{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T23:12:50Z","timestamp":1768777970186,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T00:00:00Z","timestamp":1684540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,20]],"date-time":"2023-05-20T00:00:00Z","timestamp":1684540800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52102400"],"award-info":[{"award-number":["52102400"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,20]]},"DOI":"10.1109\/infocomwkshps57453.2023.10225791","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:33:28Z","timestamp":1693330408000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems"],"prefix":"10.1109","author":[{"given":"Chong","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, South China University of Technology,Guangzhou,China"}]},{"given":"Ying","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, South China University of Technology,Guangzhou,China"}]},{"given":"Siquan","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, South China University of Technology,Guangzhou,China"}]},{"given":"Xingfu","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Computer Science, South China Normal University,Guangzhou,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3149335"},{"key":"ref3","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics","author":"McMahan","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3128646"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00042"},{"key":"ref6","article-title":"Poisoning attacks against support vector machines","author":"Biggio","year":"2012","journal-title":"arXiv preprint"},{"key":"ref7","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, ser. Proceedings of Machine Learning Research","volume":"108","author":"Bagdasaryan"},{"key":"ref8","article-title":"Explaining and harnessing adversarial examples","volume-title":"3rd International Conference on Learning Representations, ICLR 2015","author":"Goodfellow","year":"2015"},{"key":"ref9","article-title":"An efficient frame-work for clustered federated learning","author":"Ghosh","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.ins.2018.04.065","article-title":"Modeling and clustering attacker activities in iot through machine learning techniques","volume":"479","author":"Sun","year":"2019","journal-title":"Information Sciences"},{"key":"ref11","first-page":"10859","article-title":"Robust learning for data poisoning attacks","volume-title":"International Conference on Machine Learning. PMLR","author":"Wang","year":"2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00103"},{"key":"ref13","article-title":"Ma-chine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref14","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"International Conference on Machine Learning. PMLR","author":"Yin","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3156645"},{"key":"ref16","article-title":"Robust federated learning in a heterogeneous environment","author":"Ghosh","year":"2019","journal-title":"arXiv preprint"},{"key":"ref17","first-page":"2611","article-title":"Heterogeneity for the win: One-shot federated clustering","volume-title":"International Conference on Machine Learning. PMLR","author":"Dennis","year":"2021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01617"},{"key":"ref19","article-title":"Contamination attacks and mitigation in multi-party machine learning","volume":"31","author":"Hayes","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.29007\/qfmh"},{"key":"ref21","article-title":"Federated multi-task learning","author":"Smith","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref23","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref25","first-page":"508","article-title":"Auror: Defending against poisoning attacks in collaborative deep learning systems","volume-title":"Proceedings of the 32nd Annual Conference on Computer Security Applications, ser. ACSAC 16","author":"Shen","year":"2016"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","location":"Hoboken, NJ, USA","start":{"date-parts":[[2023,5,20]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225747\/10225748\/10225791.pdf?arnumber=10225791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T21:18:51Z","timestamp":1709327931000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10225791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,20]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/infocomwkshps57453.2023.10225791","relation":{},"subject":[],"published":{"date-parts":[[2023,5,20]]}}}