{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:14:30Z","timestamp":1772907270962,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3567991","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"632-646","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["AFLGuard: Byzantine-robust Asynchronous Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1365-3911","authenticated-orcid":false,"given":"Minghong","family":"Fang","sequence":"first","affiliation":[{"name":"The Ohio State University, United States of America and Duke University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8844-3233","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"additional","affiliation":[{"name":"The Ohio State University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9900-9309","authenticated-orcid":false,"given":"Neil Zhenqiang","family":"Gong","sequence":"additional","affiliation":[{"name":"Duke University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0972-9933","authenticated-orcid":false,"given":"Elizabeth S.","family":"Bentley","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Federated Learning: Collaborative Machine Learning without Centralized Training Data. https:\/\/ai.googleblog.com\/2017\/04\/federated-learning-collaborative.html  [n.d.]. Federated Learning: Collaborative Machine Learning without Centralized Training Data. https:\/\/ai.googleblog.com\/2017\/04\/federated-learning-collaborative.html"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Making federated learning faster and more scalable: A new asynchronous method. https:\/\/ai.facebook.com\/blog\/asynchronous-federated-learning\/  [n.d.]. Making federated learning faster and more scalable: A new asynchronous method. https:\/\/ai.facebook.com\/blog\/asynchronous-federated-learning\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467(2016).","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Ashish Agarwal , Paul Barham , Eugene Brevdo , Zhifeng Chen , Craig Citro , Greg\u00a0 S Corrado , Andy Davis , Jeffrey Dean , Matthieu Devin , 2016 . Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467(2016). Mart\u00edn Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg\u00a0S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467(2016)."},{"key":"e_1_3_2_1_4_1","unstructured":"Davide Anguita Alessandro Ghio Luca Oneto Xavier Parra\u00a0Perez and Jorge\u00a0Luis Reyes\u00a0Ortiz. 2013. A public domain dataset for human activity recognition using smartphones. In ESANN.  Davide Anguita Alessandro Ghio Luca Oneto Xavier Parra\u00a0Perez and Jorge\u00a0Luis Reyes\u00a0Ortiz. 2013. A public domain dataset for human activity recognition using smartphones. In ESANN."},{"key":"e_1_3_2_1_5_1","unstructured":"Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2020. How to backdoor federated learning. In AISTATS.  Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2020. How to backdoor federated learning. In AISTATS."},{"key":"e_1_3_2_1_6_1","unstructured":"Arjun\u00a0Nitin Bhagoji Supriyo Chakraborty Prateek Mittal and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In ICML.  Arjun\u00a0Nitin Bhagoji Supriyo Chakraborty Prateek Mittal and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In ICML."},{"key":"e_1_3_2_1_7_1","unstructured":"Peva Blanchard El\u00a0Mahdi El\u00a0Mhamdi Rachid Guerraoui and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In NeurIPS.  Peva Blanchard El\u00a0Mahdi El\u00a0Mhamdi Rachid Guerraoui and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In NeurIPS."},{"key":"e_1_3_2_1_8_1","unstructured":"S\u00e9bastien Bubeck. 