{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T01:43:03Z","timestamp":1769046183259,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872234, 61732010, 61525204"],"award-info":[{"award-number":["61872234, 61732010, 61525204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1145\/3472883.3486990","type":"proceedings-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T10:48:16Z","timestamp":1635331696000},"page":"47-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Siren"],"prefix":"10.1145","author":[{"given":"Hanxi","family":"Guo","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Louisiana State University, Baton Rouge, Louisiana"}]},{"given":"Tao","family":"Song","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai"}]},{"given":"Yang","family":"Hua","sequence":"additional","affiliation":[{"name":"Queen's University Belfast Belfast, Northern Ireland"}]},{"given":"Zhangcheng","family":"Lv","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Hangzhou, Zhejiang"}]},{"given":"Xiulang","family":"Jin","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd., Hangzhou, Zhejiang"}]},{"given":"Zhengui","family":"Xue","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai"}]},{"given":"Ruhui","family":"Ma","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai"}]},{"given":"Haibing","family":"Guan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai"}]}],"member":"320","published-online":{"date-parts":[[2021,11]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"TensorFlow: A System for Large-Scale Machine Learning. In USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , 2016 . TensorFlow: A System for Large-Scale Machine Learning. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, et al. 2016. TensorFlow: A System for Large-Scale Machine Learning. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_2_1","unstructured":"Dan Alistarh Zeyuan Allen-Zhu and Jerry Li. 2018. Byzantine Stochastic gradient descent. In Advances in Neural Information Processing Systems (NeurIPS).  Dan Alistarh Zeyuan Allen-Zhu and Jerry Li. 2018. Byzantine Stochastic gradient descent. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_3_1","volume-title":"International Conference on Artificial Intelligence and Statistics (ICAIS).","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan , Andreas Veit , Yiqing Hua , Deborah Estrin , and Vitaly Shmatikov . 2020 . How to Backdoor Federated Learning . In International Conference on Artificial Intelligence and Statistics (ICAIS). Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to Backdoor Federated Learning. In International Conference on Artificial Intelligence and Statistics (ICAIS)."},{"key":"e_1_3_2_2_4_1","volume-title":"Model Poisoning Attacks in Federated Learning. In NeurIPS Workshop on Security in Machine Learning (SecML).","author":"Bhagoji Arjun Nitin","year":"2018","unstructured":"Arjun Nitin Bhagoji , Supriyo Chakraborty , Prateek Mittal , and Seraphin Calo . 2018 . Model Poisoning Attacks in Federated Learning. In NeurIPS Workshop on Security in Machine Learning (SecML). Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin Calo. 2018. Model Poisoning Attacks in Federated Learning. In NeurIPS Workshop on Security in Machine Learning (SecML)."},{"key":"e_1_3_2_2_5_1","volume-title":"International Conference on Machine Learning (ICML).","author":"Bhagoji Arjun Nitin","unstructured":"Arjun Nitin Bhagoji , Supriyo Chakraborty , Prateek Mittal , and Seraphin B. Calo . 2019. Analyzing Federated Learning through an Adversarial Lens . In International Conference on Machine Learning (ICML). Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin B. Calo. 2019. Analyzing Federated Learning through an Adversarial Lens. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_6_1","volume-title":"Rachid Guerraoui, and Julien Stainer.","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard , El Mahdi El Mhamdi , Rachid Guerraoui, and Julien Stainer. 2017 . Machine Learning with Adversaries : Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems (NeurIPS) . Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_2_7_1","volume-title":"FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. arXiv preprint arXiv:2012.13995","author":"Cao Xiaoyu","year":"2020","unstructured":"Xiaoyu Cao , Minghong Fang , Jia Liu , and Neil Zhenqiang Gong . 2020. FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. arXiv preprint arXiv:2012.13995 ( 2020 ). Xiaoyu Cao, Minghong Fang, Jia Liu, and Neil Zhenqiang Gong. 2020. FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. arXiv preprint arXiv:2012.13995 (2020)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i8.16849"},{"key":"e_1_3_2_2_9_1","volume-title":"International Conference on Machine Learning (ICML).","author":"Chen Lingjiao","year":"2018","unstructured":"Lingjiao Chen , Hongyi Wang , Zachary Charles , and Dimitris Papailiopoulos . 