{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T15:32:46Z","timestamp":1777995166575,"version":"3.51.4"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072469"],"award-info":[{"award-number":["62072469"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Project of the State Key Laboratory for Management and Control Complex Systems"},{"name":"Institute of Automation"},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["20210114"],"award-info":[{"award-number":["20210114"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tii.2022.3222369","type":"journal-article","created":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T20:42:09Z","timestamp":1668544929000},"page":"8829-8840","source":"Crossref","is-referenced-by-count":35,"title":["R$^{2}$Fed: Resilient Reinforcement Federated Learning for Industrial Applications"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9800-1068","authenticated-orcid":false,"given":"Weishan","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3868-3068","authenticated-orcid":false,"given":"Fa","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0008-0659","authenticated-orcid":false,"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Anhui University, Anhui, China"}]},{"given":"Xingjie","family":"Zeng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5235-0748","authenticated-orcid":false,"given":"Hongwei","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1911-5791","authenticated-orcid":false,"given":"Yonglin","family":"Tian","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9185-3989","authenticated-orcid":false,"given":"Fei-Yue","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Longfei","family":"Li","sequence":"additional","affiliation":[{"name":"Space Star Technology Co., Ltd., Beijing, China"}]},{"given":"Zengxiang","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Digital Research, ENN Group, Langfang, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3035451"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3117842"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010052"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_5"},{"key":"ref10","article-title":"Federated learning with Non-IID data","author":"zhao","year":"2018"},{"key":"ref2","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"0","journal-title":"Proc Artif Intell Statist"},{"key":"ref1","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n?","year":"2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056185"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"ref19","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"li","year":"0","journal-title":"Proc Mach Learn Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00077"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3429252"},{"key":"ref23","article-title":"The Ornstein-Uhlenbeck process as a model of a low pass filtered white noise","volume":"45","author":"tavella","year":"2008","journal-title":"Metrologia"},{"key":"ref26","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"arXiv 1206 6389"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3096928"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3167994"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5110-1_9"},{"key":"ref21","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction Re-inforcement Learning An Introduction"},{"key":"ref27","first-page":"2938","article-title":"How to backdoor federated learning","author":"bagdasaryan","year":"0","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AICAS51828.2021.9458510"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN49451.2021.9528575"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.03.022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2020.000015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00185"},{"key":"ref5","article-title":"Continuous control with deep reinforcement learning","author":"lillicrap","year":"2015"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/10183640\/09950718.pdf?arnumber=9950718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T18:40:48Z","timestamp":1691433648000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9950718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":27,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tii.2022.3222369","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}