2014. Convex optimization: Algorithms and complexity. arXiv preprint arXiv:1405.4980(2014).  S\u00e9bastien Bubeck. 2014. Convex optimization: Algorithms and complexity. arXiv preprint arXiv:1405.4980(2014)."},{"key":"e_1_3_2_1_9_1","unstructured":"Xiaoyu Cao Minghong Fang Jia Liu and Neil\u00a0Zhenqiang Gong. 2021. FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. In NDSS.  Xiaoyu Cao Minghong Fang Jia Liu and Neil\u00a0Zhenqiang Gong. 2021. FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. In NDSS."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00383"},{"key":"e_1_3_2_1_11_1","unstructured":"Xiaoyu Cao Jinyuan Jia and Neil\u00a0Zhenqiang Gong. 2021. Provably Secure Federated Learning against Malicious Clients. In AAAI.  Xiaoyu Cao Jinyuan Jia and Neil\u00a0Zhenqiang Gong. 2021. Provably Secure Federated Learning against Malicious Clients. In AAAI."},{"key":"e_1_3_2_1_12_1","volume-title":"Distributed gradient descent algorithm robust to an arbitrary number of byzantine attackers","author":"Cao Xinyang","unstructured":"Xinyang Cao and Lifeng Lai . 2019. Distributed gradient descent algorithm robust to an arbitrary number of byzantine attackers . In IEEE Transactions on Signal Processing . Xinyang Cao and Lifeng Lai. 2019. Distributed gradient descent algorithm robust to an arbitrary number of byzantine attackers. In IEEE Transactions on Signal Processing."},{"key":"e_1_3_2_1_13_1","unstructured":"Tianyi Chen Xiao Jin Yuejiao Sun and Wotao Yin. 2020. Vafl: a method of vertical asynchronous federated learning. arXiv preprint arXiv:2007.06081(2020).  Tianyi Chen Xiao Jin Yuejiao Sun and Wotao Yin. 2020. Vafl: a method of vertical asynchronous federated learning. arXiv preprint arXiv:2007.06081(2020)."},{"key":"e_1_3_2_1_14_1","unstructured":"Xinyun Chen Chang Liu Bo Li Kimberly Lu and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526(2017).  Xinyun Chen Chang Liu Bo Li Kimberly Lu and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526(2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Yujing Chen Yue Ning Martin Slawski and Huzefa Rangwala. 2020. Asynchronous online federated learning for edge devices with non-iid data. In Big Data.  Yujing Chen Yue Ning Martin Slawski and Huzefa Rangwala. 2020. Asynchronous online federated learning for edge devices with non-iid data. In Big Data.","DOI":"10.1109\/BigData50022.2020.9378161"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Yudong Chen Lili Su and Jiaming Xu. 2017. Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent. In POMACS.  Yudong Chen Lili Su and Jiaming Xu. 2017. Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent. In POMACS.","DOI":"10.1145\/3219617.3219655"},{"key":"e_1_3_2_1_17_1","unstructured":"Georgios Damaskinos Rachid Guerraoui Rhicheek Patra Mahsa Taziki 2018. Asynchronous Byzantine machine learning (the case of SGD). In ICML.  Georgios Damaskinos Rachid Guerraoui Rhicheek Patra Mahsa Taziki 2018. Asynchronous Byzantine machine learning (the case of SGD). In ICML."},{"key":"e_1_3_2_1_18_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20). 1605\u20131622.","author":"Fang Minghong","unstructured":"Minghong Fang , Xiaoyu Cao , Jinyuan Jia , and Neil Gong . 2020. Local model poisoning attacks to Byzantine-robust federated learning . In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1605\u20131622. Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Gong. 2020. Local model poisoning attacks to Byzantine-robust federated learning. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 1605\u20131622."