2018 . DRACO: Byzantine-resilient Distributed Training via Redundant Gradients . In International Conference on Machine Learning (ICML). Lingjiao Chen, Hongyi Wang, Zachary Charles, and Dimitris Papailiopoulos. 2018. DRACO: Byzantine-resilient Distributed Training via Redundant Gradients. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154503"},{"key":"e_1_3_2_2_11_1","volume-title":"The Hidden Vulnerability of Distributed Learning in Byzantium. In International Conference on Machine Learning (ICML).","author":"El Mhamdi El Mahdi","year":"2018","unstructured":"El Mahdi El Mhamdi , Rachid Guerraoui , and S\u00e9bastien Rouault . 2018 . The Hidden Vulnerability of Distributed Learning in Byzantium. In International Conference on Machine Learning (ICML). El Mahdi El Mhamdi, Rachid Guerraoui, and S\u00e9bastien Rouault. 2018. The Hidden Vulnerability of Distributed Learning in Byzantium. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_12_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang , Xiaoyu Cao , Jinyuan Jia , and Neil Zhenqiang Gong . 2020 . Local Model Poisoning Attacks to Byzantine-Robust Federated Learning . In USENIX Security Symposium (USENIX Security). Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. 2020. Local Model Poisoning Attacks to Byzantine-Robust Federated Learning. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_2_13_1","volume-title":"Federated Learning: Strategies for Improving Communication Efficiency. In NeurIPS Workshop on Private Multi-Party Machine Learning (NeurIPS Workshop).","author":"Kone\u010dn\u00fd Jakub","year":"2016","unstructured":"Jakub Kone\u010dn\u00fd , H. Brendan McMahan , Felix X. Yu , Peter Richtarik , Ananda Theertha Suresh , 2016 . Federated Learning: Strategies for Improving Communication Efficiency. In NeurIPS Workshop on Private Multi-Party Machine Learning (NeurIPS Workshop). Jakub Kone\u010dn\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richtarik, Ananda Theertha Suresh, et al. 2016. Federated Learning: Strategies for Improving Communication Efficiency. In NeurIPS Workshop on Private Multi-Party Machine Learning (NeurIPS Workshop)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"e_1_3_2_2_18_1","volume-title":"Scaling Distributed Machine Learning with the Parameter Server. In USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Li Mu","year":"2014","unstructured":"Mu Li , David G Andersen , Jun Woo Park , Alexander J Smola , Amr Ahmed , 2014 . Scaling Distributed Machine Learning with the Parameter Server. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). Mu Li, David G Andersen, Jun Woo Park, Alexander J Smola, Amr Ahmed, et al. 2014. Scaling Distributed Machine Learning with the Parameter Server. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_19_1","volume-title":"Learning to Detect Malicious Clients for Robust Federated Learning. arXiv preprint arXiv:2002.00211","author":"Li Suyi","year":"2020","unstructured":"Suyi Li , Yong Cheng , Wei Wang , Yang Liu , and Tianjian Chen . 2020. Learning to Detect Malicious Clients for Robust Federated Learning. arXiv preprint arXiv:2002.00211 ( 2020 ). Suyi Li, Yong Cheng, Wei Wang, Yang Liu, and Tianjian Chen. 2020. Learning to Detect Malicious Clients for Robust Federated Learning. arXiv preprint arXiv:2002.00211 (2020)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_3_2_2_21_1","volume-title":"Threats to Federated Learning: A Survey. arXiv preprint arXiv:2003.02133","author":"Lyu Lingjuan","year":"2020","unstructured":"Lingjuan Lyu , Han Yu , and Qiang Yang . 2020. Threats to Federated Learning: A Survey. arXiv preprint arXiv:2003.02133 ( 2020 ). Lingjuan Lyu, Han Yu, and Qiang Yang. 2020. Threats to Federated Learning: A Survey. arXiv preprint arXiv:2003.02133 (2020)."},{"key":"e_1_3_2_2_22_1","volume-title":"International Conference on Artificial Intelligence and Statistics (ICAIS).","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , and Blaise Aguera y Arcas . 2017 . Communication-efficient Learning of Deep Networks from Decentralized Data . In International Conference on Artificial Intelligence and Statistics (ICAIS). Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient Learning of Deep Networks from Decentralized Data. In International Conference on Artificial Intelligence and Statistics (ICAIS)."},{"key":"e_1_3_2_2_23_1","volume-title":"Ananda Theertha Suresh, and H Brendan McMahan","author":"Sun Ziteng","year":"2019","unstructured":"Ziteng Sun , Peter Kairouz , Ananda Theertha Suresh, and H Brendan McMahan . 2019 . Can You Really Backdoor Federated Learning ? arXiv preprint arXiv:1911.07963 (2019). Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, and H Brendan McMahan. 2019. Can You Really Backdoor Federated Learning? arXiv preprint arXiv:1911.07963 (2019)."},{"key":"e_1_3_2_2_24_1","volume-title":"Mehmet Emre Gursoy, and Ling Liu","author":"Tolpegin Vale","year":"2020","unstructured":"Vale Tolpegin , Stacey Truex , Mehmet Emre Gursoy, and Ling Liu . 