{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:54:58Z","timestamp":1774540498304,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tbdata.2023.3237397","type":"journal-article","created":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T14:12:34Z","timestamp":1673878354000},"page":"975-988","source":"Crossref","is-referenced-by-count":67,"title":["An Experimental Study of Byzantine-Robust Aggregation Schemes in Federated Learning"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0145-3127","authenticated-orcid":false,"given":"Shenghui","family":"Li","sequence":"first","affiliation":[{"name":"Department of Information Technology, Uppsala University, Uppsala, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3454-8731","authenticated-orcid":false,"given":"Edith C.-H.","family":"Ngai","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, University of Hong Kong, Pok Fu Lam, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2586-8573","authenticated-orcid":false,"given":"Thiemo","family":"Voigt","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Uppsala University, Uppsala, Sweden"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref3","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u00dd","year":"2016"},{"key":"ref4","first-page":"1756","article-title":"Communication complexity of distributed convex learning and optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Arjevani"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2979149"},{"key":"ref7","first-page":"1605","article-title":"Local model poisoning attacks to byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Fang"},{"key":"ref8","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yin"},{"key":"ref9","article-title":"Challenges and approaches for mitigating byzantine attacks in federated learning","author":"Hu","year":"2021"},{"key":"ref10","first-page":"903","article-title":"Draco: Byzantine-resilient distributed training via redundant gradients,","author":"Chen","journal-title":"Proc. Int. Conf. Mach. Learn."},{"key":"ref11","first-page":"10320","article-title":"DETOX: A redundancy-based framework for faster and more robust gradient aggregation","volume":"32","author":"Rajput","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref12","first-page":"14615","article-title":"Election coding for distributed learning: Protecting signsgd against byzantine attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sohn"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"ref14","first-page":"3488","article-title":"Robust learning from untrusted sources","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Konstantinov"},{"key":"ref15","first-page":"840","article-title":"Sageflow: Robust federated learning against both stragglers and adversaries","volume":"34","author":"Park","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref17","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3154503"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3128164"},{"key":"ref20","first-page":"5311","article-title":"Learning from history for byzantine robust optimization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Karimireddy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054676"},{"key":"ref22","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Guerraoui"},{"key":"ref23","first-page":"8635","article-title":"A little is enough: Circumventing defenses for distributed learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Baruch"},{"key":"ref24","first-page":"261","article-title":"Fall of empires: Breaking byzantine-tolerant sgd by inner product manipulation","volume-title":"Proc. Uncertainty Artif. Intell.","author":"Xie"},{"key":"ref25","article-title":"On the convergence of fedavg on non-iid data","author":"Li","year":"2020","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2959108"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176347978"},{"key":"ref28","first-page":"6357","article-title":"Ditto: Fair and robust federated learning through personalization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3039941"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897647"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS53394.2021.00052"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP49062.2020.9231926"},{"key":"ref34","first-page":"17455","article-title":"Differentially private learning with adaptive clipping","volume":"34","author":"Andrew","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref36","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref37","article-title":"MNIST handwritten digit database","volume":"2","author":"LeCun","year":"2010","journal-title":"ATT Labs"},{"key":"ref38","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume":"33","author":"Lin","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"5","key":"ref39","first-page":"1","article-title":"Auto-weighted robust federated learning with corrupted data sources","volume":"13","author":"Li","year":"2022","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref40","article-title":"Escaping the Big Data paradigm with compact transformers","author":"Hassani","year":"2021"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref42","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Karimireddy"},{"key":"ref43","article-title":"Adaptive personalized federated learning","author":"Deng","year":"2020"},{"key":"ref44","article-title":"A study of gradient variance in deep learning","author":"Faghri","year":"2020"},{"key":"ref45","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xie"},{"key":"ref46","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833647"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00383"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460403"},{"key":"ref51","article-title":"Free-riders in federated learning: Attacks and defenses","author":"Lin","year":"2019"},{"key":"ref52","first-page":"1846","article-title":"Free-rider attacks on model aggregation in federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Fraboni"},{"key":"ref53","first-page":"7232","article-title":"Evaluating gradient inversion attacks and defenses in federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Huang"},{"key":"ref54","first-page":"16937","article-title":"Inverting gradients - how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Geiping"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2018.8636017"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16849"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3012952"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/10750532\/10018261.pdf?arnumber=10018261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T14:28:02Z","timestamp":1732717682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10018261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":57,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2023.3237397","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.19560325.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19560325.v2","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19560325","asserted-by":"object"}]},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}