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380072"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450066"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Minghong Fang Guolei Yang Neil\u00a0Zhenqiang Gong and Jia Liu. 2018. Poisoning attacks to graph-based recommender systems. In ACSAC.  Minghong Fang Guolei Yang Neil\u00a0Zhenqiang Gong and Jia Liu. 2018. Poisoning attacks to graph-based recommender systems. In ACSAC.","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_22_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Fung Clement","year":"2020","unstructured":"Clement Fung , Chris\u00a0 JM Yoon , and Ivan Beschastnikh . 2020 . The limitations of federated learning in sybil settings . In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 301\u2013316. Clement Fung, Chris\u00a0JM Yoon, and Ivan Beschastnikh. 2020. The limitations of federated learning in sybil settings. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 301\u2013316."},{"key":"e_1_3_2_1_23_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733(2017).","author":"Gu Tianyu","year":"2017","unstructured":"Tianyu Gu , Brendan Dolan-Gavitt , and Siddharth Garg . 2017 . Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733(2017). Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733(2017)."},{"key":"e_1_3_2_1_24_1","unstructured":"Nirupam Gupta and Nitin\u00a0H Vaidya. 2019. Byzantine fault tolerant distributed linear regression. arXiv preprint arXiv:1903.08752(2019).  Nirupam Gupta and Nitin\u00a0H Vaidya. 2019. Byzantine fault tolerant distributed linear regression. arXiv preprint arXiv:1903.08752(2019)."},{"key":"e_1_3_2_1_25_1","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR.  Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR."},{"key":"e_1_3_2_1_26_1","first-page":"814","article-title":"Papaya: Practical, private, and scalable federated learning","volume":"4","author":"Huba Dzmitry","year":"2022","unstructured":"Dzmitry Huba , John Nguyen , Kshitiz Malik , Ruiyu Zhu , Mike Rabbat , Ashkan Yousefpour , Carole-Jean Wu , Hongyuan Zhan , Pavel Ustinov , Harish Srinivas , 2022 . Papaya: Practical, private, and scalable federated learning . Proceedings of Machine Learning and Systems 4 (2022), 814 \u2013 832 . Dzmitry Huba, John Nguyen, Kshitiz Malik, Ruiyu Zhu, Mike Rabbat, Ashkan Yousefpour, Carole-Jean Wu, Hongyuan Zhan, Pavel Ustinov, Harish Srinivas, 2022. Papaya: Practical, private, and scalable federated learning. Proceedings of Machine Learning and Systems 4 (2022), 814\u2013832.","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"e_1_3_2_1_27_1","unstructured":"Peter Kairouz H\u00a0Brendan McMahan Brendan Avent Aur\u00e9lien Bellet Mehdi Bennis Arjun\u00a0Nitin Bhagoji Kallista Bonawitz Zachary Charles Graham Cormode Rachel Cummings 2019. Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977(2019).  Peter Kairouz H\u00a0Brendan McMahan Brendan Avent Aur\u00e9lien Bellet Mehdi Bennis Arjun\u00a0Nitin Bhagoji Kallista Bonawitz Zachary Charles Graham Cormode Rachel Cummings 2019. Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977(2019)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Jakob\u00a0Nikolas Kather Cleo-Aron Weis Francesco Bianconi Susanne\u00a0M Melchers Lothar\u00a0R Schad Timo Gaiser Alexander Marx and Frank\u00a0Gerrit Z\u00f6llner. 2016. Multi-class texture analysis in colorectal cancer histology. Scientific reports 6(2016) 27988.  Jakob\u00a0Nikolas Kather Cleo-Aron Weis Francesco Bianconi Susanne\u00a0M Melchers Lothar\u00a0R Schad Timo Gaiser Alexander Marx and Frank\u00a0Gerrit Z\u00f6llner. 