{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:27:40Z","timestamp":1775744860670,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2112562"],"award-info":[{"award-number":["2112562"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["2125977"],"award-info":[{"award-number":["2125977"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539231","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:41Z","timestamp":1660331201000},"page":"2545-2555","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":277,"title":["FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients"],"prefix":"10.1145","author":[{"given":"Zaixi","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}]},{"given":"Xiaoyu","family":"Cao","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Jinyuan","family":"Jia","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2020. How to backdoor federated learning. In AISTATS ."},{"key":"e_1_3_2_1_2_1","unstructured":"Gilad Baruch Moran Baruch and Yoav Goldberg. 2019. A Little Is Enough: Circumventing Defenses For Distributed Learning. In NeurIPS ."},{"key":"e_1_3_2_1_3_1","unstructured":"Arjun Nitin Bhagoji Supriyo Chakraborty Prateek Mittal and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In ICML ."},{"key":"e_1_3_2_1_4_1","volume-title":"Rachid Guerraoui, and Julien Stainer.","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In NeurIPS ."},{"key":"e_1_3_2_1_5_1","volume-title":"Representations of quasi-Newton matrices and their use in limited memory methods. Mathematical Programming","author":"Byrd Richard H","year":"1994","unstructured":"Richard H Byrd, Jorge Nocedal, and Robert B Schnabel. 1994. Representations of quasi-Newton matrices and their use in limited memory methods. Mathematical Programming (1994)."},{"key":"e_1_3_2_1_6_1","volume-title":"Peter Wu, Tian Li, Jakub Konevc n\u1ef3, H Brendan McMahan, Virginia Smith, and Ameet Talwalkar.","author":"Caldas Sebastian","year":"2018","unstructured":"Sebastian Caldas, Sai Meher Karthik Duddu, Peter Wu, Tian Li, Jakub Konevc n\u1ef3, H Brendan McMahan, Virginia Smith, and Ameet Talwalkar. 2018. Leaf: A benchmark for federated settings. arXiv preprint arXiv:1812.01097 (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"Xiaoyu Cao Minghong Fang Jia Liu and Neil Zhenqiang Gong. 2021 a. FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. In NDSS ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00383"},{"key":"e_1_3_2_1_9_1","unstructured":"Xiaoyu Cao Jinyuan Jia and Neil Zhenqiang Gong. 2021 b. Provably Secure Federated Learning against Malicious Clients. In AAAI ."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Yudong Chen Lili Su and Jiaming Xu. 2017. Distributed statistical machine learning in adversarial settings: Byzantine gradient descent. In SIGMETRICS .","DOI":"10.1145\/3219617.3219655"},{"key":"e_1_3_2_1_11_1","unstructured":"Minghong Fang Xiaoyu Cao Jinyuan Jia and Neil Gong. 2020. Local model poisoning attacks to Byzantine-robust federated learning. In USENIX Security ."},{"key":"e_1_3_2_1_12_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR ."},{"key":"e_1_3_2_1_13_1","unstructured":"A. Krizhevsky and G. Hinton. 2009. Learning multiple layers of features from tiny images."},{"key":"e_1_3_2_1_14_1","volume-title":"A second course in calculus","author":"Lang Serge","unstructured":"Serge Lang. 1968. A second course in calculus . Vol. 4197. Addison-Wesley Publishing Company."},{"key":"e_1_3_2_1_15_1","unstructured":"Y. LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun. com\/exdb\/mnist\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Learning to detect malicious clients for robust federated learning. arXiv preprint arXiv:2002.00211","author":"Li Suyi","year":"2020","unstructured":"Suyi Li, Yong Cheng, Wei Wang, Yang Liu, and Tianjian Chen. 2020. Learning to detect malicious clients for robust federated learning. arXiv preprint arXiv:2002.00211 (2020)."},{"key":"e_1_3_2_1_17_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In AISTATS ."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Virat Shejwalkar and Amir Houmansadr. 2021. Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. In NDSS .","DOI":"10.14722\/ndss.2021.24498"},{"key":"e_1_3_2_1_19_1","volume-title":"Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B (Statistical Methodology)","author":"Tibshirani Robert","year":"2001","unstructured":"Robert Tibshirani, Guenther Walther, and Trevor Hastie. 2001. Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B (Statistical Methodology) (2001)."},{"key":"e_1_3_2_1_20_1","volume-title":"Dba: Distributed backdoor attacks against federated learning. In ICLR .","author":"Xie Chulin","year":"2019","unstructured":"Chulin Xie, Keli Huang, Pin-Yu Chen, and Bo Li. 2019. Dba: Distributed backdoor attacks against federated learning. In ICLR ."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_2_1_22_1","unstructured":"Dong Yin Yudong Chen Ramchandran Kannan and Peter Bartlett. 2018. Byzantine-robust distributed learning: Towards optimal statistical rates. In ICML ."}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539231","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:58Z","timestamp":1750186798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":22,"alternative-id":["10.1145\/3534678.3539231","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539231","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}