{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:13:12Z","timestamp":1766268792342,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Austrian Research Promotion Agency (FFG)","award":["873979"],"award-info":[{"award-number":["873979"]}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["826078"],"award-info":[{"award-number":["826078"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3379534","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"168-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Poisoning Attacks in Federated Learning"],"prefix":"10.1145","author":[{"given":"Florian","family":"Nuding","sequence":"first","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}]},{"given":"Rudolf","family":"Mayer","sequence":"additional","affiliation":[{"name":"SBA Research gGmbH, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"unstructured":"Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2018. How To Backdoor Federated Learning. CoRR. abs\/1807.00459.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning","author":"Bhagoji Arjun Nitin","year":"2019","unstructured":"Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin Calo. 2019. Analyzing Federated Learning through an Adversarial Lens. In Proceedings of the 36th International Conference on Machine Learning. Long Beach, CA, USA."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3243734.3264418"},{"key":"e_1_3_2_1_4_1","volume-title":"Classification of Traffic Signs: The European Dataset","author":"Serna Citlalli Gamez","year":"2018","unstructured":"Citlalli Gamez Serna and Yassine Ruichek. 2018. Classification of Traffic Signs: The European Dataset. IEEE Access 6 (2018)."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the Machine Learning and Computer Security Workshop","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. In Proceedings of the Machine Learning and Computer Security Workshop. Long Beach, CA, USA."},{"key":"e_1_3_2_1_6_1","volume-title":"Federated Learning: Strategies for Improving Communication Efficiency. In Workshop on Private Multi-Party Machine Learning, Conference on Neural Information Processing Systems (NIPS).","author":"Konen\u00fd Jakub","year":"2016","unstructured":"Jakub Konen\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richtarik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated Learning: Strategies for Improving Communication Efficiency. In Workshop on Private Multi-Party Machine Learning, Conference on Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_7_1","volume-title":"Multi-institutional Deep Learning Modeling Without Sharing Patient Data: A Feasibility Study on Brain Tumor Segmentation. In International MICCAI Brainlesion Workshop BrainLes. Springer","author":"Sheller Micah J.","year":"2018","unstructured":"Micah J. Sheller, G. Anthony Reina, Brandon Edwards, Jason Martin, and Spyridon Bakas. 2018. Multi-institutional Deep Learning Modeling Without Sharing Patient Data: A Feasibility Study on Brain Tumor Segmentation. In International MICCAI Brainlesion Workshop BrainLes. Springer, Granada, Spain."},{"key":"e_1_3_2_1_8_1","volume-title":"Lei Yu, and Wenqi Wei.","author":"Truex Stacey","year":"2019","unstructured":"Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, and Wenqi Wei. 2019. Demystifying Membership Inference Attacks in Machine Learning as a Service. IEEE Transactions on Services Computing (2019)."},{"volume-title":"Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. In IEEE Symposium on Security and Privacy (SP)","author":"Wang Bolun","unstructured":"Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, and Ben Y. Zhao. 2019. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. In IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/3298981"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '20","name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3379534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3379534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3379534"}},"subtitle":["An Evaluation on Traffic Sign Classification"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":10,"alternative-id":["10.1145\/3374664.3379534","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3379534","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}