2016. Multi-class texture analysis in colorectal cancer histology. Scientific reports 6(2016) 27988.","DOI":"10.1038\/srep27988"},{"key":"e_1_3_2_1_29_1","unstructured":"Alex Krizhevsky Geoffrey Hinton 2009. Learning multiple layers of features from tiny images. (2009).  Alex Krizhevsky Geoffrey Hinton 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_30_1","volume-title":"MNIST handwritten digit database. Available: http:\/\/yann. lecun. com\/exdb\/mnist","author":"LeCun Yann","year":"1998","unstructured":"Yann LeCun , Corinna Cortes , and CJ Burges . 1998. MNIST handwritten digit database. Available: http:\/\/yann. lecun. com\/exdb\/mnist ( 1998 ). Yann LeCun, Corinna Cortes, and CJ Burges. 1998. MNIST handwritten digit database. Available: http:\/\/yann. lecun. com\/exdb\/mnist (1998)."},{"key":"e_1_3_2_1_31_1","unstructured":"Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In NeurIPS.  Bo Li Yining Wang Aarti Singh and Yevgeniy Vorobeychik. 2016. Data poisoning attacks on factorization-based collaborative filtering. In NeurIPS."},{"key":"e_1_3_2_1_32_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In AISTATS.  Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise\u00a0Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In AISTATS."},{"key":"e_1_3_2_1_33_1","unstructured":"El\u00a0Mahdi\u00a0El Mhamdi Rachid Guerraoui and S\u00e9bastien Rouault. 2018. The hidden vulnerability of distributed learning in byzantium. In ICML.  El\u00a0Mahdi\u00a0El Mhamdi Rachid Guerraoui and S\u00e9bastien Rouault. 2018. The hidden vulnerability of distributed learning in byzantium. In ICML."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186032"},{"key":"e_1_3_2_1_35_1","unstructured":"Luis Mu\u00f1oz-Gonz\u00e1lez Kenneth\u00a0T Co and Emil\u00a0C Lupu. 2019. Byzantine-robust federated machine learning through adaptive model averaging. arXiv preprint arXiv:1909.05125(2019).  Luis Mu\u00f1oz-Gonz\u00e1lez Kenneth\u00a0T Co and Emil\u00a0C Lupu. 2019. Byzantine-robust federated machine learning through adaptive model averaging. arXiv preprint arXiv:1909.05125(2019)."},{"key":"e_1_3_2_1_36_1","unstructured":"John Nguyen Kshitiz Malik Hongyuan Zhan Ashkan Yousefpour Mike Rabbat Mani Malek and Dzmitry Huba. 2022. Federated learning with buffered asynchronous aggregation. In AISTATS.  John Nguyen Kshitiz Malik Hongyuan Zhan Ashkan Yousefpour Mike Rabbat Mani Malek and Dzmitry Huba. 2022. Federated learning with buffered asynchronous aggregation. In AISTATS."},{"key":"e_1_3_2_1_37_1","volume-title":"FLAME: Taming Backdoors in Federated Learning. In USENIX Security Symposium.","author":"Nguyen Thien\u00a0Duc","year":"2022","unstructured":"Thien\u00a0Duc Nguyen , Phillip Rieger , Huili Chen , Hossein Yalame , Helen M\u00f6llering , Hossein Fereidooni , Samuel Marchal , Markus Miettinen , Azalia Mirhoseini , Shaza Zeitouni , 2022 . FLAME: Taming Backdoors in Federated Learning. In USENIX Security Symposium. Thien\u00a0Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen M\u00f6llering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, 2022. FLAME: Taming Backdoors in Federated Learning. In USENIX Security Symposium."},{"key":"e_1_3_2_1_38_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. In NeurIPS.","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , 2019 . Pytorch: An imperative style, high-performance deep learning library. In NeurIPS. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, 2019. Pytorch: An imperative style, high-performance deep learning library. In NeurIPS."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Benjamin\u00a0IP Rubinstein Blaine Nelson Ling Huang Anthony\u00a0D Joseph Shing-hon Lau Satish Rao Nina Taft and J\u00a0Doug Tygar. 