{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:08:39Z","timestamp":1759133319511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["833418"],"award-info":[{"award-number":["833418"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3474374.3486915","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T22:04:12Z","timestamp":1636149852000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["The More, the Better"],"prefix":"10.1145","author":[{"given":"Arthur","family":"Drichel","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Benedikt","family":"Holmes","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Justus","family":"von Brandt","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"volume-title":"Security & Privacy","author":"Al-Rubaie Mohammad","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362817"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2015.071829"},{"key":"e_1_3_2_2_5_1","unstructured":"Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2020. How to Backdoor Federated Learning. In Artificial Intelligence and Statistics. PMLR. Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2020. How to Backdoor Federated Learning. In Artificial Intelligence and Statistics. PMLR."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3294771.3294783"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/648054.743935"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407030"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409190"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_2_14_1","unstructured":"Yann Fraboni Richard Vidal and Marco Lorenzi. 2021. Free-rider Attacks on Model Aggregation in Federated Learning. In Artificial Intelligence and Statistics. PMLR. Yann Fraboni Richard Vidal and Marco Lorenzi. 2021. Free-rider Attacks on Model Aggregation in Federated Learning. In Artificial Intelligence and Statistics. PMLR."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671227"},{"key":"e_1_3_2_2_17_1","unstructured":"Robin C Geyer Tassilo Klein and Moin Nabi. 2017. Differentially Private Federated Learning: A Client Level Perspective. arXiv:1712.07557. Robin C Geyer Tassilo Klein and Moin Nabi. 2017. Differentially Private Federated Learning: A Client Level Perspective. arXiv:1712.07557."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3086952"},{"volume-title":"Detecting DGA Malware Using NetFlow. In IFIP\/IEEE International Symposium on Integrated Network Management.","year":"2015","author":"Grill Martin","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Rachid Guerraoui Nirupam Gupta Rafa\u00ebl Pinot S\u00e9bastien Rouault and John Stephan. 2021. Differential Privacy and Byzantine Resilience in SGD: Do They Add Up? arXiv:2102.08166. Rachid Guerraoui Nirupam Gupta Rafa\u00ebl Pinot S\u00e9bastien Rouault and John Stephan. 2021. Differential Privacy and Byzantine Resilience in SGD: Do They Add Up? arXiv:2102.08166.","DOI":"10.1145\/3465084.3467919"},{"key":"e_1_3_2_2_21_1","unstructured":"Jiale Guo Ziyao Liu Kwok-Yan Lam Jun Zhao Yiqiang Chen and Chaoping Xing. 2020. Secure Weighted Aggregation in Federated Learning. arXiv:2010.08730. Jiale Guo Ziyao Liu Kwok-Yan Lam Jun Zhao Yiqiang Chen and Chaoping Xing. 2020. Secure Weighted Aggregation in Federated Learning. arXiv:2010.08730."},{"key":"e_1_3_2_2_22_1","unstructured":"Geoffrey Hinton Oriol Vinyals and Jeff Dean. 2015. Distilling the Knowledge in a Neural Network. arXiv:1503.02531. Geoffrey Hinton Oriol Vinyals and Jeff Dean. 2015. Distilling the Knowledge in a Neural Network. arXiv:1503.02531."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_2_24_1","unstructured":"Peter Kairouz Brendan McMahan Shuang Song Om Thakkar Abhradeep Thakurta and Zheng Xu. 2021. Practical and Private (Deep) Learning without Sampling or Shuffling. arXiv:2103.00039. Peter Kairouz Brendan McMahan Shuang Song Om Thakkar Abhradeep Thakurta and Zheng Xu. 2021. Practical and Private (Deep) Learning without Sampling or Shuffling. arXiv:2103.00039."