{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:13:03Z","timestamp":1774678383234,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["NSF-CAREER: 1846513"],"award-info":[{"award-number":["NSF-CAREER: 1846513"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["NSF-PFI-TT: 1919127"],"award-info":[{"award-number":["NSF-PFI-TT: 1919127"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tai.2025.3540030","type":"journal-article","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T13:41:03Z","timestamp":1739540463000},"page":"2922-2939","source":"Crossref","is-referenced-by-count":10,"title":["Exploiting Gaussian Noise Variance for Dynamic Differential Poisoning in Federated Learning"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-7918","authenticated-orcid":false,"given":"Md Tamjid","family":"Hossain","sequence":"first","affiliation":[{"name":"Department of Computational, Engineering, and Mathematical Sciences, Texas A&amp;M University-San Antonio, San Antonio, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6663-2164","authenticated-orcid":false,"given":"Shahriar","family":"Badsha","sequence":"additional","affiliation":[{"name":"General Motors, Warren, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2183-2634","authenticated-orcid":false,"given":"Hung","family":"La","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8524-2855","authenticated-orcid":false,"given":"Shafkat","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5512-114X","authenticated-orcid":false,"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Stat.","author":"McMahan","year":"2017"},{"key":"ref2","article-title":"Critical infrastructure sectors","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3139055"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148937"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3095506"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110784"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3168556"},{"key":"ref8","article-title":"Analysis of the cyber attack on the ukrainian power grid","volume-title":"Electricity Information Sharing and Analysis Center (E-ISAC)","volume":"388","author":"Case","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2024.3355362"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3022911"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2023.3247554"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3309273"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23047"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNS53000.2021.9705022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref18","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991416"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3173996"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/217"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963194"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00038"},{"key":"ref26","first-page":"1605","article-title":"Local model poisoning attacks to byzantine-robust federated learning","volume-title":"29th {USENIX} Secur. Symp. ({USENIX} Secur. 20)","author":"Fang","year":"2020"},{"key":"ref27","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Blanchard","year":"2017"},{"key":"ref28","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume-title":"Proc. Int. Conf. Mach. Learn..","author":"Guerraoui","year":"2018"},{"key":"ref29","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn..","author":"Yin","year":"2018"},{"key":"ref30","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945367"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3172113"},{"key":"ref33","article-title":"Scipy and Numpy: An Overview for Developers","author":"Bressert","year":"2012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3643137"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952146"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151670"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3128679"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3135422"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3555762"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.689"},{"key":"ref46","first-page":"1613","article-title":"What are the chances? explaining the epsilon parameter in differential privacy","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Secur. 23)","author":"Nanayakkara","year":"2023"},{"key":"ref47","volume-title":"Differential Privacy: Future Work & Open Challenges","author":"Near","year":"(2022)"},{"key":"ref48","first-page":"1167","article-title":"Classes of multiagent q-learning dynamics with epsilon-greedy exploration","volume-title":"Proc. ICML","author":"Wunder","year":"2010"},{"key":"ref49","article-title":"Individual household electric power consumption data set","author":"Hebrail","year":"2012"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9078688\/11224646\/10887264-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/11224646\/10887264.pdf?arnumber=10887264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:55:59Z","timestamp":1762455359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10887264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":49,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tai.2025.3540030","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}