{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:15Z","timestamp":1750219815855,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3606043.3606044","type":"proceedings-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T17:08:44Z","timestamp":1700154524000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cohort-based Federated Learning Credit Evaluation Method in the Metaverse"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5953-9091","authenticated-orcid":false,"given":"Hongjing","family":"Li","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Next Generation Internet Technology Research Center Institute of Network Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2388-2280","authenticated-orcid":false,"given":"Zan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Next Generation Internet Technology Research Center Institute of Network Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0207-2628","authenticated-orcid":false,"given":"Haochen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Next Generation Internet Technology Research Center Institute of Network Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1171-8282","authenticated-orcid":false,"given":"Ke","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Next Generation Internet Technology Research Center Institute of Network Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00086"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_3_1","volume-title":"Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard , El\u00a0 Mahdi\u00a0El Mhamdi , Rachid Guerraoui , and Julien Stainer . 2017 . Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017 , December 4-9, 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna\u00a0M. Wallach, Rob Fergus, S.\u00a0V.\u00a0N. Vishwanathan, and Roman Garnett (Eds.). 119\u2013129. https:\/\/proceedings.neurips.cc\/paper\/ 2017\/hash\/f4b9ec30ad9f68f89b29639786cb62ef-Abstract.html Peva Blanchard, El\u00a0Mahdi\u00a0El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna\u00a0M. Wallach, Rob Fergus, S.\u00a0V.\u00a0N. Vishwanathan, and Roman Garnett (Eds.). 119\u2013129. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/f4b9ec30ad9f68f89b29639786cb62ef-Abstract.html"},{"key":"e_1_3_2_1_4_1","volume-title":"Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. CoRR abs\/1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen , Chang Liu , Bo Li , Kimberly Lu , and Dawn Song . 2017. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. CoRR abs\/1712.05526 ( 2017 ). arXiv:1712.05526http:\/\/arxiv.org\/abs\/1712.05526 Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. CoRR abs\/1712.05526 (2017). arXiv:1712.05526http:\/\/arxiv.org\/abs\/1712.05526"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.04.021"},{"key":"e_1_3_2_1_6_1","volume-title":"Industrial Federated Learning - Requirements and System Design. CoRR abs\/2005.06850","author":"Hiessl Thomas","year":"2020","unstructured":"Thomas Hiessl , Daniel Schall , Jana Kemnitz , and Stefan Schulte . 2020. Industrial Federated Learning - Requirements and System Design. CoRR abs\/2005.06850 ( 2020 ). arXiv:2005.06850https:\/\/arxiv.org\/abs\/2005.06850 Thomas Hiessl, Daniel Schall, Jana Kemnitz, and Stefan Schulte. 2020. Industrial Federated Learning - Requirements and System Design. CoRR abs\/2005.06850 (2020). arXiv:2005.06850https:\/\/arxiv.org\/abs\/2005.06850"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"e_1_3_2_1_8_1","volume-title":"Trojaning Attack on Neural Networks. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Liu Yingqi","year":"2018","unstructured":"Yingqi Liu , Shiqing Ma , Yousra Aafer , Wen-Chuan Lee , Juan Zhai , Weihang Wang , and Xiangyu Zhang . 2018 . Trojaning Attack on Neural Networks. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA , February 18-21, 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_03A-5_Liu_paper.pdf Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_03A-5_Liu_paper.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/657"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , and Blaise\u00a0Ag\u00fcera y Arcas . 2017 . Communication-Efficient Learning of Deep Networks from Decentralized Data . In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017 , 20-22 April 2017, Fort Lauderdale, FL, USA(Proceedings of Machine Learning Research, Vol.\u00a054), Aarti Singh and Xiaojin\u00a0(Jerry) Zhu (Eds.). PMLR, 1273\u20131282. http:\/\/proceedings.mlr.press\/v54\/mcmahan17a.html Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise\u00a0Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20-22 April 2017, Fort Lauderdale, FL, USA(Proceedings of Machine Learning Research, Vol.\u00a054), Aarti Singh and Xiaojin\u00a0(Jerry) Zhu (Eds.). PMLR, 1273\u20131282. http:\/\/proceedings.mlr.press\/v54\/mcmahan17a.html"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3015958"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3095506"},{"key":"e_1_3_2_1_13_1","volume-title":"Can You Really Backdoor Federated Learning?CoRR abs\/1911.07963","author":"Sun Ziteng","year":"2019","unstructured":"Ziteng Sun , Peter Kairouz , Ananda\u00a0Theertha Suresh , and H.\u00a0 Brendan McMahan . 2019. Can You Really Backdoor Federated Learning?CoRR abs\/1911.07963 ( 2019 ). arXiv:1911.07963http:\/\/arxiv.org\/abs\/1911.07963 Ziteng Sun, Peter Kairouz, Ananda\u00a0Theertha Suresh, and H.\u00a0Brendan McMahan. 2019. Can You Really Backdoor Federated Learning?CoRR abs\/1911.07963 (2019). arXiv:1911.07963http:\/\/arxiv.org\/abs\/1911.07963"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.03.008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2203.02662"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Yin Dong","year":"2018","unstructured":"Dong Yin , Yudong Chen , Kannan Ramchandran , and Peter\u00a0 L. Bartlett . 2018 . Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan , Stockholm, Sweden , July 10-15, 2018(Proceedings of Machine Learning Research, Vol.\u00a080), Jennifer\u00a0G. Dy and Andreas Krause (Eds.). PMLR, 5636\u20135645. http:\/\/proceedings.mlr.press\/v80\/yin18a.html Dong Yin, Yudong Chen, Kannan Ramchandran, and Peter\u00a0L. Bartlett. 2018. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10-15, 2018(Proceedings of Machine Learning Research, Vol.\u00a080), Jennifer\u00a0G. Dy and Andreas Krause (Eds.). PMLR, 5636\u20135645. http:\/\/proceedings.mlr.press\/v80\/yin18a.html"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Yin Dong","year":"2018","unstructured":"Dong Yin , Yudong Chen , Kannan Ramchandran , and Peter\u00a0 L. Bartlett . 2018 . Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan , Stockholm, Sweden , July 10-15, 2018(Proceedings of Machine Learning Research, Vol.\u00a080), Jennifer\u00a0G. Dy and Andreas Krause (Eds.). PMLR, 5636\u20135645. http:\/\/proceedings.mlr.press\/v80\/yin18a.html Dong Yin, Yudong Chen, Kannan Ramchandran, and Peter\u00a0L. Bartlett. 2018. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10-15, 2018(Proceedings of Machine Learning Research, Vol.\u00a080), Jennifer\u00a0G. Dy and Andreas Krause (Eds.). PMLR, 5636\u20135645. http:\/\/proceedings.mlr.press\/v80\/yin18a.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488776"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3093711"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900367"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3215574"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685154"}],"event":{"name":"HP3C 2023: 2023 7th International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C 2023","location":"Jinan China"},"container-title":["Proceedings of the 2023 7th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606043.3606044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3606043.3606044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:07Z","timestamp":1750178767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3606043.3606044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":23,"alternative-id":["10.1145\/3606043.3606044","10.1145\/3606043"],"URL":"https:\/\/doi.org\/10.1145\/3606043.3606044","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}