{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:10:45Z","timestamp":1770739845325,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012389","name":"Institute of Information and Communications Technology Planning and Evaluation (IITP) through Korean Government (MSIT)","doi-asserted-by":"publisher","award":["2019-0-01287"],"award-info":[{"award-number":["2019-0-01287"]}],"id":[{"id":"10.13039\/501100012389","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF) through MSIT under the Convergence Security Core Talent Training Business Support Program","doi-asserted-by":"publisher","award":["IITP-2023(2023)-RS-2023-00266615"],"award-info":[{"award-number":["IITP-2023(2023)-RS-2023-00266615"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IITP","award":["RS-2023-00207816"],"award-info":[{"award-number":["RS-2023-00207816"]}]},{"name":"IITP","award":["RS-2024-00352423"],"award-info":[{"award-number":["RS-2024-00352423"]}]},{"name":"Information Technology Research Center (IITP-ITRC) through MSIT","award":["IITP-2025-RS-2023-00258649"],"award-info":[{"award-number":["IITP-2025-RS-2023-00258649"]}]},{"name":"IITP through MSIT","award":["RS-2024-00509257"],"award-info":[{"award-number":["RS-2024-00509257"]}]},{"name":"Korea Research Institute for Defense Technology Planning and Advancement (KRIT) through the Defense Acquisition Program Administration","award":["KRIT-CT-24-001"],"award-info":[{"award-number":["KRIT-CT-24-001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,15]]},"DOI":"10.1109\/jiot.2025.3634793","type":"journal-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T18:46:56Z","timestamp":1763578016000},"page":"5957-5971","source":"Crossref","is-referenced-by-count":0,"title":["Robust Federated Learning With Heterogeneous Clients via Classifier Calibration and Alignment"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4045-8473","authenticated-orcid":false,"given":"Yu","family":"Qiao","sequence":"first","affiliation":[{"name":"School of Computing, Kyung Hee University, Yongin-si, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5608-7748","authenticated-orcid":false,"given":"Zilong","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0240-1214","authenticated-orcid":false,"given":"Avi Deb","family":"Raha","sequence":"additional","affiliation":[{"name":"School of Computing, Kyung Hee University, Yongin-si, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3970-1878","authenticated-orcid":false,"given":"Apurba","family":"Adhikary","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Noakhali Science and Technology University, Noakhali, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0184-6975","authenticated-orcid":false,"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[{"name":"School of Computing, Kyung Hee University, Yongin-si, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6606-5822","authenticated-orcid":false,"given":"Zhu","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Houston, Houston, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3484-7333","authenticated-orcid":false,"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Computing, Kyung Hee University, Yongin-si, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3555802"},{"key":"ref2","article-title":"Towards artificial general or personalized intelligence? A survey on foundation models for personalized federated intelligence","author":"Qiao","year":"2025","journal-title":"arXiv:2505.06907"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3616973"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3776745"},{"key":"ref5","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref6","article-title":"FAT: Federated adversarial training","author":"Zizzo","year":"2020","journal-title":"arXiv:2012.01791"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3507273"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3314512"},{"key":"ref9","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Goodfellow"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.25955"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102645"},{"key":"ref12","first-page":"1","article-title":"Geometry-aware instance-reweighted adversarial training","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zhang"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i9.26331"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS67058.2025.11181363"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154273"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621333"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3487473"},{"key":"ref18","article-title":"Boosting federated learning convergence with prototype regularization","author":"Qiao","year":"2023","journal-title":"arXiv:2307.10575"},{"key":"ref19","first-page":"18","article-title":"Knowledge distillation in federated learning: Where and how to distill?","volume-title":"Proc. 24st Asia\u2013Pacific Netw. Oper. Manage. Symp.","author":"Qiao"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN56518.2023.10048999"},{"key":"ref21","article-title":"Prototype helps federated learning: Towards faster convergence","author":"Qiao","year":"2023","journal-title":"arXiv:2303.12296"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20819"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3320250"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01565"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.107017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2025.107345"},{"key":"ref27","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3344808"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref32","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Croce"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref34","first-page":"2484","article-title":"Simple black-box adversarial attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Guo"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3538707"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3424188"},{"key":"ref37","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2017","journal-title":"arXiv:1708.06733"},{"key":"ref38","article-title":"Label-consistent backdoor attacks","author":"Turner","year":"2019","journal-title":"arXiv:1912.02771"},{"key":"ref39","first-page":"3569","article-title":"CalFAT: Calibrated federated adversarial training with label skewness","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3625558"},{"key":"ref41","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2024"},{"key":"ref42","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv:1708.07747"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref44","first-page":"7252","article-title":"Bayesian nonparametric federated learning of neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yurochkin"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref46","article-title":"Adversarial logit pairing","author":"Kannan","year":"2018","journal-title":"arXiv:1803.06373"},{"key":"ref47","first-page":"1","article-title":"Improving adversarial robustness requires revisiting misclassified examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Wang"},{"key":"ref48","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3610626"},{"key":"ref50","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"Tian","year":"2018","journal-title":"Mach. Learn. Syst."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036952"},{"key":"ref52","article-title":"On the convergence of FedAvg on non-IID data","author":"Li","year":"2019","journal-title":"arXiv:1907.02189"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11372629\/11261380.pdf?arnumber=11261380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:08:54Z","timestamp":1770671334000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11261380\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,15]]},"references-count":52,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3634793","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,15]]}}}