{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:26:01Z","timestamp":1772450761021,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"23","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Postdoctoral Fellowship Program of Cleavage and Polyadenylation Specificity Factor","award":["GZB20230938"],"award-info":[{"award-number":["GZB20230938"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M740246"],"award-info":[{"award-number":["2023M740246"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024T171132"],"award-info":[{"award-number":["2024T171132"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FDCT under its General Research and Development Subsidy Program Fund, Macau","award":["0038\/2022\/A"],"award-info":[{"award-number":["0038\/2022\/A"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC-FDCT under its Joint Scientific Research Project Fund, China, and Macau","doi-asserted-by":"publisher","award":["0051\/2022\/AFJ"],"award-info":[{"award-number":["0051\/2022\/AFJ"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,12,1]]},"DOI":"10.1109\/jiot.2024.3438150","type":"journal-article","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T17:24:18Z","timestamp":1723829058000},"page":"37718-37730","source":"Crossref","is-referenced-by-count":9,"title":["One-Shot Backdoor Removal for Federated Learning"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7644-1334","authenticated-orcid":false,"given":"Zijie","family":"Pan","sequence":"first","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1658-4931","authenticated-orcid":false,"given":"Zuobin","family":"Ying","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0962-4464","authenticated-orcid":false,"given":"Yajie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7684-8540","authenticated-orcid":false,"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2543-1678","authenticated-orcid":false,"given":"Chunhai","family":"Li","sequence":"additional","affiliation":[{"name":"Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, Guilin University of Electronic Technology, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist., (AISTATS)","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2024.3362191"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3095077"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2023.3324975"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3283353"},{"issue":"4","key":"ref7","doi-asserted-by":"crossref","first-page":"1742","DOI":"10.1109\/TCSS.2023.3259431","article-title":"Hierarchical federated learning with social context clustering-based participant selection for Internet of Medical Things applications","volume":"10","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"4","key":"ref8","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s00607-022-01117-x","article-title":"Adaptive vertical federated learning via feature map transferring in mobile edge computing","volume":"106","author":"Li","year":"2024","journal-title":"Computing"},{"issue":"5","key":"ref9","doi-asserted-by":"crossref","first-page":"4092","DOI":"10.1109\/TMC.2023.3288392","article-title":"Federated learning with dynamic epoch adjustment and collaborative training in mobile edge computing","volume":"23","author":"Xiang","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"ref10","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/TKDE.2023.3309858","article-title":"FlGan: GAN-based unbiased federated learning under non-IID settings","volume":"36","author":"Ma","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"19","key":"ref11","doi-asserted-by":"crossref","first-page":"17307","DOI":"10.1109\/JIOT.2023.3276865","article-title":"Communication-efficient federated learning on non-IID data using two-step knowledge distillation","volume":"10","author":"Wen","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"ref12","doi-asserted-by":"crossref","first-page":"2272","DOI":"10.1109\/JIOT.2022.3152829","article-title":"Joint training and resource allocation optimization for federated learning in UAV swarm","volume":"10","author":"Shen","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"ref13","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1109\/TNET.2022.3231986","article-title":"Enhancing federated learning with spectrum allocation optimization and device selection","volume":"31","author":"Zhang","year":"2023","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"7","key":"ref14","doi-asserted-by":"crossref","first-page":"12115","DOI":"10.1109\/JIOT.2023.3334298","article-title":"FedXPro: Bayesian inference for mitigating poisoning attacks in IoT federated learning","volume":"11","author":"Indrasiri","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"5749","DOI":"10.1109\/TIFS.2023.3315125","article-title":"APFed: Anti-poisoning attacks in privacy-preserving heterogeneous federated learning","volume":"18","author":"Chen","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref16","first-page":"12613","article-title":"FL-WBC: enhancing robustness against model poisoning attacks in federated learning from a client perspective","volume-title":"Proc. 34th Annu. Conf. Neural Inf. Process. Syst. NeurIPS","author":"Sun"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102819","article-title":"Defense against backdoor attack in federated learning","volume":"121","author":"Lu","year":"2022","journal-title":"Comput. Secur."