{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:59:58Z","timestamp":1773795598320,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,10]]},"DOI":"10.1109\/wcnc51071.2022.9771594","type":"proceedings-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:45:39Z","timestamp":1652733939000},"page":"572-577","source":"Crossref","is-referenced-by-count":14,"title":["Federated Learning Stability Under Byzantine Attacks"],"prefix":"10.1109","author":[{"given":"A.","family":"Gouissem","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Qatar University,Qatar"}]},{"given":"K.","family":"Abualsaud","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Qatar University,Qatar"}]},{"given":"E.","family":"Yaacoub","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Qatar University,Qatar"}]},{"given":"T.","family":"Khattab","sequence":"additional","affiliation":[{"name":"Electrical Engineering, Qatar University,Qatar"}]},{"given":"M.","family":"Guizani","sequence":"additional","affiliation":[{"name":"Mohamed Bin Zayed University of Artificial Intelligence,Machine Learning Department,UAE"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647636"},{"key":"ref3","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume-title":"International Conference on Machine Learning","author":"Guerraoui"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3066384"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT51360.2021.9595654"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3067824"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148376"},{"key":"ref8","article-title":"Towards Realistic Byzantine-Robust Federated Learning","author":"Amit","year":"2020","journal-title":"CoRR"},{"key":"ref9","article-title":"Robust federated learning using admm in the presence of data falsifying byzantines","author":"Li","year":"2017","journal-title":"arXiv preprint arXiv:1710.05241"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219655"},{"key":"ref11","first-page":"634","article-title":"Analyzing Federated Learning through an Adversarial Lens","volume-title":"Proceedings of the 36th International Conference on Machine Learning","author":"Bhagoji"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref13","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"Blanchard"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170817"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041404"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.10.016"},{"key":"ref17","article-title":"Federated learning with non-iid data","author":"Zhao","year":"2018","journal-title":"arXiv preprint arXiv:1806.00582"},{"key":"ref18","article-title":"First analysis of local gd on heterogeneous data","author":"Khaled","year":"2019","journal-title":"arXiv preprint arXiv:1909.04715"},{"key":"ref19","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics.","author":"McMahan","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-020-0495-6"}],"event":{"name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","location":"Austin, TX, USA","start":{"date-parts":[[2022,4,10]]},"end":{"date-parts":[[2022,4,13]]}},"container-title":["2022 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9771381\/9771540\/09771594.pdf?arnumber=9771594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T03:39:11Z","timestamp":1706067551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9771594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wcnc51071.2022.9771594","relation":{},"subject":[],"published":{"date-parts":[[2022,4,10]]}}}