{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:44:08Z","timestamp":1767293048480,"version":"3.48.0"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62401075"],"award-info":[{"award-number":["62401075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62394322"],"award-info":[{"award-number":["62394322"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Foundation","award":["4244084"],"award-info":[{"award-number":["4244084"]}]},{"name":"National Key Research and Development Program of China","award":["2024YFC3015300"],"award-info":[{"award-number":["2024YFC3015300"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2025.3627915","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T18:46:25Z","timestamp":1762195585000},"page":"2965-2978","source":"Crossref","is-referenced-by-count":0,"title":["Eliminating Stealthy Backdoors via Occupying and Withdrawing for Secure Personalized Federated Learning in UAV Swarms"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1267-5079","authenticated-orcid":false,"given":"Bo","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2388-2280","authenticated-orcid":false,"given":"Zan","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9597-2659","authenticated-orcid":false,"given":"Shujie","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Ziwei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xiangliang","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1467-1086","authenticated-orcid":false,"given":"Changqiao","family":"Xu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3065084"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3422039"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100615"},{"key":"ref4","article-title":"Cached model-as-a-resource: Provisioning large language model agents for edge intelligence in space-air-ground integrated networks","author":"Xu","year":"2024","journal-title":"arXiv:2403.05826"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3523324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2025.3613672"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3549508"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3510621"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3522164"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3580365"},{"key":"ref11","article-title":"Feature engineering for wireless communications and networking: Concepts, methodologies, and applications","author":"Wang","year":"2025","journal-title":"arXiv:2507.19837"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3345431"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.317"},{"key":"ref14","first-page":"26429","article-title":"Neurotoxin: Durable backdoors in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref15","article-title":"BDPFL: Backdoor defense for personalized federated learning via explainable distillation","author":"Zhu","year":"2025","journal-title":"arXiv:2503.06554"},{"key":"ref16","first-page":"4157","article-title":"Lurking in the shadows: Unveiling stealthy backdoor attacks against personalized federated learning","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Secur. 24)","author":"Lyu"},{"key":"ref17","first-page":"4193","article-title":"{BackdoorIndicator}: Leveraging {OOD} data for proactive backdoor detection in federated learning","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Secur.)","author":"Li"},{"key":"ref18","article-title":"TrojanDam: Detection-free backdoor defense in federated learning through proactive model robustification utilizing OOD data","author":"Dai","year":"2025","journal-title":"arXiv:2504.15674"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3533016"},{"key":"ref20","article-title":"Disrupting vision-language model-driven navigation services via adversarial object fusion","author":"Xie","year":"2025","journal-title":"arXiv:2505.23266"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref22","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref23","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","author":"Li"},{"key":"ref24","article-title":"On bridging generic and personalized federated learning for image classification","author":"Chen","year":"2021","journal-title":"arXiv:2107.00778"},{"key":"ref25","first-page":"21394","article-title":"Personalized federated learning with Moreau envelopes","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dinh"},{"key":"ref26","first-page":"6357","article-title":"Ditto: Fair and robust federated learning through personalization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i9.26330"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.52202\/079017-2926"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01139"},{"key":"ref30","article-title":"FedBN: Federated learning on non-IID features via local batch normalization","author":"Li","year":"2021","journal-title":"arXiv:2102.07623"},{"key":"ref31","article-title":"Federated learning with personalization layers","author":"Arivazhagan","year":"2019","journal-title":"arXiv:1912.00818"},{"key":"ref32","first-page":"2089","article-title":"Exploiting shared representations for personalized federated learning","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Collins"},{"key":"ref33","article-title":"FedBABU: Towards enhanced representation for federated image classification","author":"Oh","year":"2021","journal-title":"arXiv:2106.06042"},{"key":"ref34","article-title":"Personalized federated learning with feature alignment and classifier collaboration","author":"Xu","year":"2023","journal-title":"arXiv:2306.11867"},{"key":"ref35","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref36","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. NIPS","author":"Wang"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833644"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616617"},{"key":"ref39","first-page":"61213","article-title":"A3FL: Adversarially adaptive backdoor attacks to federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Zhang"},{"key":"ref40","first-page":"6712","article-title":"Chameleon: Adapting to peer images for planting durable backdoors in federated learning","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Dai"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/491"},{"key":"ref42","article-title":"Bad-PFL: Exploring backdoor attacks against personalized federated learning","author":"Fan","year":"2025","journal-title":"arXiv:2501.12736"},{"article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xie","key":"ref43"},{"key":"ref44","first-page":"66364","article-title":"Iba: Towards irreversible backdoor attacks in federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Nguyen"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i10.26393"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.26083"},{"key":"ref47","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2018","journal-title":"arXiv:1808.04866"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref49","first-page":"1415","article-title":"{FLAME}: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Nguyen"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00429"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24620"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3384846"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3410014"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i13.29385"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref56","article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","author":"Li","year":"2021","journal-title":"arXiv:2101.05930"},{"key":"ref57","first-page":"19837","article-title":"Reconstructive neuron pruning for backdoor defense","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179451"},{"key":"ref59","first-page":"2883","article-title":"Neural network semantic backdoor detection and mitigation: A {causality-based} approach","volume-title":"Proc. 33rd USENIX Secur. Symp. (USENIX Secur.)","author":"Sun"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3731715.3733342"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3550062"},{"key":"ref62","first-page":"139886","article-title":"A Swiss army knife for heterogeneous federated learning: Flexible coupling via trace norm","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"37","author":"Liao"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11224324.pdf?arnumber=11224324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:38:43Z","timestamp":1767292723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11224324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3627915","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"type":"electronic","value":"2332-7731"},{"type":"electronic","value":"2372-2045"}],"subject":[],"published":{"date-parts":[[2026]]}}}