},{"key":"e_1_3_2_2_25_1","unstructured":"Peter Kairouz and H. Brendan McMahan. 2021. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning. Peter Kairouz and H. Brendan McMahan. 2021. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Raouf Kerkouche Gergely \u00c1cs Claude Castelluccia and Pierre Genev\u00e8s. 2021. Constrained Differentially Private Federated Learning for Low-bandwidth Devices. arXiv:2103.00342. Raouf Kerkouche Gergely \u00c1cs Claude Castelluccia and Pierre Genev\u00e8s. 2021. Constrained Differentially Private Federated Learning for Low-bandwidth Devices. arXiv:2103.00342.","DOI":"10.1109\/EuroSP51992.2021.00029"},{"volume-title":"Schaefer","year":"2021","author":"Kim Muah","key":"e_1_3_2_2_27_1"},{"volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Network and Distributed System Security Symposium. Internet Society.","year":"2019","author":"Pochat Victor Le","key":"e_1_3_2_2_28_1"},{"volume-title":"Yu","year":"2020","author":"Lyu Lingjuan","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","unstructured":"Nicholas Malecki Hye-young Paik Aleksandar Ignjatovic Alan Blair and Elisa Bertino. 2021. Simeon -- Secure Federated Machine Learning Through Iterative Filtering. arXiv:2103.07704. Nicholas Malecki Hye-young Paik Aleksandar Ignjatovic Alan Blair and Elisa Bertino. 2021. Simeon -- Secure Federated Machine Learning Through Iterative Filtering. arXiv:2103.07704."},{"key":"e_1_3_2_2_31_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Artificial Intelligence and Statistics. PMLR. Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Artificial Intelligence and Statistics. PMLR."},{"volume-title":"Security and Privacy","author":"Nasr Milad","key":"e_1_3_2_2_32_1"},{"volume-title":"Seong Joon Oh","year":"2020","author":"Orekondy Tribhuvanesh","key":"e_1_3_2_2_33_1"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_3_2_2_35_1","unstructured":"Nicolas Papernot Mart\u00edn Abadi \u00dalfar Erlingsson Ian Goodfellow and Kunal Talwar. 2017. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. arXiv:2012.02670. Nicolas Papernot Mart\u00edn Abadi \u00dalfar Erlingsson Ian Goodfellow and Kunal Talwar. 2017. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. arXiv:2012.02670."},{"volume-title":"SoK: Security and Privacy in Machine Learning. In European Symposium on Security and Privacy. IEEE.","author":"Papernot Nicolas","key":"e_1_3_2_2_36_1"},{"volume-title":"CharBot: A Simple and Effective Method for Evading DGA Classifiers","year":"2019","author":"Peck Jonathan","key":"e_1_3_2_2_37_1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3196160.3196245"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241115"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.131"},{"key":"e_1_3_2_2_41_1","unstructured":"Theo Ryffel Andrew Trask Morten Dahl Bobby Wagner Jason V. Mancuso Daniel Rueckert and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv:1811.04017. Theo Ryffel Andrew Trask Morten Dahl Bobby Wagner Jason V. Mancuso Daniel Rueckert and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. arXiv:1811.04017."},{"volume-title":"Ensemble learning: A survey","year":"2018","author":"Sagi Omer","key":"e_1_3_2_2_42_1"},{"key":"e_1_3_2_2_43_1","unstructured":"Joshua Saxe and Konstantin Berlin. 2017. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs File Paths and Registry Keys. arXiv:1702.08568. Joshua Saxe and Konstantin Berlin. 2017. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs File Paths and Registry Keys. arXiv:1702.08568."