China"}]},{"given":"Jelena","family":"Misic","sequence":"additional","affiliation":[{"name":"Toronto Metropolitan University,Toronto,ON,Canada"}]},{"given":"Vojislav B.","family":"Misic","sequence":"additional","affiliation":[{"name":"Toronto Metropolitan University,Toronto,ON,Canada"}]},{"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University,P. R. China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","author":"McMahan","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3288936"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2024.3405004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2022.3213323"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3360007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3468507.3468519"},{"key":"ref7","article-title":"Intriguing properties of neural networks","volume-title":"arXiv:1312.6199 [es]","author":"Szegedy","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9983309"},{"journal-title":"Adam: A Method for Stochastic Optimization","year":"2017","author":"Kingma","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103227"},{"key":"ref11","article-title":"AdaBelief Optimizer: Adapting Stepsizes by the Belief in Observed Gradients","volume":"33","author":"Zhuang","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3143554"},{"key":"ref13","first-page":"2818","article-title":"Rethinking the Inception Architecture for Computer Vision","volume-title":"presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Szegedy","year":"2016"},{"article-title":"Explaining and Harnessing Adversarial Examples","volume-title":"International Conference on Learning Representations","author":"Goodfellow","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2009.5206848"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"}],"event":{"name":"ICC 2024 - IEEE International Conference on Communications","start":{"date-parts":[[2024,6,9]]},"location":"Denver, CO, USA","end":{"date-parts":[[2024,6,13]]}},"container-title":["ICC 2024 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10622104\/10622158\/10622742.pdf?arnumber=10622742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T20:17:02Z","timestamp":1724962622000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10622742\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc51166.2024.10622742","relation":{},"subject":[],"published":{"date-parts":[[2024,6,9]]}}}