{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:06:59Z","timestamp":1772910419566,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/jiot.2022.3172936","type":"journal-article","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T19:58:36Z","timestamp":1651867116000},"page":"5719-5732","source":"Crossref","is-referenced-by-count":30,"title":["A Triggerless Backdoor Attack and Defense Mechanism for Intelligent Task Offloading in Multi-UAV Systems"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8524-2855","authenticated-orcid":false,"given":"Shafkat","family":"Islam","sequence":"first","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6663-2164","authenticated-orcid":false,"given":"Shahriar","family":"Badsha","sequence":"additional","affiliation":[{"name":"Department of IoT Systems Engineering, Bosch Engineering-North America, Farmington Hills, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5512-114X","authenticated-orcid":false,"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9440-7669","authenticated-orcid":false,"given":"Mohammed","family":"Atiquzzaman","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Oklahoma, Norman, OK, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3825-3930","authenticated-orcid":false,"given":"Charalambos","family":"Konstantinou","sequence":"additional","affiliation":[{"name":"Division of Computer, Electrical and Mathematical Sciences and Engineering, King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924143"},{"key":"ref2","first-page":"21","article-title":"Performance evaluation of multiple UAV systems for remote sensing in agriculture","volume-title":"Proc. Workshop Robotic Vis. Action Agr. IEEE Int. Conf. Robot. Autom. (ICRA)","author":"Ju"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2021.3087339"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3088672"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.2867614"},{"key":"ref6","article-title":"Resilient non-submodular maximization over matroid constraints","volume-title":"arXiv:1804.01013","author":"Tzoumas","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2881296"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342149"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8693023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3061435"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00105"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3005117"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2902862"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2898903"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2710056"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2018.09.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989450"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2017.7991498"},{"key":"ref19","volume-title":"B. C. Wildfires: Evacuation Added as Wildfire Flares Near Kamloops but Order Lifted in Okanagan","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3036871"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377343"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3059691"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406881"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2978830"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref26","article-title":"Federated reinforcement learning","volume-title":"arXiv:1901.08277","author":"Zhuo","year":"2019"},{"key":"ref27","article-title":"Design of intentional backdoors in sequential models","volume-title":"arXiv:1902.09972","author":"Yang","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/509"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218663"},{"key":"ref30","article-title":"Don\u2019t trigger me! A triggerless backdoor attack against deep neural networks","volume-title":"arXiv:2010.03282","author":"Salem","year":"2020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3024170"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026589"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369456"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM51794.2021.00016"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906789"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9302930"},{"key":"ref38","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","volume-title":"arXiv:1708.06733","author":"Gu","year":"2017"},{"key":"ref39","article-title":"BAAAN: Backdoor attacks against autoencoder and GAN-based machine learning models","volume-title":"arXiv:2010.03007","author":"Salem","year":"2020"},{"key":"ref40","article-title":"BadNL: Backdoor attacks against NLP models","volume-title":"arXiv:2006.01043","author":"Chen","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM41954.2020.9281719"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195685"},{"key":"ref44","article-title":"Playing Atari with deep reinforcement learning","volume-title":"arXiv:1312.5602","author":"Mnih","year":"2013"},{"key":"ref45","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2405539"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3014896"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2007.899161"},{"key":"ref50","volume-title":"Deep Learning","volume":"1","author":"Goodfellow","year":"2016"},{"key":"ref51","article-title":"On the convergence of FedAvg on non-iid data","volume-title":"arXiv:1907.02189","author":"Li","year":"2019"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3035770"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91578-4"},{"key":"ref54","volume-title":"Keras","author":"Chollet","year":"2015"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6915442"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10079218\/09770193.pdf?arnumber=9770193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T23:13:04Z","timestamp":1705965184000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9770193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":55,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3172936","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}