{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:33:48Z","timestamp":1767969228812,"version":"3.49.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100008982","name":"Graduate Sponsorship Research Award","doi-asserted-by":"publisher","award":["GSRA5-1-0531-18105"],"award-info":[{"award-number":["GSRA5-1-0531-18105"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"NPRP-Standard (NPRP-S) Thirteen (13th) Cycle from the Qatar National Research Fund","doi-asserted-by":"publisher","award":["NPRP13S-0201-200219"],"award-info":[{"award-number":["NPRP13S-0201-200219"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/ojcoms.2023.3280359","type":"journal-article","created":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T17:39:29Z","timestamp":1685641169000},"page":"1274-1284","source":"Crossref","is-referenced-by-count":27,"title":["Reputation-Aware Multi-Agent DRL for Secure Hierarchical Federated Learning in IoT"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4429-1172","authenticated-orcid":false,"given":"Noora Mohammed","family":"Al-Maslamani","sequence":"first","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3261-7588","authenticated-orcid":false,"given":"Mohamed","family":"Abdallah","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0229-0745","authenticated-orcid":false,"given":"Bekir Sait","family":"Ciftler","sequence":"additional","affiliation":[{"name":"Division of Data Science and Artificial Intelligence, College of Computing and IT, University of Doha for Science and Technology, Doha, Qatar"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221089"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2917133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3184812"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00033"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC55113.2022.9824672"},{"key":"ref30","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref10","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref2","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Proc Int Conf AI Stat"},{"key":"ref1","first-page":"756","article-title":"D&#x00CF;oTt: A federated self-learning anomaly detection system for IoT","author":"nguyen","year":"2019","journal-title":"Proc 39th Int Conf Dist Comput Syst (ICDCS)"},{"key":"ref17","article-title":"Mitigating sybils in federated learning poisoning","author":"fung","year":"2018","journal-title":"arXiv 1808 04866"},{"key":"ref16","first-page":"387","article-title":"Deterministic policy gradient algorithms","author":"silver","year":"2014","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref19","article-title":"Learning to detect malicious clients for robust federated learning","author":"li","year":"2020","journal-title":"arXiv 2002 00211"},{"key":"ref18","article-title":"Can you really backdoor federated learning?","author":"sun","year":"2019","journal-title":"arXiv 1911 07963"},{"key":"ref24","first-page":"2438","article-title":"DeepChain: Auditable and privacy-preserving deep learning with blockchain-based incentive","volume":"18","author":"weng","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3195207"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.03.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2019.00018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3134647"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3081606"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"ref28","article-title":"Continuous control with deep reinforcement learning","author":"lillicrap","year":"2015","journal-title":"arXiv 1509 02971"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref29","first-page":"2","article-title":"Learning algorithms for classification: A comparison on handwritten digit recognition","volume":"261","author":"lecun","year":"1995","journal-title":"Neural Networks The Statistical Mechanics Perspective"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900119"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054634"},{"key":"ref3","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n\u00fd","year":"2016","journal-title":"arXiv 1610 05492"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3044223"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3065719"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/10008219\/10141979.pdf?arnumber=10141979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:51:56Z","timestamp":1689018716000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10141979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2023.3280359","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}