{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:33:45Z","timestamp":1774020825646,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001778","name":"Centre for Cyber Security Research and Innovation (CSRI), School of Information Technology, Deakin University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001778","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tsg.2023.3292382","type":"journal-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T17:16:07Z","timestamp":1688577367000},"page":"2044-2055","source":"Crossref","is-referenced-by-count":57,"title":["A Secure Federated Learning Framework for Residential Short-Term Load Forecasting"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7908-8807","authenticated-orcid":false,"given":"Muhammad Akbar","family":"Husnoo","sequence":"first","affiliation":[{"name":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0070-182X","authenticated-orcid":false,"given":"Adnan","family":"Anwar","sequence":"additional","affiliation":[{"name":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8755-1176","authenticated-orcid":false,"given":"Nasser","family":"Hosseinzadeh","sequence":"additional","affiliation":[{"name":"Centre for Smart Power and Energy Research, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2354-7960","authenticated-orcid":false,"given":"Shama Naz","family":"Islam","sequence":"additional","affiliation":[{"name":"Centre for Smart Power and Energy Research, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7769-3384","authenticated-orcid":false,"given":"Abdun Naser","family":"Mahmood","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, La Trobe University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-6850","authenticated-orcid":false,"given":"Robin","family":"Doss","sequence":"additional","affiliation":[{"name":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1016\/j.renene.2021.11.019","article-title":"Smart grids and smart technologies in relation to photovoltaics, storage systems, buildings and the environment","volume":"185","author":"Lamnatou","year":"2022","journal-title":"Renew. Energy"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100111","article-title":"Security aspects of Internet of Things aided smart grids: A bibliometric survey","volume":"14","author":"Sakhnini","year":"2021","journal-title":"Internet Things"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3095506"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3592797"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2528282.2528295"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APPEEC53445.2022.10072290"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148937"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110784"},{"key":"ref12","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3157299"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2022.108830","article-title":"An integrated federated learning algorithm for short-term load forecasting","volume":"214","author":"Yang","year":"2023","journal-title":"Electr. Power Syst. Res."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2022.3206220"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/su141912843"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2021.07350"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-08130-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.09.011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3154503"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029245"},{"key":"ref24","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. NIPS","author":"Blanchard"},{"key":"ref25","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in Byzantium","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"El Mhamdi"},{"key":"ref26","first-page":"21616","article-title":"Distributed training with heterogeneous data: Bridging median-and mean-based algorithms","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Chen"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"ref28","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"Yin"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3012952"},{"key":"ref30","article-title":"Robust aggregation for federated learning","author":"Pillutla","year":"2019","journal-title":"arXiv:1912.13445"},{"key":"ref31","article-title":"Byzantine-robust federated machine learning through adaptive model averaging","author":"Mu\u00f1oz-Gonzalez","year":"2019","journal-title":"arXiv:1909.05125"},{"key":"ref32","article-title":"Attack-resistant federated learning with residual-based reweighting","author":"Fu","year":"2019","journal-title":"arXiv:1912.11464"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3140131"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991125"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054676"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00042"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/app12178847"},{"key":"ref38","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref39","first-page":"6692","article-title":"From local SGD to local fixed-point methods for federated learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","volume":"119","author":"Malinovskiy"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488877"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3124309"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3163591"},{"key":"ref43","article-title":"Protection against reconstruction and its applications in private federated learning","author":"Bhowmick","year":"2018","journal-title":"arXiv:1812.00984"},{"key":"ref44","article-title":"Towards general deep leakage in federated learning","author":"Geng","year":"2021","journal-title":"arXiv:2110.09074"},{"key":"ref45","first-page":"1605","article-title":"Local model poisoning attacks to Byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Security Symp. (USENIX Security)","author":"Fang"},{"key":"ref46","article-title":"Stochastic-sign SGD for federated learning with theoretical guarantees","author":"Jin","year":"2020","journal-title":"arXiv:2002.10940"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/10440375\/10173657.pdf?arnumber=10173657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T13:17:27Z","timestamp":1709299047000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10173657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":46,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2023.3292382","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}