{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:01:04Z","timestamp":1773511264085,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"JSPS KAKENHI","award":["23K11072"],"award-info":[{"award-number":["23K11072"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2019"],"award-info":[{"award-number":["U21B2019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972255"],"award-info":[{"award-number":["61972255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61831007"],"award-info":[{"award-number":["61831007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2003206"],"award-info":[{"award-number":["U2003206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program of Shanghai Academic Young Research Leader","award":["20XD1422000"],"award-info":[{"award-number":["20XD1422000"]}]},{"name":"National Social Science Foundation Major Project","award":["20&ZD140"],"award-info":[{"award-number":["20&ZD140"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Top. Appl. Earth Observations Remote Sensing"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/jstars.2023.3276781","type":"journal-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T19:45:54Z","timestamp":1684266354000},"page":"4685-4698","source":"Crossref","is-referenced-by-count":52,"title":["Privacy-Preserving Federated Learning of Remote Sensing Image Classification With Dishonest Majority"],"prefix":"10.1109","volume":"16","author":[{"given":"Jiang","family":"Zhu","sequence":"first","affiliation":[{"name":"Graduate School of Information, Protuction and System, Waseda University, Kitakyushu, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2483-6980","authenticated-orcid":false,"given":"Jun","family":"Wu","sequence":"additional","affiliation":[{"name":"Graduate School of Information, Protuction and System, Waseda University, Kitakyushu, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2601-9327","authenticated-orcid":false,"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[{"name":"Woxsen School of Business, Woxsen University, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8093-3377","authenticated-orcid":false,"given":"Qianqian","family":"Pan","sequence":"additional","affiliation":[{"name":"Department of Systems Innovation, School of Engineering, The University of Tokyo, Tokyo, Japan"}]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[{"name":"Research Center of Information Security, Harbin Engineering University, Harbin, China"}]}],"member":"263","reference":[{"key":"ref13","article-title":"A guide to fully homomorphic encryption","volume":"1192","author":"armknecht","year":"2015","journal-title":"Cryptology-eprint-archive"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3108434"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3173996"},{"key":"ref34","first-page":"301","article-title":"The limitations of federated learning in sybil settings","author":"fung","year":"0","journal-title":"Proc RAID"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref37","article-title":"Fltrust: Byzantine-robust federated learning via trust bootstrapping","author":"cao","year":"2020"},{"key":"ref14","first-page":"1623","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","author":"fang","year":"0","journal-title":"Proc 29th USENIX Conf Secur Symp"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169918"},{"key":"ref31","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"blanchard","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref30","author":"smith","year":"2011","journal-title":"Precalculus A Functional Approach to Graphing and Problem Solving"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref33","first-page":"508","article-title":"Auror: Defending against poisoning attacks in collaborative deep learning systems","author":"shen","year":"0","journal-title":"Proc 32nd Annu Conf Comput Secur Appl"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3105492"},{"key":"ref32","article-title":"The hidden vulnerability of distributed learning in byzantium","author":"mhamdi","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3005403"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2020.111716"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3205714"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_24"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3196274"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954330"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3215574"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051085"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/rs12234003"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48000-6_14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2020.11.025"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3099033"},{"key":"ref20","first-page":"409","article-title":"Homomorphic encryption for arithmetic of approximat numbers","author":"cheon","year":"0","journal-title":"Proc Adv Cryptol &#x2013;ASIACRYPT 23rd Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref42","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"aono","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/rs11161927"},{"key":"ref44","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"0","journal-title":"Proc Artif Intell Statist"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.isprsjprs.2019.03.001","article-title":"Virtual support vector machines with self-learning strategy for classification of multispectral remote sensing imagery","volume":"151","author":"gei\u00df","year":"2019","journal-title":"ISPRS J Photogrammetry Remote Sens"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2019.2918242"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3219726"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3071369"},{"key":"ref29","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","author":"yin","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref8","first-page":"974","article-title":"Iot-based health big-data process technologies: A survey","volume":"15","author":"yoo","year":"2021","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2021.103406"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2019.11.023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2015.2424683"},{"key":"ref3","article-title":"Detection of flooding events in social multimedia and satellite imagery using deep neural networks","author":"bischke","year":"0","journal-title":"Proc MediaEval"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2022.3148139"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2021.3120724"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.28"}],"container-title":["IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4609443\/9973430\/10124964.pdf?arnumber=10124964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T05:04:01Z","timestamp":1707282241000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10124964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/jstars.2023.3276781","relation":{},"ISSN":["1939-1404","2151-1535"],"issn-type":[{"value":"1939-1404","type":"print"},{"value":"2151-1535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}