},{"volume-title":"Phoenix: DGA-Based Botnet Tracking and Intelligence. In Detection of Intrusions and Malware, and Vulnerability Assessment","year":"2014","author":"Schiavoni Stefano","key":"e_1_3_2_2_44_1"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277290"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Sheng Shen Tianqing Zhu Di Wu Wei Wang and Wanlei Zhou. 2020. From distributed machine learning to federated learning: In the view of data privacy and security. Concurrency and Computation: Practice and Experience. Sheng Shen Tianqing Zhu Di Wu Wei Wang and Wanlei Zhou. 2020. From distributed machine learning to federated learning: In the view of data privacy and security. Concurrency and Computation: Practice and Experience.","DOI":"10.1002\/cpe.6002"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-017-9666-7"},{"volume-title":"Security and Privacy","author":"Shokri Reza","key":"e_1_3_2_2_48_1"},{"key":"e_1_3_2_2_49_1","article-title":"Byzantine-Resilient Secure Federated Learning","author":"So Jinhyun","year":"2020","journal-title":"IEEE Journal on Selected Areas in Communications."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297467"},{"volume-title":"Ananda Theertha Suresh, and H Brendan McMahan","year":"2019","author":"Sun Ziteng","key":"e_1_3_2_2_52_1"},{"volume-title":"Mehmet Emre Gursoy, and Ling Liu","year":"2020","author":"Tolpegin Vale","key":"e_1_3_2_2_53_1"},{"volume-title":"Computer Communications","author":"Wang Zhibo","key":"e_1_3_2_2_54_1"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"e_1_3_2_2_56_1","unstructured":"Jonathan Woodbridge Hyrum S. Anderson Anjum Ahuja and Daniel Grant. 2016. Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. arXiv:1611.00791. Jonathan Woodbridge Hyrum S. Anderson Anjum Ahuja and Daniel Grant. 2016. Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. arXiv:1611.00791."},{"key":"e_1_3_2_2_57_1","unstructured":"Krishna Yadav and B. B. Gupta. 2021. Clustering Algorithm to Detect Adversaries in Federated Learning. arXiv:2102.10799. Krishna Yadav and B. B. Gupta. 2021. Clustering Algorithm to Detect Adversaries in Federated Learning. arXiv:2102.10799."},{"volume-title":"Security and Privacy in Communication Systems","author":"Yadav Sandeep","key":"e_1_3_2_2_58_1"},{"key":"e_1_3_2_2_59_1","unstructured":"Timothy Yang Galen Andrew Hubert Eichner Haicheng Sun Wei Li Nicholas Kong Daniel Ramage and Francc oise Beaufays. 2018. Applied federated learning: Improving google keyboard query suggestions. arXiv:1812.02903. Timothy Yang Galen Andrew Hubert Eichner Haicheng Sun Wei Li Nicholas Kong Daniel Ramage and Francc oise Beaufays. 2018. Applied federated learning: Improving google keyboard query suggestions. arXiv:1812.02903."},{"key":"e_1_3_2_2_60_1","unstructured":"Chencheng Ye and Ying Cui. 2021. Sample-based Federated Learning via Mini-batch SSCA. arXiv:2103.09506. Chencheng Ye and Ying Cui. 2021. Sample-based Federated Learning via Mini-batch SSCA. arXiv:2103.09506."},{"volume-title":"Character Level Based Detection of DGA Domain Names. In International Joint Conference on Neural Networks. IEEE.","year":"2018","author":"Yu Bin","key":"e_1_3_2_2_61_1"},{"key":"e_1_3_2_2_62_1","unstructured":"Qinqing Zheng Shuxiao Chen Qi Long and Weijie Su. 2021. Federated f-Differential Privacy. In Artificial Intelligence and Statistics. PMLR. Qinqing Zheng Shuxiao Chen Qi Long and Weijie Su. 2021. Federated f-Differential Privacy. In Artificial Intelligence and Statistics. PMLR."},{"key":"e_1_3_2_2_63_1","unstructured":"Junyi Zhu and Matthew Blaschko. 2021. R-GAP: Recursive Gradient Attack on Privacy. arXiv:2010.07733. Junyi Zhu and Matthew Blaschko. 2021. R-GAP: Recursive Gradient Attack on Privacy. arXiv:2010.07733."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455610"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 3rd Workshop on Cyber-Security Arms Race"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474374.3486915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474374.3486915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:49Z","timestamp":1750191529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474374.3486915"}},"subtitle":["A Study on Collaborative Machine Learning for DGA Detection"],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":65,"alternative-id":["10.1145\/3474374.3486915","10.1145\/3474374"],"URL":"https:\/\/doi.org\/10.1145\/3474374.3486915","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}