{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:23:32Z","timestamp":1761402212480,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:00:00Z","timestamp":1634688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:00:00Z","timestamp":1634688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T00:00:00Z","timestamp":1634688000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100014188","name":"MSIT (Ministry of Science and ICT)","doi-asserted-by":"publisher","award":["2019-0-01343"],"award-info":[{"award-number":["2019-0-01343"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,20]]},"DOI":"10.1109\/ictc52510.2021.9620836","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:49:57Z","timestamp":1638910197000},"page":"1691-1696","source":"Crossref","is-referenced-by-count":6,"title":["Are You a Good Client? Client Classification in Federated Learning"],"prefix":"10.1109","author":[{"given":"Hyejun","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Jaeju","family":"An","sequence":"additional","affiliation":[]},{"given":"Jaehoon","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-021-00750-y"},{"key":"ref11","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"ArXiv Preprint"},{"key":"ref12","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"0","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref14","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"chen","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref16","article-title":"Backdoor embedding in convolutional neural network models via invisible perturbation","author":"liao","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.29007\/21r5"},{"key":"ref18","article-title":"Fltrust: Byzantine-robust federated learning via trust bootstrapping","author":"cao","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref4","article-title":"A survey towards federated semi-supervised learning","author":"jin","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref3","first-page":"26","article-title":"Distributed learning, communication complexity and privacy","author":"balcan","year":"0","journal-title":"Conference on Learning Theory JMLR Workshop and Conference Proceedings"},{"key":"ref6","first-page":"425","article-title":"Gaussian process subset scanning for anomalous pattern detection in non-iid data","author":"herlands","year":"0","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"key":"ref5","article-title":"Advances and open problems in federated learning","author":"kairouz","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1613\/jair.3623","article-title":"Toward supervised anomaly detection","volume":"46","author":"g\u00f6initz","year":"2013","journal-title":"The Journal of Artificial Intelligence Research"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015541"},{"key":"ref2","article-title":"A survey on data collection for ma-chine learning: a big data-ai integration perspective","author":"roh","year":"2019","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3057914"},{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref22","article-title":"Federated learning with non-iid data","author":"zhao","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref24","article-title":"Differentially private federated learning: A client level perspective","author":"geyer","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904348"},{"journal-title":"Deep residual learning for image recognition","year":"2015","author":"he","key":"ref26"},{"key":"ref25","article-title":"Mitigating backdoor attacks in federated learning","author":"wu","year":"2020","journal-title":"ArXiv Preprint"}],"event":{"name":"2021 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2021,10,20]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2021,10,22]]}},"container-title":["2021 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9620727\/9620211\/09620836.pdf?arnumber=9620836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:41Z","timestamp":1652201621000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9620836\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,20]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ictc52510.2021.9620836","relation":{},"subject":[],"published":{"date-parts":[[2021,10,20]]}}}