{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:53:44Z","timestamp":1770231224760,"version":"3.49.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/icccn65249.2025.11134006","type":"proceedings-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:20Z","timestamp":1756489160000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Byzantine-Robust Federated Learning"],"prefix":"10.1109","author":[{"given":"Zheyuan","family":"Liu","sequence":"first","affiliation":[{"name":"University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716"}]},{"given":"Qian","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716"}]},{"given":"Yidan","family":"Hu","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Department of Computing Security,Rochester,NY,USA,14623"}]},{"given":"Aisha","family":"Aseeri","sequence":"additional","affiliation":[{"name":"King Abdulaziz University,Department of Information Technology,Jeddah,Saudi Arabia"}]},{"given":"Depeng","family":"Li","sequence":"additional","affiliation":[{"name":"University of Hawaii at Manoa,Department of Information and Computer Sciences,Honolulu,HI,USA,96822"}]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716"}]}],"member":"263","reference":[{"key":"ref1","article-title":"General data protection regulation","year":"2016"},{"key":"ref2","article-title":"California consumer privacy act (ccpa)","year":"2016"},{"key":"ref3","article-title":"Gboard, now available for android","year":"2016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006179"},{"key":"ref6","author":"Mammen","year":"2021","journal-title":"Federated learning: opportunities and challenges"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"ref10","article-title":"Local model poisoning attacks to Byzantine-Robust federated learning","author":"Fang","year":"2020","journal-title":"USENIX Security\u201920"},{"key":"ref11","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"AISTATS\u201920","volume":"108","author":"Bagdasaryan"},{"key":"ref12","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in Byzantium","volume-title":"ICML\u201918","volume":"80","author":"El Mhamdi"},{"key":"ref13","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"NeurIPS\u201917"},{"key":"ref14","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"ICML\u201919","volume":"97","author":"Bhagoji"},{"key":"ref15","volume":"abs\/1712.05526","author":"Chen","year":"2017","journal-title":"Targeted backdoor attacks on deep learning systems using data poisoning"},{"key":"ref16","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"ICML\u201918","volume":"80","author":"Yin"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3154503"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref20","volume":"abs\/1808.04866","author":"Fung","year":"2018","journal-title":"Mitigating sybils in federated learning poisoning"},{"key":"ref21","first-page":"1145","article-title":"Asynchronous Byzantine machine learning (the case of SGD)","volume-title":"ICML\u201918","volume":"80","author":"Damaskinos"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref23","author":"Grosse","year":"2017","journal-title":"On the (statistical) detection of adversarial examples"},{"key":"ref24","first-page":"1893","article-title":"Data poisoning attacks on factorization-based collaborative filtering","author":"Li","year":"2016","journal-title":"NIPS\u201916"},{"key":"ref25","first-page":"6106","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","author":"Shafahi","year":"2018","journal-title":"NIPS\u201918"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354206"},{"key":"ref27","first-page":"1689","article-title":"Is feature selection secure against training data poisoning?","volume-title":"ICML\u201915","volume":"37","author":"Xiao"},{"key":"ref28","first-page":"1467","volume-title":"Poisoning attacks against support vector machines","author":"Biggio","year":"2012"},{"key":"ref29","article-title":"A little is enough: Circumventing defenses for distributed learning","volume":"32","author":"Baruch","year":"2019","journal-title":"NeurIPS\u201919"},{"key":"ref30","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","author":"Wang","year":"2020"},{"key":"ref31","volume":"abs\/1911.07963","author":"Sun","year":"2019","journal-title":"Can you really backdoor federated learning?"},{"key":"ref32","article-title":"Byzantine stochastic gradient descent","volume":"31","author":"Alistarh","year":"2018"},{"key":"ref33","first-page":"903","article-title":"DRACO: Byzantine-resilient distributed training via redundant gradients","volume-title":"ICML\u201918","volume":"80","author":"Chen"},{"key":"ref34","volume":"abs\/1909.05125","author":"Mu\u00f1oz-Gonz\u00e1lez","year":"2019","journal-title":"Byzantine-robust federated machine learning through adaptive model averaging"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16849"},{"key":"ref36","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"AISTATS","author":"McMahan"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.204"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0328-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.05.055"},{"key":"ref40","article-title":"The mnist database of handwritten digits","author":"LeCun","year":"1998"}],"event":{"name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","location":"Tokyo, Japan","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,7]]}},"container-title":["2025 34th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11133715\/11133717\/11134006.pdf?arnumber=11134006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:15:53Z","timestamp":1756530953000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11134006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icccn65249.2025.11134006","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}