{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:08:11Z","timestamp":1764688091909,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the GuangDong Basic and Applied Basic Research Foundation","award":["2023A1515012895"],"award-info":[{"award-number":["2023A1515012895"]}]},{"name":"the National Natural Science Foundation of China","award":["62002398"],"award-info":[{"award-number":["62002398"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3651503","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"525-528","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Exploring Representational Similarity Analysis to Protect Federated Learning from Data Poisoning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6945-8844","authenticated-orcid":false,"given":"Gengxiang","family":"Chen","sequence":"first","affiliation":[{"name":"Sun Yat-Sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0517-2392","authenticated-orcid":false,"given":"Kai","family":"Li","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1374-1882","authenticated-orcid":false,"given":"Ahmed M.","family":"Abdelmoniem","sequence":"additional","affiliation":[{"name":"Queen Mary University of London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6287-8095","authenticated-orcid":false,"given":"Linlin","family":"You","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Rachid Guerraoui, and Julien Stainer.","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. Advances in neural information processing systems , Vol. 30 (2017)."},{"key":"e_1_3_2_2_2_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Fung Clement","year":"2020","unstructured":"Clement Fung, Chris JM Yoon, and Ivan Beschastnikh. 2020. The limitations of federated learning in sybil settings. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 301--316."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3057017"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6706807"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00081"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","unstructured":"Kai Li Xin Yuan Jingjing Zheng Wei Ni and Mohsen Guizani. 2023. Exploring Adversarial Graph Autoencoders to Manipulate Federated Learning in The Internet of Things. In 2023 International Wireless Communications and Mobile Computing (IWCMC). 898--903. https:\/\/doi.org\/10.1109\/IWCMC58020.2023.10183217","DOI":"10.1109\/IWCMC58020.2023.10183217"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11091393"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3108434"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"1282","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 54). PMLR, 1273--1282."},{"key":"e_1_3_2_2_11_1","volume-title":"Privacy-Preserving Federated Learning Against Label-Flipping Attacks on Non-IID Data","author":"Shen Xicong","year":"2023","unstructured":"Xicong Shen, Ying Liu, Fu Li, and Chunguang Li. 2023. Privacy-Preserving Federated Learning Against Label-Flipping Attacks on Non-IID Data. IEEE Internet of Things Journal (2023)."},{"key":"e_1_3_2_2_12_1","volume-title":"International Conference on Machine Learning. PMLR, 5650--5659","author":"Yin Dong","year":"2018","unstructured":"Dong Yin, Yudong Chen, Ramchandran Kannan, and Peter Bartlett. 2018. Byzantine-robust distributed learning: Towards optimal statistical rates. In International Conference on Machine Learning. PMLR, 5650--5659."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511982"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-emnlp.25"},{"key":"e_1_3_2_2_15_1","volume-title":"Garnett (Eds.)","volume":"32","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep Leakage from Gradients. In Advances in Neural Information Processing Systems, H. Wallach, H. Larochelle, A. Beygelzimer, F. dtextquotesingle Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.), Vol. 32. Curran Associates, Inc."}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3651503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:38:14Z","timestamp":1755823094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":15,"alternative-id":["10.1145\/3589335.3651503","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3651503","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}