{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:58:55Z","timestamp":1775627935659,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00067","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"446-451","source":"Crossref","is-referenced-by-count":0,"title":["MADE-PI: Framework for Effective Anomaly Detection in Federated Learning Applications"],"prefix":"10.1109","author":[{"given":"Raman","family":"Zatsarenko","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology,Rochester,NY,USA"}]},{"given":"Sergei","family":"Chuprov","sequence":"additional","affiliation":[{"name":"The University of Texas Rio Grande Valley,Edinburg,TX,USA"}]},{"given":"Dmitrii","family":"Korobeinikov","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Rochester,NY,USA"}]},{"given":"Leon","family":"Reznik","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Rochester,NY,USA"}]},{"given":"Adrian","family":"Pe\u00f1a","sequence":"additional","affiliation":[{"name":"The University of Texas Rio Grande Valley,Edinburg,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s22228784"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800172"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3168806"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM58377.2023.10356344"},{"key":"ref5","first-page":"102402","article-title":"Privacy preservation in federated learning: An insightful survey from the gdpr perspective","volume-title":"Computers & Security","volume":"110","author":"Truong","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.02.025"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.2478\/popets-2022-0043","article-title":"User-level label leakage from gradients in federated learning","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Wainakh"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2886795"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-44153-0_20"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2025.3549233"},{"key":"ref11","first-page":"1354","article-title":"Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning","volume-title":"2022 IEEE Symposium on Security and Privacy (SP)","author":"Shejwalkar"},{"key":"ref12","article-title":"Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Blanchard"},{"key":"ref13","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","author":"McMahan","year":"2017"},{"key":"ref14","first-page":"5650","article-title":"Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates","volume-title":"Proceedings of the 35th International Conference on Machine Learning","author":"Yin"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000552"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-022-01721-8"},{"key":"ref17","article-title":"Leaf: A benchmark for federated settings","author":"Caldas","year":"2018"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-58951-6_24","article-title":"Data Poisoning Attacks Against Federated Learning Systems","author":"Tolpegin","year":"2020"},{"key":"ref19","first-page":"19","article-title":"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning","volume-title":"2018 IEEE Symposium on Security and Privacy (SP)","author":"Jagielski"},{"key":"ref20","article-title":"When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks","author":"Suciu"},{"issue":"3","key":"ref21","first-page":"711","article-title":"Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning","volume-title":"The Computer Journal","volume":"66","author":"Tian","year":"2023"},{"key":"ref22","article-title":"Is Feature Selection Secure against Training Data Poisoning?","author":"Xiao"},{"key":"ref23","article-title":"Local Model Poisoning Attacks to Byzantine-Robust Federated Learning","author":"Fang","year":"2021"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2021.24498","article-title":"Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning","volume-title":"Proceedings 2021 Network and Distributed System Security Symposium. Virtual: Internet Society","author":"Shejwalkar"},{"key":"ref25","article-title":"How To Backdoor Federated Learning","author":"Bagdasaryan","year":"2019"},{"key":"ref26","first-page":"1142","article-title":"Robust Aggregation for Federated Learning","volume-title":"IEEE Transactions on Signal Processing","volume":"70","author":"Pillutla","year":"2022"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2021.24434","article-title":"FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping","volume-title":"Proceedings 2021 Network and Distributed System Security Symposium. Virtual: Internet Society","author":"Cao"},{"key":"ref28","first-page":"3521","article-title":"The Hidden Vulnerability of Distributed Learning in Byzantium","volume-title":"Proceedings of the 35th International Conference on Machine Learning","author":"Mhamdi"},{"key":"ref29","first-page":"301","article-title":"The Limitations of Federated Learning in Sybil Settings","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)","author":"Fung"},{"key":"ref30","first-page":"70476","article-title":"Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning","author":"Xu","year":"2024"},{"key":"ref31","first-page":"5832","article-title":"Byzantine-Resilient Stochastic Gradient Descent for Distributed Learning: A Lipschitz-Inspired Coordinate-wise Median Approach","volume-title":"2019 IEEE 58th Conference on Decision and Control (CDC)","author":"Yang"},{"key":"ref32","first-page":"273","article-title":"Trust-Based Anomaly Detection in Federated Edge Learning","volume-title":"2024 IEEE World AI IoT Congress (AIIoT)","author":"Zatsarenko"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-3584.1922.tb04958.x"},{"key":"ref34","article-title":"Flower: A friendly federated learning research framework","author":"Beutel","year":"2020"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471394.pdf?arnumber=11471394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:19:23Z","timestamp":1775625563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471394\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00067","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}