{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:25:59Z","timestamp":1774023959397,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research on Privacy-Preserving Issues Within Smart City Truth Discovery Process","award":["No. 61872372"],"award-info":[{"award-number":["No. 61872372"]}]},{"name":"NUDT Research Grants","award":["No. ZK19-38"],"award-info":[{"award-number":["No. ZK19-38"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3472456.3472469","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T18:46:04Z","timestamp":1633459564000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["FIFL: A Fair Incentive Mechanism for Federated Learning"],"prefix":"10.1145","author":[{"given":"Liang","family":"Gao","sequence":"first","affiliation":[{"name":"National University of Defense Technology"}]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"ShenZhen Institutes of Advanced Technology, Chinese Academy of Sciences, China"}]},{"given":"Yingwen","family":"Chen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Wenli","family":"Zheng","sequence":"additional","affiliation":[{"name":"Emerging Parallel Computing Center\uff0c Shanghai Jiao Tong University"}]},{"given":"ChengZhong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Macau, Macau"}]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan , Andreas Veit , Yiqing Hua , Deborah Estrin , and Vitaly Shmatikov . 2020 . How to backdoor federated learning . In International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948 . Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948."},{"key":"e_1_3_2_1_2_1","volume-title":"Advances in Neural Information Processing Systems, H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.), Vol.\u00a032. Curran Associates","author":"Baruch Gilad","year":"2019","unstructured":"Gilad Baruch , Moran Baruch , and Yoav Goldberg . 2019. A Little Is Enough: Circumventing Defenses For Distributed Learning . In Advances in Neural Information Processing Systems, H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.), Vol.\u00a032. Curran Associates , Inc .https:\/\/proceedings.neurips.cc\/paper\/ 2019 \/file\/ec1c59141046cd1866bbbcdfb6ae31d4-Paper.pdf Gilad Baruch, Moran Baruch, and Yoav Goldberg. 2019. A Little Is Enough: Circumventing Defenses For Distributed Learning. In Advances in Neural Information Processing Systems, H.\u00a0Wallach, H.\u00a0Larochelle, A.\u00a0Beygelzimer, F.\u00a0d'Alch\u00e9-Buc, E.\u00a0Fox, and R.\u00a0Garnett (Eds.), Vol.\u00a032. Curran Associates, Inc.https:\/\/proceedings.neurips.cc\/paper\/2019\/file\/ec1c59141046cd1866bbbcdfb6ae31d4-Paper.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard , El\u00a0Mahdi El\u00a0Mhamdi , Rachid Guerraoui , and Julien Stainer . 2017 . Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent . In Proceedings of the 31st International Conference on Neural Information Processing Systems ( Long Beach, California, USA) (NIPS\u201917). Curran Associates Inc., Red Hook, NY, USA, 118\u2013128. Peva Blanchard, El\u00a0Mahdi El\u00a0Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Proceedings of the 31st International Conference on Neural Information Processing Systems(Long Beach, California, USA) (NIPS\u201917). Curran Associates Inc., Red Hook, NY, USA, 118\u2013128."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2891417"},{"key":"e_1_3_2_1_5_1","volume-title":"Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.\u00a0F. Balcan, and H.\u00a0Lin (Eds.), Vol.\u00a033. Curran Associates","author":"Deng Yuyang","year":"2020","unstructured":"Yuyang Deng , Mohammad\u00a0Mahdi Kamani , and Mehrdad Mahdavi . 2020. Distributionally Robust Federated Averaging . In Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.\u00a0F. Balcan, and H.\u00a0Lin (Eds.), Vol.