{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T09:11:05Z","timestamp":1768900265638,"version":"3.49.0"},"reference-count":43,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":323,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20242BAB25066"],"award-info":[{"award-number":["20242BAB25066"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962022"],"award-info":[{"award-number":["61962022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62062034"],"award-info":[{"award-number":["62062034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172160"],"award-info":[{"award-number":["62172160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Federated learning (FL) is a machine learning technique in which a large number of clients collaborate to train models without sharing private data. However, FL\u2019s integrity is vulnerable to unreliable models; for instance, data poisoning attacks can compromise the system. In addition, system preferences and resource disparities preclude fair participation by reliable clients. To address this challenge, we propose a novel client selection strategy that introduces a security\u2010fairness value to measure client performance in FL. The value in question is a composite metric that combines a security score and a fairness score. The former is dynamically calculated from a beta distribution reflecting past performance, while the latter considers the client\u2019s participation frequency in the aggregation process. The weighting strategy based on the deep deterministic policy gradient (DDPG) determines these scores. Experimental results confirm that our method fairly effectively selects reliable clients and maintains the security and fairness of the FL system.<\/jats:p>","DOI":"10.1155\/2024\/2314019","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T12:19:46Z","timestamp":1732018786000},"source":"Crossref","is-referenced-by-count":2,"title":["A Secure and Fair Client Selection Based on DDPG for Federated Learning"],"prefix":"10.1155","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9507-8868","authenticated-orcid":false,"given":"Tao","family":"Wan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5722-956X","authenticated-orcid":false,"given":"Shun","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5920-8197","authenticated-orcid":false,"given":"Weichuan","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1712-1872","authenticated-orcid":false,"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8064-8055","authenticated-orcid":false,"given":"Jie","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2024,11,19]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106157"},{"key":"e_1_2_11_2_2","first-page":"1273","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","author":"McMahan B.","year":"2017"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103270"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120295"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3191332"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2023.3278838"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110178"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.004.2200645"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3295949"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3183614"},{"key":"e_1_2_11_11_2","volume-title":"Proceedings of the 50th International Conference on Parallel Processing","author":"Gao L.","year":"2021"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/6692995"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2022.3211998"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12232"},{"key":"e_1_2_11_15_2","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton R. S.","year":"2018"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103090"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2023.3288591"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3317063"},{"key":"e_1_2_11_19_2","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR)","author":"Lillicrap T. P.","year":"2016"},{"key":"e_1_2_11_20_2","first-page":"1","volume-title":"IEEE INFOCOM 2023-IEEE Conference on Computer Communications","author":"Jiang Z.","year":"2023"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.02.001"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100657"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3400389"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2023.03.003"},{"key":"e_1_2_11_25_2","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/SECON58729.2023.10287430","volume-title":"2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","author":"Chen B.","year":"2023"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3156645"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2022.3157725"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2022.3185327"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3354736"},{"key":"e_1_2_11_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3310094"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.124"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3189170"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.117.2200065"},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3167663"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3175918"},{"key":"e_1_2_11_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.12.102"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2022.3187365"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmi.2023.3234450"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103336"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.031"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3144450"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3298935"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3079104"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2024\/2314019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T12:19:54Z","timestamp":1732018794000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2024\/2314019"}},"subtitle":[],"editor":[{"given":"Yu-an","family":"Tan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1155\/2024\/2314019"],"URL":"https:\/\/doi.org\/10.1155\/2024\/2314019","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"article-number":"2314019"}}