2020 . Data Poisoning Attacks Against Federated Learning Systems . arXiv preprint arXiv:2007.08432 (2020). Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, and Ling Liu. 2020. Data Poisoning Attacks Against Federated Learning Systems. arXiv preprint arXiv:2007.08432 (2020)."},{"key":"e_1_3_2_2_25_1","volume-title":"Fashion-mnist: A Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv preprint arXiv:1708.07747","author":"Xiao Han","year":"2017","unstructured":"Han Xiao , Kashif Rasul , and Roland Vollgraf . 2017 . Fashion-mnist: A Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv preprint arXiv:1708.07747 (2017). Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-mnist: A Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv preprint arXiv:1708.07747 (2017)."},{"key":"e_1_3_2_2_26_1","volume-title":"International Conference on Learning Representations (ICLR).","author":"Xie Chulin","year":"2019","unstructured":"Chulin Xie , Keli Huang , Pin-Yu Chen , and Bo Li . 2019 . DBA: Distributed Backdoor Attacks against Federated Learning . In International Conference on Learning Representations (ICLR). Chulin Xie, Keli Huang, Pin-Yu Chen, and Bo Li. 2019. DBA: Distributed Backdoor Attacks against Federated Learning. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_2_27_1","volume-title":"Generalized Byzantine-tolerant SGD. arXiv preprint arXiv:1802.10116","author":"Xie Cong","year":"2018","unstructured":"Cong Xie , Oluwasanmi Koyejo , and Indranil Gupta . 2018. Generalized Byzantine-tolerant SGD. arXiv preprint arXiv:1802.10116 ( 2018 ). Cong Xie, Oluwasanmi Koyejo, and Indranil Gupta. 2018. Generalized Byzantine-tolerant SGD. arXiv preprint arXiv:1802.10116 (2018)."},{"key":"e_1_3_2_2_28_1","unstructured":"Cong Xie Oluwasanmi Koyejo and Indranil Gupta. 2020. Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation. In Uncertainty in Artificial Intelligence (UAI).  Cong Xie Oluwasanmi Koyejo and Indranil Gupta. 2020. Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation. In Uncertainty in Artificial Intelligence (UAI)."},{"key":"e_1_3_2_2_29_1","volume-title":"Zeno: Distributed Stochastic Gradient Descent with Suspicion-based Fault-tolerance. In International Conference on Machine Learning (ICML).","author":"Xie Cong","year":"2019","unstructured":"Cong Xie , Sanmi Koyejo , and Indranil Gupta . 2019 . Zeno: Distributed Stochastic Gradient Descent with Suspicion-based Fault-tolerance. In International Conference on Machine Learning (ICML). Cong Xie, Sanmi Koyejo, and Indranil Gupta. 2019. Zeno: Distributed Stochastic Gradient Descent with Suspicion-based Fault-tolerance. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2015.2472014"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_2_2_32_1","volume-title":"Defending Against Saddle Point Attack in Byzantine-robust Distributed Learning. In International Conference on Machine Learning (ICML).","author":"Yin Dong","year":"2019","unstructured":"Dong Yin , Yudong Chen , Ramchandran Kannan , and Peter Bartlett . 2019 . Defending Against Saddle Point Attack in Byzantine-robust Distributed Learning. In International Conference on Machine Learning (ICML). Dong Yin, Yudong Chen, Ramchandran Kannan, and Peter Bartlett. 2019. Defending Against Saddle Point Attack in Byzantine-robust Distributed Learning. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_33_1","volume-title":"Byzantine-robust Distributed Learning: Towards Optimal Statistical Rates. In International Conference on Machine Learning (ICML).","author":"Yin Dong","unstructured":"Dong Yin , Yudong Chen , Kannan Ramchandran , and Peter L. Bartlett . 2018 . Byzantine-robust Distributed Learning: Towards Optimal Statistical Rates. In International Conference on Machine Learning (ICML). Dong Yin, Yudong Chen, Kannan Ramchandran, and Peter L. Bartlett. 2018. Byzantine-robust Distributed Learning: Towards Optimal Statistical Rates. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_2_2_34_1","unstructured":"Yue Zhao Meng Li Liangzhen Lai Naveen Suda Damon Civin etal 2018. Federated Learning with Non-IID Data. arXiv preprint arXiv:1806.00582 (2018).  Yue Zhao Meng Li Liangzhen Lai Naveen Suda Damon Civin et al. 2018. Federated Learning with Non-IID Data. arXiv preprint arXiv:1806.00582 (2018)."}],"event":{"name":"SoCC '21: ACM Symposium on Cloud Computing","location":"Seattle WA USA","acronym":"SoCC '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472883.3486990","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472883.3486990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:57Z","timestamp":1750191117000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472883.3486990"}},"subtitle":["Byzantine-robust Federated Learning via Proactive Alarming"],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":33,"alternative-id":["10.1145\/3472883.3486990","10.1145\/3472883"],"URL":"https:\/\/doi.org\/10.1145\/3472883.3486990","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"2021-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}