{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:03:39Z","timestamp":1768280619584,"version":"3.49.0"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Cloudtech Group Pty Ltd. through the CloudTech RMIT Green Bitcoin Joint Research Program\/Laboratory"},{"name":"Australian Government through Australian Research Council\u2019s Discovery Projects funding scheme","award":["DP220101823"],"award-info":[{"award-number":["DP220101823"]}]},{"name":"National Key Research and Development Program of China","award":["2022ZD0116800"],"award-info":[{"award-number":["2022ZD0116800"]}]},{"name":"Taishan Scholars Program","award":["TSQNZ20230621"],"award-info":[{"award-number":["TSQNZ20230621"]}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2023QF104"],"award-info":[{"award-number":["ZR2023QF104"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tnnls.2025.3601078","type":"journal-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:32:02Z","timestamp":1756319522000},"page":"67-81","source":"Crossref","is-referenced-by-count":0,"title":["DSPFL: A Deep-Layer Sign Sharing Personalized Federated Learning Scheme for Mitigating Poisoning Attacks"],"prefix":"10.1109","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0819-7269","authenticated-orcid":false,"given":"Chenhao","family":"Xu","sequence":"first","affiliation":[{"name":"Institute for Sustainable Industries and Liveable Cities (ISILC), Victoria University, Footscray, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8340-2261","authenticated-orcid":false,"given":"Nasrin","family":"Sohrabi","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Burwood, VIC, Australia"}]},{"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7033-5688","authenticated-orcid":false,"given":"Hai","family":"Dong","sequence":"additional","affiliation":[{"name":"RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1235-9673","authenticated-orcid":false,"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[{"name":"RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7351-5724","authenticated-orcid":false,"given":"Xun","family":"Yi","sequence":"additional","affiliation":[{"name":"RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3047833"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.101.2001126"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051935"},{"key":"ref4","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3132954"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517395"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23054"},{"key":"ref11","first-page":"12613","article-title":"FL-WBC: Enhancing robustness against model poisoning attacks in federated learning from a client perspective","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sun"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2100173"},{"key":"ref13","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","author":"Li"},{"key":"ref14","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","volume":"119","author":"Karimireddy"},{"key":"ref15","first-page":"11058","article-title":"Multi-level branched regularization for federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kim"},{"key":"ref16","first-page":"26311","article-title":"Federated learning with label distribution skew via logits calibration","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref17","first-page":"3407","article-title":"Clustered sampling: Low-variance and improved representativity for clients selection in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Fraboni"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00993"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3172113"},{"key":"ref20","first-page":"3557","article-title":"Personalized federated learning with theoretical guarantees: A model-agnostic meta-learning approach","volume-title":"Proc. NeurIPS Conf.","volume":"33","author":"Fallah"},{"key":"ref21","first-page":"14527","article-title":"Disentangled federated learning for tackling attributes skew via invariant aggregation and diversity transferring","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Luo"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC51483.2021.9679416"},{"key":"ref23","first-page":"2089","article-title":"Exploiting shared representations for personalized federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Collins"},{"key":"ref24","first-page":"12878","article-title":"Data-free knowledge distillation for heterogeneous federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhu"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00985"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20825"},{"key":"ref27","first-page":"21404","article-title":"Byzantine-robust learning on heterogeneous data via gradient splitting","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu"},{"key":"ref28","first-page":"4587","article-title":"DisPFL: Towards communication-efficient personalized federated learning via decentralized sparse training","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","volume":"162","author":"Dai"},{"key":"ref29","first-page":"15070","article-title":"Personalized federated learning through local memorization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Marfoq"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3453142.3492909"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3290925"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2024.3403427"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3526840"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485368"},{"key":"ref35","first-page":"1605","article-title":"Local model poisoning attacks to $Byzantine-Robust$ federated learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Fang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3551636"},{"key":"ref37","first-page":"6284","article-title":"An equivalence between data poisoning and Byzantine gradient attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Farhadkhani"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417253"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3351371"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453108"},{"key":"ref41","first-page":"560","article-title":"signSGD: Compressed optimisation for non-convex problems","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"Bernstein"},{"key":"ref42","first-page":"3252","article-title":"Error feedback fixes signSGD and other gradient compression schemes","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"97","author":"Karimireddy"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5706"},{"key":"ref44","first-page":"1","article-title":"SignSGD with majority vote is communication efficient and fault tolerant","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Bernstein"},{"key":"ref45","first-page":"1","article-title":"Election coding for distributed learning: Protecting SignSGD against Byzantine attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sohn"},{"key":"ref46","first-page":"39762","article-title":"SignSGD with federated defense: Harnessing adversarial attacks through gradient sign decoding","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Park"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00803"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3102110"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330932"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330871"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100656"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00301"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108906"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3150324"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00077"},{"key":"ref57","first-page":"17716","article-title":"Federated learning with partial model personalization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Pillutla"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20819"},{"key":"ref59","first-page":"8635","article-title":"A little is enough: Circumventing defenses for distributed learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Baruch"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080522"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3088528"},{"key":"ref62","first-page":"1","article-title":"Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection","volume":"2","author":"Stolfo","year":"2000","journal-title":"Results JAM Project Salvatore"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref66","volume-title":"Learning Multiple Layers of Features From Tiny Images","author":"Krizhevsky","year":"2009"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00681"},{"key":"ref68","volume-title":"NLP From Scratch: Translation With a Sequence To Sequence Network and Attention","author":"Robertson","year":"2024"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3036855"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5962385\/11339259\/11142771.pdf?arnumber=11142771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:02:01Z","timestamp":1768255321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11142771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":69,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2025.3601078","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}