{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:12:19Z","timestamp":1730279539240,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1109\/iwcmc55113.2022.9824672","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T15:32:34Z","timestamp":1658244754000},"page":"1101-1106","source":"Crossref","is-referenced-by-count":5,"title":["Secure Federated Learning for IoT using DRL-based Trust Mechanism"],"prefix":"10.1109","author":[{"given":"Noora","family":"Al-Maslamani","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar"}]},{"given":"Mohamed","family":"Abdallah","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar"}]},{"given":"Bekir Sait","family":"Ciftler","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University,Division of Information and Computing Technology, College of Science and Engineering,Doha,Qatar"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900119"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.29007\/qfmh"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.29007\/21r5"},{"key":"ref15","article-title":"Learning to detect malicious clients for robust federated learning","author":"li","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2019.00018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.03.006"},{"key":"ref19","first-page":"279","volume":"8","author":"watkins","year":"1992","journal-title":"Q-learning &#x201D;Machine learning"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref3","article-title":"Federated learning: Strategies for improving communication efficiency","author":"konecny","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref5","article-title":"Biscotti: A ledger for private and secure peer-to-peer machine learning","author":"shayan","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221089"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2917133"},{"key":"ref2","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"AI and STATISTICS"},{"key":"ref1","first-page":"756","article-title":"D&#x00CF;oTt: A federated self-learning anomaly detection system for loT","author":"nguyen","year":"0","journal-title":"39th Int Conf on Dist Comp Sys (ICDCS)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00033"},{"key":"ref20","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"gu","year":"2017","journal-title":"arXivpreprintarXiv"}],"event":{"name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2022,5,30]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9823957\/9824097\/09824672.pdf?arnumber=9824672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T15:59:51Z","timestamp":1659974391000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9824672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iwcmc55113.2022.9824672","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]}}}