{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:48:46Z","timestamp":1769024926826,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Joint Key Funds of National Natural Science Foundation of China","award":["U24B20149"],"award-info":[{"award-number":["U24B20149"]}]},{"name":"Joint Key Funds of National Natural Science Foundation of China","award":["U23A20302"],"award-info":[{"award-number":["U23A20302"]}]},{"name":"Joint Key Funds of National Natural Science Foundation of China","award":["U24A20244"],"award-info":[{"award-number":["U24A20244"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302247"],"award-info":[{"award-number":["62302247"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202273"],"award-info":[{"award-number":["62202273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022QF140"],"award-info":[{"award-number":["ZR2022QF140"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Science Foundation for Excellent Young Scholars","award":["2023HWYQ-007"],"award-info":[{"award-number":["2023HWYQ-007"]}]},{"name":"the Postdoctoral Fellowship Program of China Postdoctoral Science Foundation","award":["GZC20231460"],"award-info":[{"award-number":["GZC20231460"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024M761806"],"award-info":[{"award-number":["2024M761806"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ton.2025.3592227","type":"journal-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:41:37Z","timestamp":1756489297000},"page":"79-91","source":"Crossref","is-referenced-by-count":2,"title":["Federated Bilevel Learning Against Model Poisoning Attacks"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3976-0870","authenticated-orcid":false,"given":"Yuan","family":"Yuan","sequence":"first","affiliation":[{"name":"School of Software and Joint SDU-NTU Centre for Artificial Intelligence Research (C-FAIR), Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0847-3526","authenticated-orcid":false,"given":"Yingfan","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0824-9284","authenticated-orcid":false,"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4579-5380","authenticated-orcid":false,"given":"Yifei","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2923-2748","authenticated-orcid":false,"given":"Yangguang","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6835-5981","authenticated-orcid":false,"given":"Dongxiao","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1568","article-title":"Bilevel programming for hyperparameter optimization and meta-learning","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"Franceschi"},{"key":"ref2","first-page":"19184","article-title":"Federated hyperparameter tuning: Challenges, baselines, and connections to weight-sharing","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Khodak"},{"key":"ref3","first-page":"1","article-title":"Meta-learning with differentiable closed-form solvers","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Bertinetto"},{"key":"ref4","article-title":"Federated meta-learning with fast convergence and efficient communication","author":"Chen","year":"2018","journal-title":"arXiv:1802.07876"},{"key":"ref5","article-title":"Personalized federated learning: A meta-learning approach","author":"Fallah","year":"2020","journal-title":"arXiv:2002.07948"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100264"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690187"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SAM60225.2024.10636694"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3302016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3324257"},{"key":"ref12","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bhagoji"},{"key":"ref13","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Security Symp. (USENIX Security)"},{"key":"ref14","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref15","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref16","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. NIPS","author":"Wang"},{"key":"ref17","first-page":"12613","article-title":"FL-WBC: Enhancing robustness against model poisoning attacks in federated learning from a client perspective","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sun"},{"key":"ref18","article-title":"Mitigating backdoor attacks in federated learning","author":"Wu","year":"2020","journal-title":"arXiv:2011.01767"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref20","first-page":"14039","article-title":"Achieving linear speedup in non-IID federated bilevel learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Huang"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335936"},{"key":"ref22","first-page":"11372","article-title":"CRFL: Certifiably robust federated learning against backdoor attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Xie"},{"key":"ref23","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23156"},{"key":"ref26","first-page":"7587","article-title":"SparseFed: Mitigating model poisoning attacks in federated learning with sparsification","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Panda"},{"key":"ref27","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019","journal-title":"arXiv:1911.07963"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23054"},{"key":"ref30","first-page":"43158","article-title":"Leadfl: Client self-defense against model poisoning in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhu"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1287\/opre.21.1.37"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-007-0176-2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2712906"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3132674"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/10556780802102586"},{"key":"ref36","article-title":"Approximation methods for bilevel programming","author":"Ghadimi","year":"2018","journal-title":"arXiv:1802.02246"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1137\/20m1387341"},{"key":"ref38","article-title":"Tighter analysis of alternating stochastic gradient method for stochastic nested problems","author":"Chen","year":"2021","journal-title":"arXiv:2106.13781"},{"key":"ref39","first-page":"13670","article-title":"Provably faster algorithms for bilevel optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yang"},{"key":"ref40","first-page":"26698","article-title":"A framework for bilevel optimization that enables stochastic and global variance reduction algorithms","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dagr\u00e9ou"},{"key":"ref41","first-page":"21146","article-title":"FedNest: Federated bilevel, minimax, and compositional optimization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tarzanagh"},{"key":"ref42","article-title":"Defending against diverse attacks in federated learning through consensus-based bi-level optimization","author":"Garc\u00eda Trillos","year":"2024","journal-title":"arXiv:2412.02535"},{"key":"ref43","first-page":"605","article-title":"Optimal brain damage, advances in neural information processing systems","volume":"598","author":"Le Cun","year":"1990"},{"key":"ref44","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","volume":"70","author":"Finn"},{"key":"ref45","article-title":"Reptile: A scalable metalearning algorithm","author":"Nichol","year":"2018","journal-title":"arXiv.1803.02999"}],"container-title":["IEEE Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723154\/11317935\/11143605.pdf?arnumber=11143605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T18:37:21Z","timestamp":1767119841000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11143605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/ton.2025.3592227","relation":{},"ISSN":["2998-4157"],"issn-type":[{"value":"2998-4157","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}