{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:23:56Z","timestamp":1773120236887,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,11]]},"DOI":"10.1109\/secon58729.2023.10287430","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:57:08Z","timestamp":1698083828000},"page":"312-320","source":"Crossref","is-referenced-by-count":13,"title":["DynamicFL: Balancing Communication Dynamics and Client Manipulation for Federated Learning"],"prefix":"10.1109","author":[{"given":"Bocheng","family":"Chen","sequence":"first","affiliation":[{"name":"Michigan State University,Computer Science &#x0026; Engineering,East Lansing,USA"}]},{"given":"Nikolay","family":"Ivanov","sequence":"additional","affiliation":[{"name":"Michigan State University,Computer Science &#x0026; Engineering,East Lansing,USA"}]},{"given":"Guangjing","family":"Wang","sequence":"additional","affiliation":[{"name":"Michigan State University,Computer Science &#x0026; Engineering,East Lansing,USA"}]},{"given":"Qiben","family":"Yan","sequence":"additional","affiliation":[{"name":"Michigan State University,Computer Science &#x0026; Engineering,East Lansing,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3588956"},{"key":"ref35","article-title":"Black-box queryefficient audio adversarial attack via split-second phoneme injection","author":"guo","year":"2023","journal-title":"Proceedings of the 26th International Symposium on Research in Attacks Intrusions and Defenses"},{"key":"ref12","article-title":"Federated threat detection for smart home iot rules","author":"wang","year":"2023","journal-title":"International Workshop on Federated Learning for Distributed Data Mining"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947053"},{"key":"ref15","article-title":"Oort: Efficient Federated Learning via Guided Participant Selection","author":"lai","year":"2021","journal-title":"Proceedings of USENIX OSDI"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3436729"},{"key":"ref14","article-title":"Iotcom: Dissecting interaction threats in iot systems","author":"alhanahnah","year":"2022","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3593293"},{"key":"ref31","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"li","year":"2020","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"ref30","author":"shin","year":"2022","journal-title":"Fedbalancer Data and pace control for efficient federated learning on heterogeneous clients"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3017377"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080110"},{"key":"ref10","article-title":"Understanding multiturn toxic behaviors in open-domain chatbots","author":"chen","year":"2023","journal-title":"Proceedings of the 26th International Symposium on Research in Attacks Intrusions and Defenses"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571725"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00120"},{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref17","author":"riiser","year":"2012","journal-title":"Dataset Hsdpabandwidth logs for mobile http streaming scenarios"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS53394.2021.00018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3517017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3477114.3488760"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107515"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01316-z"},{"key":"ref23","article-title":"Adaptive federated optimization","author":"reddi","year":"2021","journal-title":"Proceedings of ICLR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref25","article-title":"Speech commands: A dataset for limited-vocabulary speech recognition","author":"warden","year":"2018","journal-title":"arXiv preprint arXiv 1804 00209"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590189"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483278"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107515"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485928"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2483977.2483991"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3581791.3596837"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467681"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430725"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485946"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683546"},{"key":"ref4","first-page":"357","article-title":"Federated transfer reinforcement learning for autonomous driving","author":"liang","year":"2022","journal-title":"Federated and Transfer Learning"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3219644"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467681"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3389\/frcmn.2021.709946"},{"key":"ref40","article-title":"Heterofl: Computation and communication efficient federated learning for heterogeneous clients","author":"diao","year":"2020","journal-title":"arXiv preprint arXiv 2010"}],"event":{"name":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","location":"Madrid, Spain","start":{"date-parts":[[2023,9,11]]},"end":{"date-parts":[[2023,9,14]]}},"container-title":["2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10287388\/10287413\/10287430.pdf?arnumber=10287430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T19:04:24Z","timestamp":1699902264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10287430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,11]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/secon58729.2023.10287430","relation":{},"subject":[],"published":{"date-parts":[[2023,9,11]]}}}