2009. Antidote: understanding and defending against poisoning of anomaly detectors. In IMC.  Benjamin\u00a0IP Rubinstein Blaine Nelson Ling Huang Anthony\u00a0D Joseph Shing-hon Lau Satish Rao Nina Taft and J\u00a0Doug Tygar. 2009. Antidote: understanding and defending against poisoning of anomaly detectors. In IMC.","DOI":"10.1145\/1644893.1644895"},{"key":"e_1_3_2_1_40_1","unstructured":"Ali Shafahi W\u00a0Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In NeurIPS.  Ali Shafahi W\u00a0Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In NeurIPS."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Virat Shejwalkar and Amir Houmansadr. 2021. Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. In NDSS.  Virat Shejwalkar and Amir Houmansadr. 2021. Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. In NDSS.","DOI":"10.14722\/ndss.2021.24498"},{"key":"e_1_3_2_1_42_1","unstructured":"Lili Su and Jiaming Xu. 2019. Securing distributed gradient descent in high dimensional statistical learning. In POMACS.  Lili Su and Jiaming Xu. 2019. Securing distributed gradient descent in high dimensional statistical learning. In POMACS."},{"key":"e_1_3_2_1_43_1","unstructured":"Ziteng Sun Peter Kairouz Ananda\u00a0Theertha Suresh and H\u00a0Brendan McMahan. 2019. Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963(2019).  Ziteng Sun Peter Kairouz Ananda\u00a0Theertha Suresh and H\u00a0Brendan McMahan. 2019. Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963(2019)."},{"key":"e_1_3_2_1_44_1","unstructured":"Rashish Tandon Qi Lei Alexandros\u00a0G Dimakis and Nikos Karampatziakis. 2017. Gradient coding: Avoiding stragglers in distributed learning. In ICML.  Rashish Tandon Qi Lei Alexandros\u00a0G Dimakis and Nikos Karampatziakis. 2017. Gradient coding: Avoiding stragglers in distributed learning. In ICML."},{"key":"e_1_3_2_1_45_1","unstructured":"Berkay Turan Cesar\u00a0A Uribe Hoi-To Wai and Mahnoosh Alizadeh. 2021. Robust Distributed Optimization With Randomly Corrupted Gradients. arXiv preprint arXiv:2106.14956(2021).  Berkay Turan Cesar\u00a0A Uribe Hoi-To Wai and Mahnoosh Alizadeh. 2021. Robust Distributed Optimization With Randomly Corrupted Gradients. arXiv preprint arXiv:2106.14956(2021)."},{"key":"e_1_3_2_1_46_1","unstructured":"Marten van Dijk Nhuong\u00a0V Nguyen Toan\u00a0N Nguyen Lam\u00a0M Nguyen Quoc Tran-Dinh and Phuong\u00a0Ha Nguyen. 2020. Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise. arXiv preprint arXiv:2007.09208(2020).  Marten van Dijk Nhuong\u00a0V Nguyen Toan\u00a0N Nguyen Lam\u00a0M Nguyen Quoc Tran-Dinh and Phuong\u00a0Ha Nguyen. 2020. Asynchronous Federated Learning with Reduced Number of Rounds and with Differential Privacy from Less Aggregated Gaussian Noise. arXiv preprint arXiv:2007.09208(2020)."},{"key":"e_1_3_2_1_47_1","unstructured":"Roman Vershynin. 2010. Introduction to the non-asymptotic analysis of random matrices. arXiv preprint arXiv:1011.3027(2010).  Roman Vershynin. 2010. Introduction to the non-asymptotic analysis of random matrices. arXiv preprint arXiv:1011.3027(2010)."},{"key":"e_1_3_2_1_48_1","volume-title":"Vol.\u00a048","author":"Wainwright J","unstructured":"Martin\u00a0 J Wainwright . 2019. High-dimensional statistics: A non-asymptotic viewpoint , Vol.\u00a048 . Cambridge University Press . Martin\u00a0J Wainwright. 2019. High-dimensional statistics: A non-asymptotic viewpoint, Vol.\u00a048. Cambridge University Press."},{"key":"e_1_3_2_1_49_1","unstructured":"Hongyi Wang Kartik Sreenivasan Shashank Rajput Harit Vishwakarma Saurabh Agarwal Jy-yong Sohn Kangwook Lee and Dimitris Papailiopoulos. 2020. Attack of the tails: Yes you really can backdoor federated learning. In NeurIPS.  