{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T04:33:34Z","timestamp":1775622814122,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Cryptologic Science Fund of China","award":["2025NCSF02030"],"award-info":[{"award-number":["2025NCSF02030"]}]},{"DOI":"10.13039\/501100012456","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["L251041"],"award-info":[{"award-number":["L251041"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012456","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["L251062"],"award-info":[{"award-number":["L251062"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62402029"],"award-info":[{"award-number":["62402029"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Fund of Anhui Provincial Key Laboratory of Digital Twin Technology in Metallurgical Industry","award":["ADW24-01"],"award-info":[{"award-number":["ADW24-01"]}]},{"name":"Open Fund of Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet","award":["IASII24-01"],"award-info":[{"award-number":["IASII24-01"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024T170047"],"award-info":[{"award-number":["2024T170047"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["GZC20230223"],"award-info":[{"award-number":["GZC20230223"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024M750165"],"award-info":[{"award-number":["2024M750165"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2025.3641512","type":"journal-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:42:14Z","timestamp":1765219334000},"page":"4839-4849","source":"Crossref","is-referenced-by-count":1,"title":["An Adaptive Consistency-Based Detection Scheme for Label-Flipping Attacks in Low-Altitude Economic Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6095-6336","authenticated-orcid":false,"given":"Jianing","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3032-2488","authenticated-orcid":false,"given":"Tianhao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3366-7640","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2951-688X","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7912-8757","authenticated-orcid":false,"given":"Xuangou","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University of Technology, Maanshan, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1147-4327","authenticated-orcid":false,"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/drones6060147"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MICC59384.2023.10419522"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SOFTT56880.2022.10010200"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.001.2400685"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08395-2_10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/drones7020089"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MAPE62875.2024.10924462"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tccn.2025.3622130"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2025.3580859"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE62490.2024.00009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC59986.2023.10420989"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.004.2500025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118352"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101061"},{"key":"ref16","article-title":"6G non-terrestrial networks enabled low-altitude economy: Opportunities and challenges","author":"Jiang","year":"2023","journal-title":"arXiv:2311.09047"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3633157"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2400692"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3288886"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR61006.2024.10533012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2024.104750"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2025.3542450"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2025.3618886"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3424188"},{"key":"ref27","first-page":"301","article-title":"The limitations of federated learning in Sybil settings","volume-title":"Proc. 23rd Int. Symp. Res. Attacks","author":"Fung"},{"key":"ref28","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3249568"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSNS62112.2024.10690919"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3496872"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00081"},{"key":"ref33","article-title":"Logit poisoning attack in distillation-based federated learning and its countermeasures","author":"Yu","year":"2024","journal-title":"arXiv:2401.17746"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3382839"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50011-2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/014311699211769"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.367036"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2018.8363930"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3270293"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-021-01779-z"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11282446.pdf?arnumber=11282446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:51:14Z","timestamp":1768596674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11282446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3641512","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}