{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:25:23Z","timestamp":1776399923711,"version":"3.51.2"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2019YFB2102000"],"award-info":[{"award-number":["2019YFB2102000"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672283"],"award-info":[{"award-number":["61672283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004750","name":"Science and Technology on Avionics Integration Laboratory and the National Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["20175552039"],"award-info":[{"award-number":["20175552039"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postgraduate Research and Practice Innovation Program of Jiangsu Province","award":["KYCX18_0308"],"award-info":[{"award-number":["KYCX18_0308"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/jiot.2020.3023126","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T21:13:41Z","timestamp":1599772421000},"page":"3310-3322","source":"Crossref","is-referenced-by-count":255,"title":["PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2143-5666","authenticated-orcid":false,"given":"Jiale","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2863-5441","authenticated-orcid":false,"given":"Bing","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1976-6113","authenticated-orcid":false,"given":"Huynh Thi Thanh","family":"Binh","sequence":"additional","affiliation":[{"name":"School of Information and Communication Technology, Hanoi University of Science and Technology, Hanoi, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Technology Sydney, Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref38","first-page":"981","article-title":"Learning to pivot with adversarial networks","author":"louppe","year":"2017","journal-title":"Proc Conf Neural Inf Process Syst (NIPS)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140450"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991125"},{"key":"ref30","first-page":"870","article-title":"Adversarial label flips attack on support vector machines","author":"xiao","year":"2012","journal-title":"Proc 20th Eur Conf Artif Intell (ECAI)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_42"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref35","author":"zhao","year":"2018","journal-title":"Federated learning with non-IID data"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref13","first-page":"6604","article-title":"Contamination attacks and mitigation in multi-party machine learning","author":"hayes","year":"2018","journal-title":"Proc Conf Neural Inf Process Syst (NIPS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"key":"ref15","first-page":"1807","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"Proc 29th Int Conf Mech Learn (ICML)"},{"key":"ref16","first-page":"2871","article-title":"Using machine teaching to identify optimal training-set attacks on machine learners","author":"mei","year":"2015","journal-title":"Proc 29th AAAI Conf Artif Intell"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"},{"key":"ref18","first-page":"4274","article-title":"Data poisoning attacks in multi-party learning","author":"mahloujifar","year":"2019","journal-title":"Proc Int Conf Machine Learn (ICML)"},{"key":"ref19","first-page":"1","article-title":"How to backdoor federated learning","author":"bagdasaryan","year":"2020","journal-title":"Proc 23rd Int Conf Artif Intell Stat (AISTATS)"},{"key":"ref28","first-page":"1689","article-title":"Is feature selection secure against training data poisoning?","author":"xiao","year":"2015","journal-title":"Proc Int Conf Machine Learn (ICML)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.081"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014272"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"ref9","author":"bhagoji","year":"2018","journal-title":"Analyzing federated learning through an adversarial lens"},{"key":"ref1","first-page":"1","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Proc 20th Int Conf Artif Intell Stat (AISTATS)"},{"key":"ref20","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","author":"blanchard","year":"2017","journal-title":"Proc Conf Neural Inf Process Syst (NIPS)"},{"key":"ref22","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","author":"fang","year":"2020","journal-title":"Proc Usenix Security Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170807"},{"key":"ref24","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Conf Neural Inf Process Syst (NIPS)"},{"key":"ref23","author":"yang","year":"2017","journal-title":"Generative poisoning attack method against neural networks"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2344095"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9358034\/09194010.pdf?arnumber=9194010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:52Z","timestamp":1652194432000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9194010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":38,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3023126","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}