\u00a033. Curran Associates , Inc ., 15111\u201315122. https:\/\/proceedings.neurips.cc\/paper\/ 2020 \/file\/ac450d10e166657ec8f93a1b65ca1b14-Paper.pdf Yuyang Deng, Mohammad\u00a0Mahdi Kamani, and Mehrdad Mahdavi. 2020. Distributionally Robust Federated Averaging. In Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.\u00a0F. Balcan, and H.\u00a0Lin (Eds.), Vol.\u00a033. Curran Associates, Inc., 15111\u201315122. https:\/\/proceedings.neurips.cc\/paper\/2020\/file\/ac450d10e166657ec8f93a1b65ca1b14-Paper.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"El\u00a0Mahdi El\u00a0Mhamdi Rachid Guerraoui and S\u00e9bastien Louis\u00a0Alexandre Rouault. 2018. The Hidden Vulnerability of Distributed Learning in Byzantium. (2018) 13. http:\/\/infoscience.epfl.ch\/record\/256124 camera ready version available also on ICML proceedings (open access).  El\u00a0Mahdi El\u00a0Mhamdi Rachid Guerraoui and S\u00e9bastien Louis\u00a0Alexandre Rouault. 2018. The Hidden Vulnerability of Distributed Learning in Byzantium. (2018) 13. http:\/\/infoscience.epfl.ch\/record\/256124 camera ready version available also on ICML proceedings (open access)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.070"},{"key":"e_1_3_2_1_8_1","unstructured":"Sreenivas Gollapudi Kostas Kollias Debmalya Panigrahi and Venetia Pliatsika. 2017. Profit Sharing and Efficiency in Utility Games. In ESA.  Sreenivas Gollapudi Kostas Kollias Debmalya Panigrahi and Venetia Pliatsika. 2017. Profit Sharing and Efficiency in Utility Games. In ESA."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2010.55"},{"key":"e_1_3_2_1_10_1","first-page":"1441","article-title":"A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing","volume":"18","author":"Huang Kai","year":"2021","unstructured":"Kai Huang , Ximeng Liu , Shaojing Fu , Deke Guo , and Ming Xu . 2021 . A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing . IEEE Transactions on Dependable and Secure Computing 18 , 3 (2021), 1441 \u2013 1455 . https:\/\/doi.org\/10.1109\/TDSC.2019.2913362 Kai Huang, Ximeng Liu, Shaojing Fu, Deke Guo, and Ming Xu. 2021. A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing. IEEE Transactions on Dependable and Secure Computing 18, 3 (2021), 1441\u20131455. https:\/\/doi.org\/10.1109\/TDSC.2019.2913362","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_11_1","volume-title":"A survey of trust and reputation systems for online service provision. 43, 2","author":"Josang Audun","year":"2007","unstructured":"Audun Josang , Roslan Ismail , and Colin Boyd . 2007. A survey of trust and reputation systems for online service provision. 43, 2 ( 2007 ), 618\u2013644. Audun Josang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. 43, 2 (2007), 618\u2013644."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"e_1_3_2_1_13_1","volume-title":"Three-valued subjective logic: A model for trust assessment in online social networks","author":"Liu Guangchi","year":"2019","unstructured":"Guangchi Liu , Qing Yang , Honggang Wang , and Alex\u00a0 X Liu . 2019. Three-valued subjective logic: A model for trust assessment in online social networks . IEEE Transactions on Dependable and Secure Computing ( 2019 ). Guangchi Liu, Qing Yang, Honggang Wang, and Alex\u00a0X Liu. 2019. Three-valued subjective logic: A model for trust assessment in online social networks. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_1_14_1","unstructured":"Lumin Liu Jun Zhang S.\u00a0H. Song and Khaled\u00a0B. Letaief. 2019. Client-Edge-Cloud Hierarchical Federated Learning. arxiv:1905.06641\u00a0[cs.NI]  Lumin Liu Jun Zhang S.\u00a0H. Song and Khaled\u00a0B. Letaief. 2019. Client-Edge-Cloud Hierarchical Federated Learning. arxiv:1905.06641\u00a0[cs.NI]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2885282"},{"key":"e_1_3_2_1_16_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. PMLR 1273\u20131282.  Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. PMLR 1273\u20131282."},{"key":"e_1_3_2_1_17_1","volume-title":"Adding Gradient Noise Improves Learning for Very Deep Networks. (11","author":"Neelakantan Arvind","year":"2015","unstructured":"Arvind Neelakantan , Luke Vilnis , Quoc Le , Ilya Sutskever , Lukasz Kaiser , Karol Kurach , and James Martens . 2015. Adding Gradient Noise Improves Learning for Very Deep Networks. (11 2015 ). Arvind Neelakantan, Luke Vilnis, Quoc Le, Ilya Sutskever, Lukasz Kaiser, Karol Kurach, and James Martens. 2015. Adding Gradient Noise Improves Learning for Very Deep Networks. (11 2015)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190517"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991125"},{"key":"e_1_3_2_1_21_1","unstructured":"Hwanjun Song Minseok Kim Dongmin Park Yooju Shin and Jae-Gil Lee. 2021. Learning from Noisy Labels with Deep Neural Networks: A Survey. arxiv:2007.08199\u00a0[cs.LG]  Hwanjun Song Minseok Kim Dongmin Park Yooju Shin and Jae-Gil Lee. 2021. Learning from Noisy Labels with Deep Neural Networks: A Survey. arxiv:2007.08199\u00a0[cs.LG]"},{"key":"e_1_3_2_1_22_1","unstructured":"Gan Sun Yang Cong Jiahua Dong Qiang Wang and Ji Liu. 2020. Data Poisoning Attacks on Federated Machine Learning. arxiv:2004.10020\u00a0[cs.CR]  Gan Sun Yang Cong Jiahua Dong Qiang Wang and Ji Liu. 2020. Data Poisoning Attacks on Federated Machine Learning. arxiv:2004.10020\u00a0[cs.CR]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322431.3326327"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.005"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.10016848"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2433081.2433088"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298885"},{"key":"e_1_3_2_1_28_1","volume-title":"Zeno: Byzantine-suspicious stochastic gradient descent. arXiv preprint arXiv:1805.10032 24","author":"Xie Cong","year":"2018","unstructured":"Cong Xie , Oluwasanmi Koyejo , and Indranil Gupta . 2018 . Zeno: Byzantine-suspicious stochastic gradient descent. arXiv preprint arXiv:1805.10032 24 (2018). Cong Xie, Oluwasanmi Koyejo, and Indranil Gupta. 2018. Zeno: Byzantine-suspicious stochastic gradient descent. arXiv preprint arXiv:1805.10032 24 (2018)."},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Machine Learning. PMLR, 10495\u201310503","author":"Xie Cong","year":"2020","unstructured":"Cong Xie , Sanmi Koyejo , and Indranil Gupta . 2020 . Zeno++: Robust fully asynchronous SGD . In International Conference on Machine Learning. PMLR, 10495\u201310503 . Cong Xie, Sanmi Koyejo, and Indranil Gupta. 2020. Zeno++: Robust fully asynchronous SGD. In International Conference on Machine Learning. PMLR, 10495\u201310503."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2676898"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375840"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967772"},{"key":"e_1_3_2_1_34_1","unstructured":"Yue Zhao Meng Li Liangzhen Lai Naveen Suda Damon Civin and Vikas Chandra. 2018. Federated learning with non-iid data. arXiv preprint arXiv:1806.00582(2018).  Yue Zhao Meng Li Liangzhen Lai Naveen Suda Damon Civin and Vikas Chandra. 2018. Federated learning with non-iid data. arXiv preprint arXiv:1806.00582(2018)."}],"event":{"name":"ICPP 2021: 50th International Conference on Parallel Processing","location":"Lemont IL USA","acronym":"ICPP 2021"},"container-title":["50th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472456.3472469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472456.3472469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472456.3472469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":34,"alternative-id":["10.1145\/3472456.3472469","10.1145\/3472456"],"URL":"https:\/\/doi.org\/10.1145\/3472456.3472469","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}