{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T14:06:17Z","timestamp":1772633177219,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T00:00:00Z","timestamp":1762905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,12]]},"DOI":"10.1109\/tps-isa67132.2025.00015","type":"proceedings-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:50:15Z","timestamp":1772571015000},"page":"43-53","source":"Crossref","is-referenced-by-count":0,"title":["RBBD: A Representation-Based Framework for Edge-Case Backdoor Defense in Federated Learning"],"prefix":"10.1109","author":[{"given":"Samir","family":"Poudel","sequence":"first","affiliation":[{"name":"Middle Tennessee State University,Computational and Data Science,Murfreesboro,TN,37132"}]},{"given":"Kritagya","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University,Department of Computer Science,Murfreesboro,TN,37132"}]},{"given":"Jiblal","family":"Upadhya","sequence":"additional","affiliation":[{"name":"Lander University,Department of Applied Computing,Greenwood,S.C.,29649"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","author":"McMahan","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref4","first-page":"374","article-title":"Towards federated learning at scale: System design","volume-title":"Proceedings of Machine Learning and Systems","author":"Bonawitz","year":"2019"},{"key":"ref5","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proceedings of Machine Learning and Systems","volume":"2","author":"Li","year":"2020"},{"key":"ref6","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Bagdasaryan","year":"2019"},{"key":"ref7","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"International Conference on Machine Learning","author":"Bhagoji","year":"2019"},{"key":"ref8","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume":"33","author":"Wang","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref9","article-title":"Can you really backdoor federated learning?","volume-title":"Workshop on Federated Learning for User Privacy and Data Confidentiality","author":"Sun","year":"2021"},{"key":"ref10","article-title":"Intriguing properties of neural networks","volume-title":"International Conference on Learning Representations","author":"Szegedy","year":"2014"},{"key":"ref11","author":"Rajpurkar","year":"2017","journal-title":"Chexnet: Radiologistlevel pneumonia detection on chest x-rays with deep learning"},{"key":"ref12","author":"Bojarski","year":"2016","journal-title":"End to end learning for self-driving cars"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1042727940"},{"key":"ref14","author":"Goodfellow","year":"2014","journal-title":"Explaining and harnessing adversarial examples"},{"key":"ref15","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","author":"Blanchard","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref16","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"International Conference on Machine Learning","author":"Yin","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref18","first-page":"301","article-title":"The limitations of federated learning in sybil settings","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses","author":"Fung","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23156"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref21","first-page":"1415","article-title":"Flame: Taming backdoors in federated learning","volume-title":"31st USENIX Security Symposium","author":"Nguyen","year":"2022"},{"key":"ref22","volume-title":"Fedcostwavg: A new averaging for better federated learning","author":"M\u00e4chler","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref25","article-title":"Feddefender: Client-side attack-tolerant federated learning","volume-title":"International Conference on Learning Representations","author":"Gill","year":"2023"},{"key":"ref26","first-page":"11372","article-title":"Crfl: Certifiably robust federated learning against backdoor attacks","volume-title":"International Conference on Machine Learning","author":"Xie","year":"2021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2017.07.005"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.02.026"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500052444"},{"key":"ref31","volume-title":"Density estimation for statistics and data analysis","author":"Silverman","year":"1986"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref33","volume-title":"Threat modeling: Designing for security","author":"Shostack","year":"2014"},{"issue":"1999","key":"ref34","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OSDI"},{"key":"ref35","volume-title":"Introduction to statistical quality control","author":"Montgomery","year":"2012"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551274"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199535255.001.0001"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref43","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009","journal-title":"Citeseer, Tech. Rep."},{"key":"ref44","author":"Xiao","year":"2017","journal-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms"},{"key":"ref45","author":"Hsu","year":"2019","journal-title":"Measuring the effects of nonidentical data distribution for federated visual classification"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"event":{"name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","location":"Pittsburgh, PA, USA","start":{"date-parts":[[2025,11,12]]},"end":{"date-parts":[[2025,11,14]]}},"container-title":["2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11410113\/11410157\/11410173.pdf?arnumber=11410173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T07:18:06Z","timestamp":1772608686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11410173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,12]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/tps-isa67132.2025.00015","relation":{},"subject":[],"published":{"date-parts":[[2025,11,12]]}}}