{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:57:05Z","timestamp":1759334225660,"version":"build-2065373602"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-2047761,CNS-2106761,CNS-2318683"],"award-info":[{"award-number":["CNS-2047761,CNS-2106761,CNS-2318683"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,8]]},"DOI":"10.1109\/icc52391.2025.11161540","type":"proceedings-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T17:34:55Z","timestamp":1758908095000},"page":"6365-6370","source":"Crossref","is-referenced-by-count":0,"title":["PFedSAM: Secure Federated Learning Against Backdoor Attacks via Personalized Sharpness-Aware Minimization"],"prefix":"10.1109","author":[{"given":"Zhenxiao","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Texas,Department of Electrical and Computer Engineering,San Antonio"}]},{"given":"Yuanxiong","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Texas,Department of Information Systems and Cyber Security,San Antonio"}]},{"given":"Yanmin","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Texas,Department of Electrical and Computer Engineering,San Antonio"}]}],"member":"263","reference":[{"key":"ref1","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"International conference on artificial intelligence and statistics","volume":"108","author":"Bagdasaryan"},{"key":"ref2","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume":"33","author":"Wang","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"International Conference on Learning Representations","author":"Xie","key":"ref3"},{"volume-title":"Can you really backdoor federated learning?","year":"2019","author":"Sun","key":"ref4"},{"key":"ref5","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"31st USENIX Security Symposium","author":"Nguyen"},{"key":"ref6","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref7","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"International Conference on Machine Learning","volume":"80","author":"Yin"},{"key":"ref8","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume-title":"International Conference on Machine Learning","volume":"80","author":"El Mhamdi"},{"key":"ref9","first-page":"11372","article-title":"CRFL: Certifiably robust federated learning against backdoor attacks","volume-title":"International Conference on Machine Learning","author":"Xie"},{"article-title":"FLIP: A provable defense framework for backdoor mitigation in federated learning","volume-title":"International Conference on Learning Representations","author":"Zhang","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599898"},{"key":"ref12","first-page":"6357","article-title":"Ditto: Fair and robust federated learning through personalization","volume-title":"International Conference on Machine Learning","volume":"139","author":"Li"},{"key":"ref13","first-page":"30471","article-title":"Personalized federated learning towards communication efficiency, robustness and fairness","volume":"35","author":"Lin","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3649316"},{"key":"ref15","first-page":"2089","article-title":"Exploiting shared representations for personalized federated learning","volume-title":"International conference on machine learning","volume":"139","author":"Collins"},{"key":"ref16","first-page":"17716","article-title":"Federated learning with partial model personalization","volume-title":"International Conference on Machine Learning","volume":"162","author":"Pillutla"},{"article-title":"Sharpness-aware minimization for efficiently improving generalization","volume-title":"International Conference on Learning Representations","author":"Foret","key":"ref17"},{"key":"ref18","first-page":"5905","article-title":"ASAM: Adaptive sharpnessaware minimization for scale-invariant learning of deep neural networks","volume-title":"International Conference on Machine Learning","volume":"139","author":"Kwon"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/iccv51070.2023.00412"},{"article-title":"Hybrid local SGD for federated learning with heterogeneous communications","volume-title":"International Conference on Learning Representations","author":"Guo","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3216837"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3341788"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3492916"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3343288"},{"volume-title":"pfedSAM: Secure federated learning against backdoor attacks via personalized sharpness-aware minimization","year":"2024","author":"Zhang","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"volume-title":"Measuring the effects of non-identical data distribution for federated visual classification","year":"2019","author":"Hsu","key":"ref27"}],"event":{"name":"ICC 2025 - IEEE International Conference on Communications","start":{"date-parts":[[2025,6,8]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2025,6,12]]}},"container-title":["ICC 2025 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11160703\/11160705\/11161540.pdf?arnumber=11161540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T12:53:47Z","timestamp":1759236827000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11161540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icc52391.2025.11161540","relation":{},"subject":[],"published":{"date-parts":[[2025,6,8]]}}}