{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:38:15Z","timestamp":1730302695214,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T00:00:00Z","timestamp":1666396800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,22]]},"DOI":"10.1109\/uv56588.2022.10185525","type":"proceedings-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T17:58:12Z","timestamp":1690394292000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Robust Smart Home Face Recognition Under Starving Federated Data"],"prefix":"10.1109","author":[{"given":"Jaechul","family":"Roh","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology,Department of Electronic and Computer Engineering,Hong Kong,China"}]},{"given":"Yajun","family":"Fang","sequence":"additional","affiliation":[{"name":"Universal Village Society,Cambridge,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref35","article-title":"Character-level convolutional networks for text classification","volume":"28","author":"zhang","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697695"},{"key":"ref34","first-page":"1631","article-title":"Recursive deep models for semantic compositionality over a sentiment treebank","author":"socher","year":"2013","journal-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing"},{"article-title":"Pins Face Recognition | Kaggle","year":"2022","author":"toy","key":"ref15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"ref14","article-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain","author":"gu","year":"2017","journal-title":"arXiv preprint arXiv 1708 06578"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.37"},{"key":"ref31","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n?","year":"2016","journal-title":"arXiv preprint arXiv 1610 05492"},{"key":"ref30","first-page":"21 554","article-title":"Robust federated learning: The case of affine distribution shifts","volume":"33","author":"reisizadeh","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICOASE.2019.8723673"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref10","first-page":"35","article-title":"Real-time face recognition for smart home applications","author":"zuo","year":"2005","journal-title":"2005 Digest of Technical Papers International Conference on Consumer Electronics 2005 ICCE"},{"key":"ref32","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"li","year":"2020","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"ref2","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv preprint arXiv 1412 6572"},{"key":"ref1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.04.105"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref38","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"arXiv preprint arXiv 1810 04805"},{"key":"ref19","first-page":"322","article-title":"A performance evaluation of loss functions for deep face recognition","author":"srivastava","year":"2019","journal-title":"National conference on Computer Vision Pattern Recognition Image Processing and Graphics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.527"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12341"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref25","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"chen","year":"2017","journal-title":"arXiv preprint arXiv 1712 05526"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00178"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref21","article-title":"Torchattacks: A pytorch repository for adversarial attacks","author":"kim","year":"2020","journal-title":"arXiv preprint arXiv 2010"},{"key":"ref28","article-title":"Exploring misclassifications of robust neural networks to enhance adversarial attacks","author":"schwinn","year":"2021","journal-title":"arXiv preprint arXiv 2105 10304"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref29","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","volume":"33","author":"wang","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref8","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref7","article-title":"The space of transferable adversarial examples","author":"tram\u00e8r","year":"2017","journal-title":"arXiv preprint arXiv 1704 03453"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CEET1.2019.8711849"},{"key":"ref4","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2017","journal-title":"arXiv preprint arXiv 1706 06083"},{"key":"ref3","article-title":"Fast is better than free: Revisiting adversarial training","author":"wong","year":"2020","journal-title":"arXiv preprint arXiv 2001 03994"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref40","article-title":"Onion: A simple and effective defense against textual backdoor attacks","author":"qi","year":"2020","journal-title":"arXiv preprint arXiv 2011 10068"}],"event":{"name":"2022 6th International Conference on Universal Village (UV)","start":{"date-parts":[[2022,10,22]]},"location":"Boston, MA, USA","end":{"date-parts":[[2022,10,25]]}},"container-title":["2022 6th International Conference on Universal Village (UV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10185200\/10185442\/10185525.pdf?arnumber=10185525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:34:47Z","timestamp":1692034487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10185525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,22]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/uv56588.2022.10185525","relation":{},"subject":[],"published":{"date-parts":[[2022,10,22]]}}}