{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:54:12Z","timestamp":1763193252818,"version":"3.45.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1109\/ijcnn64981.2025.11227961","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:15Z","timestamp":1763145975000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Security Threats to Explainable Classifiers in Federated Learning"],"prefix":"10.1109","author":[{"given":"Mattia","family":"Daole","sequence":"first","affiliation":[{"name":"University of Pisa,Dept. of Information Engineering,Pisa,Italy,56122"}]},{"given":"Pietro","family":"Ducange","sequence":"additional","affiliation":[{"name":"University of Pisa,Dept. of Information Engineering,Pisa,Italy,56122"}]},{"given":"Francisco","family":"Herrera","sequence":"additional","affiliation":[{"name":"University of Granada,DaSCI,Dept. of Computer Science and Artificial Intelligence,Spain"}]},{"given":"Francesco","family":"Marcelloni","sequence":"additional","affiliation":[{"name":"University of Pisa,Dept. of Information Engineering,Pisa,Italy,56122"}]},{"given":"Alessandro","family":"Renda","sequence":"additional","affiliation":[{"name":"University of Pisa,Dept. of Information Engineering,Pisa,Italy,56122"}]},{"given":"Nuria","family":"Rodr\u00edguez-Barroso","sequence":"additional","affiliation":[{"name":"University of Granada,DaSCI,Dept. of Computer Science and Artificial Intelligence,Spain"}]}],"member":"263","reference":[{"year":"2019","key":"ref1","article-title":"Ethics Guidelines for Trustworthy AI, Technical Report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3236009"},{"key":"ref4","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume-title":"Proc. of the 20th Int\u2019l Conf. on Artificial Intelligence and Statistics","volume":"54","author":"McMahan"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref6","article-title":"Fed-XAI: Federated Learning of Explainable Artificial Intelligence Models","author":"Corcuera B\u00e1rcena","year":"2022","journal-title":"XAI.it: 3rd Italian WS on Explainable Artificial Intelligence, co-located with AI*IA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38333-5_32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17098-0_20"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s44230-023-00032-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2021.3118733"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE55066.2022.9882881"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00185"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102598"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE60900.2024.10612109"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.09.011"},{"key":"ref18","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume-title":"Proc. of the 20th Int\u2019l Conf. on Artificial Intelligence and Statistics","volume":"54","author":"McMahan"},{"article-title":"IBM Federated Learning: an Enterprise Framework White Paper V0.1","year":"2020","author":"Ludwig","key":"ref19"},{"key":"ref20","first-page":"2938","article-title":"How To Backdoor Federated Learning","volume-title":"Proc. of the 23 Int\u2019l Conf. on Artificial Intelligence and Statistics","volume":"108","author":"Bagdasaryan"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/AFSAT"},{"article-title":"MAGIC Gamma Telescope","year":"2007","author":"Bock","key":"ref22"},{"article-title":"Towards Trustworthy AI for QoE prediction in B5G\/6G Networks","volume-title":"First Int\u2019l Workshop on Artificial Intelligence in Beyond 5G and 6G Wireless Networks (AI6G)","author":"B\u00e1rcena","key":"ref23"}],"event":{"name":"2025 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2025,6,30]]},"location":"Rome, Italy","end":{"date-parts":[[2025,7,5]]}},"container-title":["2025 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11227166\/11227148\/11227961.pdf?arnumber=11227961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:51:58Z","timestamp":1763193118000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ijcnn64981.2025.11227961","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]}}}