{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T12:07:13Z","timestamp":1772712433569,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004055","name":"King Fahd University of Petroleum and Minerals","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004055","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Interdisciplinary Research Center for Intelligent Secure Systems (IRC-ISS) at KFUPM"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcoms.2024.3496872","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T19:03:36Z","timestamp":1731524616000},"page":"7278-7300","source":"Crossref","is-referenced-by-count":5,"title":["Edge-Assisted Label-Flipping Attack Detection in Federated Learning"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1711-2100","authenticated-orcid":false,"given":"Nourah S.","family":"AlOtaibi","sequence":"first","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6414-3391","authenticated-orcid":false,"given":"Muhamad","family":"Felemban","sequence":"additional","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5786-5118","authenticated-orcid":false,"given":"Sajjad","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148862"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2904244"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441892"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00057"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110072"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref12","first-page":"1","article-title":"Exploiting machine learning to subvert your spam filter","volume-title":"Proc. LEET","volume":"8","author":"Nelson"},{"key":"ref13","first-page":"1","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref14","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3108434"},{"key":"ref16","article-title":"Byzantine-robust federated machine learning through adaptive model averaging","author":"Mu\u00f1oz-Gonz\u00e1lez","year":"2019","journal-title":"arXiv:1909.05125"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00081"},{"key":"ref18","article-title":"Poisoning attacks against support vector machines","author":"Biggio","year":"2012","journal-title":"arXiv:1206.6389"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238823"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacr.2022.03.016"},{"key":"ref24","article-title":"FedDropoutAvg: Generalizable federated learning for histopathology image classification","author":"Gunesli","year":"2021","journal-title":"arXiv:2111.13230"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3501296"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60548-3_18"},{"key":"ref27","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018","journal-title":"arXiv:1811.03604"},{"key":"ref28","article-title":"Federated learning for emoji prediction in a mobile keyboard","author":"Ramaswamy","year":"2019","journal-title":"arXiv:1906.04329"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICTACS56270.2022.9987996"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3381006"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-023-05664-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2023.107854"},{"key":"ref33","first-page":"301","article-title":"The limitations of federated learning in sybil settings","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses (RAID)","author":"Fung"},{"key":"ref34","first-page":"1605","article-title":"Local model poisoning attacks to {byzantine-robust} federated learning","volume-title":"Proc. 29th USENIX security Symp. (USENIX Security)","author":"Fang"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65745-1_12"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3330144"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9659839"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3212174"},{"key":"ref41","article-title":"Honest score client selection scheme: Preventing federated learning label flipping attacks in non-IID scenarios","author":"Li","year":"2023","journal-title":"arXiv:2311.05826"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3288886"},{"key":"ref43","article-title":"Defending against the label-flipping attack in federated learning","author":"Jebreel","year":"2022","journal-title":"arXiv:2207.01982"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref46","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv:1708.07747"},{"key":"ref47","volume-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"ref49","volume-title":"Python 3 Reference Manual","author":"Van Rossum","year":"2009"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10362961\/10752632.pdf?arnumber=10752632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T07:46:54Z","timestamp":1732693614000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10752632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3496872","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}