{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:54:12Z","timestamp":1766602452134,"version":"3.48.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Foundation of Key Points of the Joint Foundation of National Natural Science Foundation of China","award":["U24A20241"],"award-info":[{"award-number":["U24A20241"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202118"],"award-info":[{"award-number":["62202118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018533","name":"Major Scientific and Technological Special Project of Guizhou Province","doi-asserted-by":"publisher","award":["[2024]014"],"award-info":[{"award-number":["[2024]014"]}],"id":[{"id":"10.13039\/501100018533","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific and Technological Research Projects from Guizhou Education Department","award":["[2023]003"],"award-info":[{"award-number":["[2023]003"]}]},{"name":"Provincial Department of Science and Technology\u2019s Hundred Level Innovation Talents Project","award":["[2023]018"],"award-info":[{"award-number":["[2023]018"]}]},{"name":"Guizhou Province Major Project","award":["[2024]003"],"award-info":[{"award-number":["[2024]003"]}]},{"name":"Foundation of Chongqing Key Laboratory of Public Big Data Security Technology","award":["CQKL-QJ202300001"],"award-info":[{"award-number":["CQKL-QJ202300001"]}]},{"name":"Science and Technology Program of GuiYang","award":["ZK[2024]-1-2"],"award-info":[{"award-number":["ZK[2024]-1-2"]}]},{"name":"Guizhou Provincial Basic Research Program","award":["ZK[2024](652)"],"award-info":[{"award-number":["ZK[2024](652)"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,1,1]]},"DOI":"10.1109\/jiot.2025.3629325","type":"journal-article","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:41:26Z","timestamp":1762368086000},"page":"1475-1489","source":"Crossref","is-referenced-by-count":0,"title":["FedCoguard: A Defense Framework for Federated Learning Against Untargeted Poisoning Attacks in Sustainable Agricultural IoT"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0673-0779","authenticated-orcid":false,"given":"Hongjie","family":"Luo","sequence":"first","affiliation":[{"name":"State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8674-8356","authenticated-orcid":false,"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology and the State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1104-5039","authenticated-orcid":false,"given":"Dapeng","family":"Lan","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Shenyang Institute of Automation, Shenyang, Liaoning, China"}]},{"given":"Hui","family":"Dou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology and the State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"}]},{"given":"Keshi","family":"Xiong","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology and the State Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6853-5878","authenticated-orcid":false,"given":"Celimuge","family":"Wu","sequence":"additional","affiliation":[{"name":"Meta-Networking Research Center, The University of Electro-Communications, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1003925"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003536"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2025.0238"},{"key":"ref4","first-page":"150","article-title":"Smart farming: The IoT based future agriculture","volume-title":"Proc. 4th Int. Conf. Smart Syst. Inventive Technol. (ICSSIT)","author":"Sridharani"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3486369"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3210154"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.9734\/ijecc\/2023\/v13i82080"},{"key":"ref8","article-title":"Smart agriculture\u2013urgent need of the day in developing countries","volume":"30","author":"Goel","year":"2021","journal-title":"Sustain. Comput., Informat. Syst."},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1016\/j.compag.2025.110048","article-title":"Agricultural data privacy and federated learning: A review of challenges and opportunities","volume":"232","author":"Dembani","year":"2025","journal-title":"Comput. Electron. Agricult."},{"issue":"5","key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2024.103789","article-title":"Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption","volume":"61","author":"Luo","year":"2024","journal-title":"Inf. Process. Manage."},{"key":"ref11","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3306778"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3352432"},{"key":"ref14","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref15","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"Yin"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref18","first-page":"840","article-title":"Sageflow: Robust federated learning against both stragglers and adversaries","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Park"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3461449"},{"key":"ref20","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Nguyen"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3516548"},{"issue":"13","key":"ref22","first-page":"14677","article-title":"Resisting backdoor attacks in federated learning via bidirectional elections and individual perspective","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"38","author":"Qin"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3389\/fpls.2016.01419"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref25","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv:1708.07747"},{"key":"ref26","first-page":"4","article-title":"Reading digits in natural images with unsupervised feature learning","volume-title":"Proc. NIPS Workshop Deep Learn. Unsupervised Feature Learn.","author":"Netzer"},{"key":"ref27","article-title":"Learning multiple layers of features from tiny images","volume":"4","author":"Krizhevsky","year":"2024","journal-title":"Handbook Systemic Autoimmune Diseases"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1016\/j.compag.2023.107930","article-title":"Maize yield prediction using federated random forest","volume":"210","author":"Zhang","year":"2023","journal-title":"Comput. Electron. Agricult."},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1016\/j.atech.2023.100277","article-title":"Federated learning: Crop classification in a smart farm decentralised network","volume":"5","author":"Idoje","year":"2023","journal-title":"Smart Agricult. Technol."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EDiS57230.2022.9996498"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3370373"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCECE60827.2024.10548604"},{"key":"ref33","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Fang"},{"key":"ref34","first-page":"8635","article-title":"A little is enough: Circumventing defenses for distributed learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Baruch"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"ref36","first-page":"261","article-title":"Fall of empires: Breaking Byzantine-tolerant SGD by inner product manipulation","volume-title":"Proc. 35th Uncertainty Artif. Intell. Conf.","author":"Xie"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00120"},{"issue":"3","key":"ref38","first-page":"75","article-title":"Community detection in graphs","volume-title":"Phys. Rep.","volume":"486","author":"Fortunato","year":"2010"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/p10008"},{"key":"ref40","first-page":"228","article-title":"Robust early-learning: Hindering the memorization of noisy labels","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xia"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3044223"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539231"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00461"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/BF01582063"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00077"},{"key":"ref46","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lin"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11313656\/11227119.pdf?arnumber=11227119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:47:44Z","timestamp":1766602064000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,1]]},"references-count":46,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3629325","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2026,1,1]]}}}