{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:44:17Z","timestamp":1763102657268,"version":"3.45.0"},"reference-count":31,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061377","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T03:12:21Z","timestamp":1741662741000},"page":"239-258","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning"],"prefix":"10.32604","volume":"83","author":[{"given":"Long","family":"Cai","sequence":"first","affiliation":[]},{"given":"Ke","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Lei","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"1273","author":"McMahan","year":"2017","journal-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCOM.001.1900461","article-title":"Federated learning for wireless communications: motivation, opportunities, and challenges","volume":"58","author":"Niknam","year":"2020","journal-title":"IEEE Commun Mag"},{"key":"ref3","volume":"30","author":"Blanchard","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref4","series-title":"2019 IEEE Symposium on Security and Privacy (SP)","first-page":"739","article-title":"Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning","author":"Nasr","year":"2019"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4439","DOI":"10.1109\/TVT.2020.2977378","article-title":"Poisoning and evasion attacks against deep learning algorithms in autonomous vehicles","volume":"69","author":"Jiang","year":"2020","journal-title":"IEEE Trans Vehicular Technol"},{"key":"ref6","series-title":"ICASSP 2022\u20142022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"4278","article-title":"Byzantine-robust aggregation with gradient difference compression and stochastic variance reduction for federated learning","author":"Zhu","year":"2022"},{"key":"ref7","first-page":"5650","author":"Yin","year":"2018","journal-title":"Proceedings of the 35th International Conference on Machine Learning"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2168","DOI":"10.1109\/JSAC.2020.3041404","article-title":"Byzantine-resilient secure federated learning","volume":"39","author":"So","year":"2021","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"166337","DOI":"10.1007\/s11704-021-1067-4","article-title":"Defense against local model poisoning attacks to byzantine-robust federated learning","volume":"16","author":"Lu","year":"2022","journal-title":"Frontiers Comput Sci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1109\/TII.2021.3128164","article-title":"Byzantine-robust aggregation in federated learning empowered industrial IoT","volume":"19","author":"Li","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/MNET.001.2200198","article-title":"Federated unlearning: guarantee the right of clients to forget","volume":"36","author":"Wu","year":"2022","journal-title":"IEEE Network"},{"key":"ref12","first-page":"622","author":"Wang","year":"2022","journal-title":"WWW \u201922: The ACM Web Conference 2022; 2022 Apr 25\u201329; Lyon, France"},{"key":"ref13","series-title":"2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)","first-page":"216","article-title":"Bayesian variational federated learning and unlearning in decentralized networks","author":"Gong","year":"2021"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2150","DOI":"10.1109\/TETCI.2024.3379240","article-title":"Machine unlearning: solutions and challenges","volume":"8","author":"Xu","year":"2024","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"ref15","series-title":"2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS)","first-page":"233","article-title":"Understanding distributed poisoning attack in federated learning","author":"Cao","year":"2019"},{"article-title":"FLTrust: byzantine-robust federated learning via trust bootstrapping","series-title":"28th Annual Network and Distributed System Security Symposium, NDSS 2021; 2021 Feb 21\u201325;","author":"Cao","key":"ref16"},{"key":"ref17","series-title":"ICASSP 2020\u20142020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"8861","article-title":"On the byzantine robustness of clustered federated learning","author":"Sattler","year":"2020"},{"key":"ref18","doi-asserted-by":"crossref","unstructured":"Zhai K, Ren Q, Wang J, Yan C. Byzantine-robust federated learning via credibility assessment on non-IID data. arXiv:2109.02396. 2021.","DOI":"10.3934\/mbe.2022078"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.future.2024.04.017","article-title":"Low dimensional secure federated learning framework against poisoning attacks","volume":"158","author":"Erdol","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"103562","DOI":"10.1016\/j.cose.2023.103562","article-title":"VPPFL: a verifiable privacy-preserving federated learning scheme against poisoning attacks","volume":"136","author":"Huang","year":"2024","journal-title":"Computers Security"},{"key":"ref21","doi-asserted-by":"crossref","unstructured":"Hu T. Dense in dense: training segmentation from scratch. In: Jawahar CV, Li H, Mori G, Schindler K, editors. Computer vision\u2013ACCV 2018. Cham: Springer International Publishing; 2019. p. 454\u201370.","DOI":"10.1007\/978-3-030-20876-9_29"},{"key":"ref22","series-title":"2015 IEEE Symposium on Security and Privacy","first-page":"463","article-title":"Towards making systems forget with machine unlearning","author":"Cao","year":"2015"},{"key":"ref23","first-page":"3513","author":"Ginart","year":"2019","journal-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019; 2019 Dec 8\u201314"},{"key":"ref24","series-title":"2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)","first-page":"1","article-title":"FedEraser: enabling efficient client-level data removal from federated learning models","author":"Liu","year":"2021"},{"key":"ref25","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"1366","article-title":"FedRecover: recovering from poisoning attacks in federated learning using historical information","author":"Cao","year":"2023"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"4732","DOI":"10.1109\/TIFS.2023.3297905","article-title":"FedRecovery: differentially private machine unlearning for federated learning frameworks","volume":"18","author":"Zhang","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"22081","DOI":"10.1109\/JIOT.2024.3378329","article-title":"Toward efficient and robust federated unlearning in IoT networks","volume":"11","author":"Yuan","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"110178","DOI":"10.1016\/j.knosys.2022.110178","article-title":"FL-defender: combating targeted attacks in federated learning","volume":"260","author":"Jebreel","year":"2023","journal-title":"Knowl Based Syst"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","article-title":"Principal component analysis","volume":"2","author":"Wold","year":"1987","journal-title":"Chemometr Intell Lab Syst"},{"key":"ref30","unstructured":"LeCun Y. The MNIST database of handwritten digits; 1998 [cited 2025 Feb 13]. Available from: http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"ref31","unstructured":"Xiao H, Rasul K, Vollgraf R. Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv:1708.07747. 2017."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_61377\/TSP_CMC_61377.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:46Z","timestamp":1763102386000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061377","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}