{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:32:10Z","timestamp":1774539130896,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Social Science Foundation of China","doi-asserted-by":"publisher","award":["20BTQ058"],"award-info":[{"award-number":["20BTQ058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2023JJ50033"],"award-info":[{"award-number":["2023JJ50033"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072078"],"award-info":[{"award-number":["62072078"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332018"],"award-info":[{"award-number":["62332018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tnsm.2024.3509983","type":"journal-article","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T13:39:35Z","timestamp":1733146775000},"page":"2000-2016","source":"Crossref","is-referenced-by-count":3,"title":["Dual-Layered Model Protection Scheme Against Backdoor Attacks in Fog Computing-Based Federated Learning"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0793-5218","authenticated-orcid":false,"given":"Ke","family":"Gu","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"given":"Yiming","family":"Zuo","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"given":"Jingjing","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0281-5970","authenticated-orcid":false,"given":"Bo","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"given":"Zheng","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-554X","authenticated-orcid":false,"given":"Xiong","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa8415"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"ref3","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017","journal-title":"arXiv:1712.05526"},{"key":"ref4","first-page":"11973","article-title":"On the trade-off between adversarial and backdoor robustness","volume-title":"Proc. 34th Adv. Neural Inf. Process. Syst.","author":"Weng"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6911(92)90069-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2173424"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIC.2008.020996"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2000.878579"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/647"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00038"},{"key":"ref11","first-page":"9525","article-title":"Backdoor scanning for deep neural networks through K-Arm optimization","volume-title":"Proc. ICML","author":"Shen"},{"key":"ref12","first-page":"1","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. 31st Adv. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref13","first-page":"301","article-title":"The limitations of federated learning in sybil settings","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Def. (RAID)","author":"Fung"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"ref16","article-title":"FLGUARD: Secure and private federated learning","author":"Nguyen","year":"2021","journal-title":"arXiv:2101.02281v2"},{"issue":"5","key":"ref17","first-page":"1","article-title":"Auto-weighted robust federated learning with corrupted data sources","volume":"13","author":"Li","year":"2022","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2943524"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00612"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref21","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"Gu","year":"2019","journal-title":"arXiv:1708.06733"},{"key":"ref22","first-page":"1","article-title":"Spectral signatures in backdoor attacks","volume-title":"Proc. 32nd Adv. Neural Inf. Process. Syst.","author":"Tran"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3201472"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"ref27","first-page":"1","article-title":"Poison frogs! targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. 32nd Adv. Neural Inf. Process. Syst.","author":"Shafahi"},{"key":"ref28","first-page":"1","article-title":"Clean-label backdoor attacks","volume-title":"Proc. ICLR","author":"Turner"},{"key":"ref29","first-page":"7614","article-title":"Transferable clean-label poisoning attacks on deep neural nets","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Zhu"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00049"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375751"},{"key":"ref32","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Stat.","author":"Bagdasaryan"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941376"},{"key":"ref34","article-title":"Weight poisoning attacks on pre-trained models","author":"Kurita","year":"2020","journal-title":"arXiv:2004.06660"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110178"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102819"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938861"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03472-4"},{"key":"ref40","first-page":"14900","article-title":"Anti-backdoor learning: Training clean models on poisoned data","volume-title":"Proc. 35th Adv. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref41","first-page":"508","article-title":"AUROR: Defending against poisoning attacks in collaborative deep learning systems","volume-title":"Proc. 32nd Annu. Conf. Comput. Secur. Appl.","author":"Shen"},{"key":"ref42","article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","author":"Chen","year":"2018","journal-title":"arXiv:1811.03728"},{"key":"ref43","first-page":"16913","article-title":"Adversarial neuron pruning purifies backdoored deep models","volume-title":"Proc. 35th Adv. Neural Inf. Process. Syst.","author":"Wu"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_11"},{"key":"ref45","first-page":"1","article-title":"Bridging mode connectivity in loss landscapes and adversarial robustness","volume-title":"Proc. ICLR","author":"Zhao"},{"key":"ref46","first-page":"1","article-title":"Robust anomaly detection and backdoor attack detection via differential privacy","volume-title":"Proc. ICLR","author":"Du"},{"key":"ref47","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Artif. Intell. Stat.","author":"McMahan"},{"key":"ref48","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Karimireddy"},{"key":"ref49","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","volume-title":"Proc. 34th Adv. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref50","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. MLSys","author":"Li"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.01.026"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref53","volume-title":"Learning Multiple Layers of Features from Tiny Images","author":"Krizhevsky","year":"2009"},{"key":"ref54","article-title":"Neural attention distillation: Erasing backdoor triggers from deep neural networks","author":"Li","year":"2021","journal-title":"arXiv:2101.05930"},{"key":"ref55","volume-title":"Estimating a Dirichlet distribution","author":"Minka","year":"2000"},{"key":"ref56","first-page":"37860","article-title":"Personalized federated learning under mixture of distributions","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Wu"},{"key":"ref57","article-title":"WaNet\u2013imperceptible warping-based backdoor attack","author":"Nguyen","year":"2021","journal-title":"arXiv:2102.10369"},{"key":"ref58","article-title":"BackdoorBox: A python toolbox for backdoor learning","author":"Li","year":"2023","journal-title":"arXiv:2302.01762"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10973774\/10772246.pdf?arnumber=10772246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T17:48:03Z","timestamp":1752169683000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10772246\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":58,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3509983","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}