{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:05:28Z","timestamp":1775837128562,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"EU under the HORIZON-MSCA-2022-SE SOVEREIGN Project","award":["101131481"],"award-info":[{"award-number":["101131481"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2024.3523368","type":"journal-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T19:39:29Z","timestamp":1735328369000},"page":"3140-3160","source":"Crossref","is-referenced-by-count":4,"title":["Adaptive Trust Management for Data Poisoning Attacks in MEC-Based FL Infrastructures"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5877-7806","authenticated-orcid":false,"given":"Basma","family":"Hathout","sequence":"first","affiliation":[{"name":"Department of Computer Science, London South Bank University, London, U.K."}]},{"given":"Paul","family":"Shepherd","sequence":"additional","affiliation":[{"name":"Department of Computer Science, London South Bank University, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8101-1208","authenticated-orcid":false,"given":"Tasos","family":"Dagiuklas","sequence":"additional","affiliation":[{"name":"Department of Computer Science, London South Bank University, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8356-3359","authenticated-orcid":false,"given":"Khaled","family":"Nagaty","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, The British University in Egypt, Cairo, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0208-3722","authenticated-orcid":false,"given":"Abeer","family":"Hamdy","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, The British University in Egypt, Cairo, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9829-0955","authenticated-orcid":false,"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"Department of Telecommunications, Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/iot3030019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2024.3417528"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2986024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/su151813951"},{"issue":"4","key":"ref5","doi-asserted-by":"crossref","first-page":"2892","DOI":"10.1109\/COMST.2023.3316615","article-title":"Combining federated learning and edge computing toward ubiquitous intelligence in 6G network: Challenges, recent advances, and future directions","volume":"25","author":"Duan","year":"2023","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"2","key":"ref6","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/s22020450","article-title":"Federated learning in edge computing: A systematic survey","volume":"22","author":"Abreha","year":"2022","journal-title":"Sensors"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2021.106775","article-title":"A survey on federated learning","volume":"216","author":"Zhang","year":"2021","journal-title":"Knowl. Based Syst."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2020.106854","article-title":"A review of applications in federated learning","volume":"149","author":"Li","year":"2020","journal-title":"Comput. Ind. Eng."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013541"},{"key":"ref10","first-page":"10752","article-title":"On convergence of FedProx: Local dissimilarity invariant bounds, non-smoothness and beyond","volume-title":"Proc. 36th Adv. Neural Inf. Process. Syst.","author":"Yuan"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685434"},{"key":"ref19","article-title":"How to backdoor federated learning","author":"Bagdasaryan","year":"2019","journal-title":"arXiv:1807.00459"},{"key":"ref20","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bhagoji"},{"key":"ref21","article-title":"Trustworthy federated learning: A survey","author":"Tariq","year":"2023","journal-title":"arXiv:2305.11537"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369581"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892848"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/792"},{"key":"ref25","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2020","journal-title":"arXiv:1808.04866"},{"issue":"6","key":"ref26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3460427","article-title":"A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions","volume":"54","author":"Yin","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref27","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2023","journal-title":"arXiv:1602.05629"},{"key":"ref28","article-title":"Federated optimization in heterogeneous networks","author":"Li","year":"2020","journal-title":"arXiv:1812.06127"},{"issue":"1","key":"ref29","doi-asserted-by":"crossref","first-page":"49","DOI":"10.18280\/ria.360106","article-title":"Security of federated learning: Attacks, defensive mechanisms, and challenges","volume":"36","author":"Benmalek","year":"2022","journal-title":"Revue d\u2019Intell. Artificielle"},{"issue":"4","key":"ref30","first-page":"225","article-title":"Detecting data poisoning attacks in federated learning for healthcare applications using deep learning","volume":"4","author":"Omran","year":"2023","journal-title":"Iraqi J. Comput. Sci. Math."},{"issue":"2","key":"ref31","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MWC.001.1900119","article-title":"Reliable federated learning for mobile networks","volume":"27","author":"Kang","year":"2020","journal-title":"IEEE Wireless Commun."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108588"},{"key":"ref33","article-title":"Byzantine-robust federated machine learning through adaptive model averaging","author":"Mu\u00f1oz-Gonz\u00e1lez","year":"2019","journal-title":"arXiv:1909.05125"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030560"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-022-00912-6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.077"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38991-8_39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"ref39","article-title":"Enhancing security in federated learning through adaptive consensus-based model update validation","author":"Alsulaimawi","year":"2024","journal-title":"arXiv:2403.04803"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3438264"},{"key":"ref41","article-title":"FedBayes: A zero-trust federated learning aggregation to defend against adversarial attacks","author":"Vucovich","year":"2023","journal-title":"arXiv:2312. 04587"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3212174"},{"key":"ref43","first-page":"1","article-title":"FLTrust: Byzantine-robust federated learning via trust bootstrapping","volume-title":"Proc. 28th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Cao"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3241770"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2013.6513398"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/app12189124"},{"key":"ref47","volume-title":"Flower: A friendly federated learning framework","author":"Beutel","year":"2020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.227"},{"key":"ref49","volume-title":"The MNIST database of handwritten digits","author":"LeCun","year":"1998"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1186\/s13677-023-00416-8","article-title":"IoT trust and reputation: A survey and taxonomy","volume":"12","author":"Aaqib","year":"2023","journal-title":"J. Cloud Comput."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8059-5_36"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13040789"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/pr11051313"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2023.3303943"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICONAT53423.2022.9725989"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/10816653.pdf?arnumber=10816653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T17:59:31Z","timestamp":1745431171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10816653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3523368","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}