{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:27:01Z","timestamp":1741325221526,"version":"3.38.0"},"reference-count":32,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.052082","type":"journal-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T07:33:11Z","timestamp":1728459191000},"page":"1667-1685","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Update Distribution Estimation under Probability Byzantine Attack"],"prefix":"10.32604","volume":"81","author":[{"given":"Gang","family":"Long","sequence":"first","affiliation":[]},{"given":"Zhaoxin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"9542","DOI":"10.1109\/TVT.2023.3253131","article-title":"A trust-based reliable confident information coverage model of wireless sensor networks for intelligent transportation","volume":"72","author":"Xia","year":"2023","journal-title":"IEEE Trans. Vehicular Technol."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3853","DOI":"10.1109\/LCOMM.2021.3119350","article-title":"Asymptotically optimal arrival rate for IoT networks with AoI and peak AoI constraints","volume":"25","author":"Hu","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4585","DOI":"10.1109\/TCE.2023.3342644","article-title":"Privacy-Preserving federated learning approach for distributed malware attacks with intermittent clients and image representation","volume":"70","author":"Ullah","year":"Jan. 2023","journal-title":"IEEE Trans. Consumer Electron."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"83863","DOI":"10.1109\/ACCESS.2019.2925009","article-title":"Distributed data-selective DLMS estimation under channel attacks","volume":"7","author":"Hua","year":"2019","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1109\/TCE.2023.3328320","article-title":"NIDS-VSB: Network intrusion detection system for VANET using spark-based big data optimization and transfer learning","volume":"70","author":"Ullah","year":"Feb. 2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref6","first-page":"521","article-title":"Robust minimum disturbance diffusion LMS for distributed estimation","volume":"68","author":"Zayyani","year":"2020","journal-title":"IEEE Trans. Circuits Syst. II: Express Briefs"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105384","article-title":"Secure distributed estimation under Byzantine attack and manipulation attack","volume":"116","author":"Wan","year":"2022, Art. no. 105384","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1660","DOI":"10.1109\/LCOMM.2021.3049965","article-title":"One-step asynchronous data fusion dlms algorithm","volume":"25","author":"Hua","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","article-title":"IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic","volume":"10","author":"Ullah","year":"Mar. 2023","journal-title":"Digit. Commun. Netw."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"4416","DOI":"10.1007\/s00034-020-01374-1","article-title":"Communication-reducing algorithm of distributed least mean square algorithm with neighbor-partial diffusion","volume":"39","author":"Chen","year":"2020","journal-title":"Circuits, Syst., Signal Process."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"6165","DOI":"10.1109\/TCYB.2020.2967072","article-title":"Distributed semi-supervised learning with missing data","volume":"51","author":"Xu","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1016\/j.ins.2022.05.074","article-title":"Adaptive multitask clustering algorithm based on distributed diffusion least-mean-square estimation","volume":"606","author":"Hua","year":"2022","journal-title":"Inf. Sci."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1109\/TSP.2009.2033729","article-title":"Diffusion LMS strategies for distributed estimation","volume":"58","author":"Cattivelli","year":"2009","journal-title":"IEEE Trans. Signal Process."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.dsp.2018.02.008","article-title":"Diffusion generalized maximum correntropy criterion algorithm for distributed estimation over multitask network","volume":"81","author":"Chen","year":"2018","journal-title":"Digit. Signal Process."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1109\/LSP.2020.2990086","article-title":"Diffusion LMS with communication delays: Stability and performance analysis","volume":"27","author":"Hua","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"4129","DOI":"10.1109\/TSP.2014.2333560","article-title":"Multitask diffusion adaptation over networks","volume":"62","author":"Chen","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref17","first-page":"5262","article-title":"Distributed estimation with adaptive cluster learning over asynchronous data fusion","volume":"59","author":"Hua","year":"Oct. 2023","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref18","first-page":"1","article-title":"Resilient distributed diffusion in networks with adversaries","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Trans. Signal Inf. Process. Over Netw."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1815","DOI":"10.1109\/TAES.2018.2803578","article-title":"Secure distributed estimation over wireless sensor networks under attacks","volume":"54","author":"Liu","year":"2018","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"5840","DOI":"10.1109\/TCYB.2022.3197591","article-title":"Distributed estimation with cross-verification under false data-injection attacks","volume":"53","author":"Hua","year":"2023","journal-title":"IEEE Trans. Cybern."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"5250","DOI":"10.1109\/TSP.2015.2450191","article-title":"Distributed Bayesian detection in the presence of Byzantine data","volume":"63","author":"Kailkhura","year":"2015","journal-title":"IEEE Trans. Signal Process."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1631","DOI":"10.1109\/LCOMM.2020.2990869","article-title":"Analysis of Byzantine attack strategy for cooperative spectrum sensing","volume":"24","author":"Wu","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.sigpro.2016.03.022","article-title":"Diffusion sign-error LMS algorithm: Formulation and stochastic behavior analysis","volume":"128","author":"Ni","year":"2016","journal-title":"Signal Process."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1109\/LSP.2014.2319308","article-title":"Steady-state mean-square error analysis for adaptive filtering under the maximum correntropy criterion","volume":"21","author":"Chen","year":"2014","journal-title":"IEEE Signal Process. Lett."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"6324","DOI":"10.1007\/s00034-023-02410-6","article-title":"Distributed estimation with novel adaptive data selection based on a cross-matching mechanism","volume":"42","author":"Wan","year":"2023","journal-title":"Circuits Syst., Signal Process."},{"key":"ref26","series-title":"Int. Conf. Mach. Learn","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","author":"Yin","year":"2018"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"6182","DOI":"10.1007\/s00034-022-02072-w","article-title":"An adversary-resilient doubly compressed diffusion LMS algorithm for distributed estimation","volume":"41","author":"Zayyani","year":"2022","journal-title":"Circuits Syst., Signal Process."},{"key":"ref28","series-title":"Proc. IEEE Int. Conf. Acoust., Speech Signal Process (ICASSP)","first-page":"9316","article-title":"Distributed decision-making for community structured networks","author":"Shumovskaia","year":"2024"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3376","DOI":"10.1109\/TSP.2016.2539127","article-title":"Generalized correntropy for robust adaptive filtering","volume":"64","author":"Chen","year":"2016","journal-title":"IEEE Trans. Signal Process."},{"key":"ref30","series-title":"2018 IEEE 4th Int. Conf. Comput. Commun. (ICCC)","first-page":"2195","article-title":"An adaptive malicious punishment over secure distributed estimation under attacks","author":"Hua","year":"2018"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.ins.2019.12.016","article-title":"Secure distributed estimation against false data injection attack","volume":"515","author":"Hua","year":"2020","journal-title":"Inf. Sci."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.sigpro.2017.07.014","article-title":"Diffusion least logarithmic absolute difference algorithm for distributed estimation","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Process."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_52082\/TSP_CMC_52082.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:29:21Z","timestamp":1741314561000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.052082","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-03-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-28","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}