{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T11:14:04Z","timestamp":1756898044394,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T00:00:00Z","timestamp":1706486400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-22-PESN-0006"],"award-info":[{"award-number":["ANR-22-PESN-0006"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,29]]},"DOI":"10.23919\/wons60642.2024.10449550","type":"proceedings-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T19:00:22Z","timestamp":1709578822000},"page":"49-56","source":"Crossref","is-referenced-by-count":1,"title":["FedCAM - Identifying Malicious Models in Federated Learning Environments Conditionally to Their Activation Maps"],"prefix":"10.23919","author":[{"given":"Reda","family":"Bellafqira","sequence":"first","affiliation":[{"name":"IMT Atlantique, INSERM UMR 1101 Latim,Brest,France"}]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[{"name":"IMT Atlantique, INSERM UMR 1101 Latim,Brest,France"}]},{"given":"Mohammed","family":"Lansari","sequence":"additional","affiliation":[{"name":"IMT Atlantique, INSERM UMR 1101 Latim,Brest,France"}]},{"given":"Jilo","family":"Chala","sequence":"additional","affiliation":[{"name":"IMT Atlantique, INSERM UMR 1101 Latim,Brest,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100595"},{"key":"ref2","first-page":"100","article-title":"Fedlab: A flexible federated learning framework","volume":"24","author":"Zeng","year":"2023","journal-title":"J. Mach. Learn. Res."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/make5040070"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3293417"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3317632"},{"key":"ref6","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017","journal-title":"Artificial intelligence and statistics"},{"key":"ref7","article-title":"Byzantine-tolerant machine learning","author":"Blanchard","year":"2017","journal-title":"arXivpreprint"},{"key":"ref8","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume-title":"International Conference on Machine Learning","author":"Guerraoui"},{"key":"ref9","first-page":"5132","article-title":"Scaffold: Stochastic controlled averaging for federated learning","volume-title":"International conference on machine learning","author":"Karimireddy"},{"key":"ref10","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proceedings of Machine learning and systems","volume":"2","author":"Li"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref12","first-page":"1605","article-title":"Local model poisoning attacks to {Byzantine-Robust} federated learning","volume-title":"29th USENIX security symposium (USENIX Security 20)","author":"Fang"},{"key":"ref13","first-page":"3151","article-title":"Byzantine-robust federated learning with optimal statistical rates","volume-title":"International Conference on Artificial Intelligence and Statistics","author":"Zhu"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122210"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13072"},{"key":"ref16","first-page":"5650","article-title":"Byzantine-robust dis-tributed learning: Towards optimal statistical rates","volume-title":"International Conference on Machine Learning","author":"Yin"},{"key":"ref17","article-title":"Learning to de-tect malicious clients for robust federated learning","author":"Li","year":"2020","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS49936.2021.00075"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER52292.2023.00014"},{"key":"ref20","article-title":"Diction: Dynamic robust white box watermarking scheme","author":"Bellafqira","year":"2022","journal-title":"arXiv preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1602.05629"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"volume-title":"Deep learning","year":"2016","author":"Goodfellow","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00592-x"},{"key":"ref26","first-page":"37","article-title":"Autoencoders, unsupervised learning, and deep architectures","volume-title":"Proceedings of ICML workshop on unsupervised and transfer learning. JMLR Workshop and Conference Proceedings","author":"Baldi"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116612"},{"key":"ref30","article-title":"Auto-encoding variational bayes","author":"Kingma","year":"2013","journal-title":"arXiv preprint"},{"issue":"050","key":"ref31","first-page":"3","article-title":"Tutorial on variational autoencoders","volume":"1","author":"DOERSCH","year":"2021","journal-title":"stat"},{"key":"ref32","article-title":"Semi-supervised learning of bearing anomaly detection via deep variational autoencoders","author":"Zhang","year":"2019","journal-title":"arXiv preprint"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1561\/2200000056"},{"key":"ref34","article-title":"Learning structured output represen-tation using deep conditional generative models","volume":"28","author":"Sohn","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE53722.2022.9823806"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00030"},{"key":"ref37","article-title":"On the convergence of fedavg on non-iid data","author":"Li","year":"2019","journal-title":"arXiv preprint"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36574-4_22"},{"key":"ref39","first-page":"634","article-title":"Analyzing feder-ated learning through an adversarial lens","volume-title":"International Conference on Machine Learning","author":"Bhagoji"}],"event":{"name":"2024 19th Wireless On-Demand Network Systems and Services Conference (WONS)","start":{"date-parts":[[2024,1,29]]},"location":"Chamonix, France","end":{"date-parts":[[2024,1,31]]}},"container-title":["2024 19th Wireless On-Demand Network Systems and Services Conference (WONS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10449489\/10449498\/10449550.pdf?arnumber=10449550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T01:33:31Z","timestamp":1709861611000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10449550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,29]]},"references-count":39,"URL":"https:\/\/doi.org\/10.23919\/wons60642.2024.10449550","relation":{},"subject":[],"published":{"date-parts":[[2024,1,29]]}}}