{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:31:02Z","timestamp":1763346662706,"version":"3.45.0"},"reference-count":30,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067521","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T08:19:23Z","timestamp":1757924363000},"page":"5057-5071","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Multi-Layer Defense Mechanism for Trusted Federated Learning in Network Security Assessment"],"prefix":"10.32604","volume":"85","author":[{"given":"Lincong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Liandong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Peipei","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zizhou","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chengzhu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fanqin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/s10462-024-10846-8","article-title":"An overview of implementing security and privacy in federated learning","volume":"57","author":"Hu","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"7307","DOI":"10.1007\/s10586-024-04334-5","article-title":"Malicious detection model with artificial neural network in IoT-based smart farming security","volume":"27","author":"Mohy-eddine","year":"2024","journal-title":"Cluster Comput"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TCE.2024.3371501","article-title":"Blockchain-enabled decentralized edge intelligence for trustworthy 6G consumer electronics","volume":"70","author":"Wang","year":"2024","journal-title":"IEEE Transact Cons Elect"},{"key":"ref4","first-page":"1","article-title":"Attacks against federated learning defense systems and their mitigation","volume":"24","author":"Lewis","year":"2023","journal-title":"J Mach Learn Res"},{"key":"ref5","first-page":"7","author":"Imteaj","year":"2023","journal-title":"Federated learning for resource-constrained IoT devices: panoramas and state of the art"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"101061","DOI":"10.1016\/j.iot.2024.101061","article-title":"Federated learning for green and sustainable 6G IIoT applications","volume":"25","author":"Quy","year":"2024","journal-title":"Inter Things"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2600","DOI":"10.1109\/TC.2023.3257510","article-title":"Byzantine-resilient federated learning at edge","volume":"72","author":"Tao","year":"2023","journal-title":"IEEE Transact Comput"},{"key":"ref8","series-title":"ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"1","article-title":"Adaptive layered-trust robust defense mechanism for personalized federated learning","author":"Wang","year":"2025"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"113526","DOI":"10.1016\/j.knosys.2025.113526","article-title":"Optimizing IoT data collection through federated learning and periodic scheduling","volume":"317","author":"AzharShokoufeh","year":"2025","journal-title":"Knowl Based Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.iotcps.2023.04.001","article-title":"Security of federated learning with IoT systems: issues, limitations, challenges, and solutions","volume":"3","author":"Yaacoub","year":"2023","journal-title":"Int Things Cyber-Phys Syst"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.1109\/TII.2022.3170348","article-title":"Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things","volume":"19","author":"Kalapaaking","year":"2022","journal-title":"IEEE Transact Indust Inform"},{"key":"ref12","series-title":"IEEE INFOCOM 2024-IEEE Conference on Computer Communications","first-page":"2448","article-title":"Towards efficient asynchronous federated learning in heterogeneous edge environments","author":"Zhou","year":"2024"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"110122","DOI":"10.1016\/j.patcog.2023.110122","article-title":"Reducing communication in federated learning via efficient client sampling","volume":"148","author":"Ribero","year":"2024","journal-title":"Pattern Recognit"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"6439","DOI":"10.1007\/s10462-022-10325-y","article-title":"Data clustering: application and trends","volume":"56","author":"Oyewole","year":"2023","journal-title":"Artif Intell Rev"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3529","DOI":"10.3390\/app13063529","article-title":"A taxonomy of machine learning clustering algorithms, challenges, and future realms","volume":"13","author":"Pitafi","year":"2023","journal-title":"Appl Sci"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"e38137","DOI":"10.1016\/j.heliyon.2024.e38137","article-title":"Federated learning: overview, strategies, applications, tools and future directions","volume":"10","author":"Yurdem","year":"2024","journal-title":"Heliyon"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"2758","DOI":"10.1093\/comjnl\/bxac118","article-title":"Adaptive federated learning with non-IID data","volume":"66","author":"Zeng","year":"2023","journal-title":"Comput J"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"15587","DOI":"10.1109\/JIOT.2024.3350241","article-title":"FedSL: a communication-efficient federated learning with split layer aggregation","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Inter Things J"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3616537","article-title":"Byzantine machine learning: a primer","volume":"56","author":"Guerraoui","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref20","series-title":"2023 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Federated learning via decentralized dataset distillation in resource-constrained edge environments","author":"Song","year":"2023"},{"key":"ref21","series-title":"International Conference on Financial Cryptography and Data Security","first-page":"21","article-title":"Byzantine generals in the permissionless setting","author":"Lewis-Pye","year":"2023"},{"journal-title":"Fractional difference, differential equations, and inclusions: analysis and stability","year":"2024","author":"Abbas","key":"ref22"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/s12083-022-01408-2","article-title":"Practical Byzantine fault tolerance consensus based on comprehensive reputation","volume":"16","author":"Qi","year":"2023","journal-title":"Peer-to-Peer Networ Applicat"},{"key":"ref24","series-title":"Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing","first-page":"157","article-title":"All byzantine agreement problems are expensive","author":"Civit","year":"2024"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1515\/9783111325064","author":"Linde","year":"2024","journal-title":"Probability theory: a first course in probability theory and statistics"},{"key":"ref26","series-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 data set","author":"Tavallaee","year":"2009"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"142","DOI":"10.32996\/jcsts.2024.6.4.16","article-title":"Detecting IoT cyberattacks: advanced machine learning models for enhanced security in network traffic","volume":"6","author":"Buiya","year":"2024","journal-title":"J Comput Sci Technol Stud"},{"key":"ref28","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"12187","article-title":"Elastic aggregation for federated optimization","author":"Chen","year":"2023"},{"key":"ref29","unstructured":"Li X, Huang K, Yang W, Wang S, Zhang Z. On the convergence of fedavg on non-iid data. arXiv:1907.02189. 2019."},{"key":"ref30","unstructured":"Shoham N, Avidor T, Keren A, Israel N, Benditkis D, Mor-Yosef L, et al. Overcoming forgetting in federated learning on non-iid data. arXiv:1910.07796. 2019."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_67521\/TSP_CMC_67521.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:28:00Z","timestamp":1763346480000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64147"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067521","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}