Hongyi Wang Kartik Sreenivasan Shashank Rajput Harit Vishwakarma Saurabh Agarwal Jy-yong Sohn Kangwook Lee and Dimitris Papailiopoulos. 2020. Attack of the tails: Yes you really can backdoor federated learning. In NeurIPS."},{"key":"e_1_3_2_1_50_1","unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv:cs.LG\/cs.LG\/1708.07747  Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv:cs.LG\/cs.LG\/1708.07747"},{"key":"e_1_3_2_1_51_1","volume-title":"Dba: Distributed backdoor attacks against federated learning. In ICLR.","author":"Xie Chulin","year":"2019","unstructured":"Chulin Xie , Keli Huang , Pin-Yu Chen , and Bo Li . 2019 . Dba: Distributed backdoor attacks against federated learning. In ICLR. Chulin Xie, Keli Huang, Pin-Yu Chen, and Bo Li. 2019. Dba: Distributed backdoor attacks against federated learning. In ICLR."},{"key":"e_1_3_2_1_52_1","unstructured":"Cong Xie Sanmi Koyejo and Indranil Gupta. 2019. Asynchronous federated optimization. arXiv preprint arXiv:1903.03934(2019).  Cong Xie Sanmi Koyejo and Indranil Gupta. 2019. Asynchronous federated optimization. arXiv preprint arXiv:1903.03934(2019)."},{"key":"e_1_3_2_1_53_1","unstructured":"Cong Xie Sanmi Koyejo and Indranil Gupta. 2020. Zeno++: Robust fully asynchronous SGD. In ICML.  Cong Xie Sanmi Koyejo and Indranil Gupta. 2020. Zeno++: Robust fully asynchronous SGD. In ICML."},{"key":"e_1_3_2_1_54_1","unstructured":"Chenhao Xu Youyang Qu Yong Xiang and Longxiang Gao. 2021. Asynchronous federated learning on heterogeneous devices: A survey. arXiv preprint arXiv:2109.04269(2021).  Chenhao Xu Youyang Qu Yong Xiang and Longxiang Gao. 2021. Asynchronous federated learning on heterogeneous devices: A survey. arXiv preprint arXiv:2109.04269(2021)."},{"key":"e_1_3_2_1_55_1","volume-title":"BASGD: Buffered Asynchronous SGD for Byzantine Learning. In ICML.","author":"Yang Yi-Rui","year":"2021","unstructured":"Yi-Rui Yang and Wu-Jun Li . 2021 . BASGD: Buffered Asynchronous SGD for Byzantine Learning. In ICML. Yi-Rui Yang and Wu-Jun Li. 2021. BASGD: Buffered Asynchronous SGD for Byzantine Learning. In ICML."},{"key":"e_1_3_2_1_56_1","unstructured":"Dong Yin Yudong Chen Ramchandran Kannan and Peter Bartlett. 2018. Byzantine-robust distributed learning: Towards optimal statistical rates. In ICML.  Dong Yin Yudong Chen Ramchandran Kannan and Peter Bartlett. 2018. Byzantine-robust distributed learning: Towards optimal statistical rates. In ICML."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Zaixi Zhang Xiaoyu Cao Jinayuan Jia and Neil Zhenqiang\u00a0Gong. 2022. FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients. In KDD.  Zaixi Zhang Xiaoyu Cao Jinayuan Jia and Neil Zhenqiang\u00a0Gong. 2022. FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients. In KDD.","DOI":"10.1145\/3534678.3539231"},{"key":"e_1_3_2_1_58_1","unstructured":"Shuxin Zheng Qi Meng Taifeng Wang Wei Chen Nenghai Yu Zhi-Ming Ma and Tie-Yan Liu. 2017. Asynchronous stochastic gradient descent with delay compensation. In ICML.  Shuxin Zheng Qi Meng Taifeng Wang Wei Chen Nenghai Yu Zhi-Ming Ma and Tie-Yan Liu. 2017. Asynchronous stochastic gradient descent with delay compensation. In ICML."}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3567991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:12Z","timestamp":1750183752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3567991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":58,"alternative-id":["10.1145\/3564625.3567991","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3567991","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}