},{"issue":"1","key":"ref19","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/TDSC.2021.3135422","article-title":"LoMar: A local defense against poisoning attack on federated learning","volume":"20","author":"Li","year":"2023","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2951","DOI":"10.1109\/TIFS.2024.3352415","article-title":"RoseAgg: Robust defense against targeted collusion attacks in federated learning","volume":"19","author":"Yang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref21","first-page":"1","article-title":"Trojaning attack on neural networks","volume-title":"Proc. 25th Annu. Netw. Distrib. Syst. Secur. Symp., (NDSS)","author":"Liu"},{"issue":"1","key":"ref22","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TNNLS.2022.3182979","article-title":"Backdoor learning: A survey","volume":"35","author":"Li","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.107166","article-title":"Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions","volume":"127","author":"Nguyen","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref24","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Statist., (AISTATS)","author":"Bagdasaryan"},{"issue":"10","key":"ref25","doi-asserted-by":"crossref","first-page":"6526","DOI":"10.1109\/TII.2022.3156645","article-title":"ADFL: A poisoning attack defense framework for horizontal federated learning","volume":"18","author":"Guo","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"issue":"9","key":"ref26","doi-asserted-by":"crossref","first-page":"6388","DOI":"10.1109\/TII.2021.3132954","article-title":"RobustFL: Robust federated learning against poisoning attacks in industrial IoT systems","volume":"18","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/TIFS.2022.3169918","article-title":"ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning","volume":"17","author":"Ma","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref28","first-page":"428","article-title":"Adaptive clipping bound of deep learning with differential privacy","volume-title":"Proc. 20th IEEE Int. Conf. Trust, Security Privacy Comput. Commun., TrustCom","author":"Hu"},{"issue":"3","key":"ref29","doi-asserted-by":"crossref","first-page":"2141","DOI":"10.1109\/JIOT.2021.3081606","article-title":"D2MIF: A malicious model detection mechanism for federated-learning-empowered artificial intelligence of Things","volume":"10","author":"Liu","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref30","first-page":"665","article-title":"Anomaly detection with robust deep autoencoders","volume-title":"Proc. 23rd ACM SIGKDD Int. Conf. Knowl. Discovery Data Min.","author":"Zhou"},{"issue":"3","key":"ref31","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/IOTM.001.2200048","article-title":"Federated and transfer learning-empowered intrusion detection for IoT applications","volume":"5","author":"Otoum","year":"2022","journal-title":"IEEE Internet Things Mag."},{"key":"ref32","first-page":"20373","article-title":"Excess capacity and backdoor poisoning","volume-title":"Proc. 34th Annu. Conf. Neural Inf. Process. Syst. NeurIPS","author":"Manoj"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101107","article-title":"Proof-of-authority-based secure and efficient aggregation with differential privacy for federated learning in industrial IoT","volume":"25","author":"Putra","year":"2024","journal-title":"Internet Things"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.120481","article-title":"Secure and efficient federated learning via novel multi-party computation and compressed sensing","volume":"667","author":"Chen","year":"2024","journal-title":"Inf. Sci."},{"issue":"5","key":"ref35","doi-asserted-by":"crossref","first-page":"9047","DOI":"10.1109\/JIOT.2023.3322221","article-title":"Secure and efficient blockchain-based federated learning approach for VANETs","volume":"11","author":"Asad","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref36","first-page":"22285","article-title":"One-shot neural backdoor erasing via adversarial weight masking","volume-title":"Proc. 35th Annu. Conf. Neural Inf. Process. Syst. NeurIPS","author":"Chai"},{"key":"ref37","article-title":"Black-box backdoor defense via zero-shot image purification","volume-title":"Proc. 36th Annu. Conf. Neural Inf. Process. Syst. NeurIPS","author":"Shi"},{"key":"ref38","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. 33rd Annu. Conf. Neural Inf. Process. Syst. NeurIPS","author":"Wang"},{"key":"ref39","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. 30th Annu. Conf. Neural Inf. Process. Syst.","author":"Blanchard"},{"issue":"3","key":"ref40","first-page":"211","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"ref41","first-page":"1415","article-title":"FLAME: Taming Backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Nguyen"},{"key":"ref42","first-page":"5636","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. 35th Int. Conf. Mach. Learn., (ICML)","author":"Yin"},{"key":"ref43","article-title":"LEAF: A benchmark for federated settings","author":"Caldas","year":"2018","journal-title":"arXiv:1812.01097"},{"key":"ref44","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref45","first-page":"4743","article-title":"Revisiting personalized federated learning: Robustness against backdoor attacks","volume-title":"Proc. 29th ACM SIGKDD Conf. Knowl. Discovery Data Min., (KDD)","author":"Qin"},{"key":"ref46","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref47","first-page":"1","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. 8th Int. Conf. Learn. Represent., (ICLR)","author":"Xie"},{"issue":"11","key":"ref48","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10759336\/10638150.pdf?arnumber=10638150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:28:09Z","timestamp":1732667289000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10638150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,1]]},"references-count":48,"journal-issue":{"issue":"23"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3438150","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,1]]}}}