{"id":"https://openalex.org/W4414322259","doi":"https://doi.org/10.1109/access.2025.3611806","title":"Deception-Based Defense of Poisoning Attack in Federated Learning","display_name":"Deception-Based Defense of Poisoning Attack in Federated Learning","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414322259","doi":"https://doi.org/10.1109/access.2025.3611806"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3611806","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3611806","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3611806","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099361949","display_name":"Grace Colette Tessa Masse","orcid":null},"institutions":[{"id":"https://openalex.org/I178331978","display_name":"Universit\u00e9 de Dschang","ror":"https://ror.org/0566t4z20","country_code":"CM","type":"education","lineage":["https://openalex.org/I178331978"]},{"id":"https://openalex.org/I4390039363","display_name":"Infection et inflammation","ror":"https://ror.org/021sh3243","country_code":null,"type":"facility","lineage":["https://openalex.org/I154526488","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4390039363"]},{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]}],"countries":["CM","FR"],"is_corresponding":true,"raw_author_name":"Grace Colette Tessa Masse","raw_affiliation_strings":["Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France","University of Dschang, Cameroon"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I4390039363"]},{"raw_affiliation_string":"University of Dschang, Cameroon","institution_ids":["https://openalex.org/I178331978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060341203","display_name":"Abderrahim Benslimane","orcid":"https://orcid.org/0000-0001-9307-6132"},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]},{"id":"https://openalex.org/I4390039363","display_name":"Infection et inflammation","ror":"https://ror.org/021sh3243","country_code":null,"type":"facility","lineage":["https://openalex.org/I154526488","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4390039363"]},{"id":"https://openalex.org/I198415970","display_name":"Universit\u00e9 d'Avignon et des Pays de Vaucluse","ror":"https://ror.org/00mfpxb84","country_code":"FR","type":"education","lineage":["https://openalex.org/I198415970"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abderrahim Benslimane","raw_affiliation_strings":["Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France","Avignon University, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique d&#x2019;Avignon (LIA), Avignon University, Avignon, France","institution_ids":["https://openalex.org/I4210119991","https://openalex.org/I4390039363"]},{"raw_affiliation_string":"Avignon University, France","institution_ids":["https://openalex.org/I198415970"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039803287","display_name":"Vianney Kengne Tchendji","orcid":"https://orcid.org/0000-0003-3836-1859"},"institutions":[{"id":"https://openalex.org/I178331978","display_name":"Universit\u00e9 de Dschang","ror":"https://ror.org/0566t4z20","country_code":"CM","type":"education","lineage":["https://openalex.org/I178331978"]}],"countries":["CM"],"is_corresponding":false,"raw_author_name":"Vianney Kengne Tchendji","raw_affiliation_strings":["Unit&#x00E9; de Recherche en Informatique Fondamentale, Ing&#x00E9;nierie et Applications (URIFIA), University of Dschang, Dschang, Cameroon","University of Dschang, Cameroon"],"affiliations":[{"raw_affiliation_string":"Unit&#x00E9; de Recherche en Informatique Fondamentale, Ing&#x00E9;nierie et Applications (URIFIA), University of Dschang, Dschang, Cameroon","institution_ids":["https://openalex.org/I178331978"]},{"raw_affiliation_string":"University of Dschang, Cameroon","institution_ids":["https://openalex.org/I178331978"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085420490","display_name":"Ahmed Hemida","orcid":"https://orcid.org/0000-0001-8907-3043"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed Hemida Anwar","raw_affiliation_strings":["DEVCOM Army Research Laboratory, Adelphi, MD, USA","DEVCOM Army Research Laboratory, United States"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Laboratory, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]},{"raw_affiliation_string":"DEVCOM Army Research Laboratory, United States","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5099361949"],"corresponding_institution_ids":["https://openalex.org/I178331978","https://openalex.org/I4210119991","https://openalex.org/I4390039363"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13830418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"167512","last_page":"167525"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9514999985694885,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.7652999758720398},{"id":"https://openalex.org/keywords/decoy","display_name":"Decoy","score":0.6626999974250793},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6406999826431274},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.4471000134944916},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.38679999113082886},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.37389999628067017},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.36719998717308044}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7926999926567078},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7843000292778015},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.7652999758720398},{"id":"https://openalex.org/C2779179475","wikidata":"https://www.wikidata.org/wiki/Q3545649","display_name":"Decoy","level":3,"score":0.6626999974250793},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6406999826431274},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.4471000134944916},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.38679999113082886},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.37389999628067017},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.36719998717308044},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.35899999737739563},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32589998841285706},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3066999912261963},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.257099986076355}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3611806","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3611806","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:112b3fbc500344eab6dca24ebe8dbee8","is_oa":true,"landing_page_url":"https://doaj.org/article/112b3fbc500344eab6dca24ebe8dbee8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 167512-167525 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3611806","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3611806","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2794694510","https://openalex.org/W2920095265","https://openalex.org/W2982302101","https://openalex.org/W2995022099","https://openalex.org/W3003456222","https://openalex.org/W3016632787","https://openalex.org/W3021654819","https://openalex.org/W3109695251","https://openalex.org/W3158420576","https://openalex.org/W3163598082","https://openalex.org/W3176364684","https://openalex.org/W3189604664","https://openalex.org/W3198262235","https://openalex.org/W3204468048","https://openalex.org/W4226047321","https://openalex.org/W4281753687","https://openalex.org/W4285205197","https://openalex.org/W4311081048","https://openalex.org/W4312996082","https://openalex.org/W4317795078","https://openalex.org/W4322576473","https://openalex.org/W4362653687","https://openalex.org/W4391547484","https://openalex.org/W4399908599","https://openalex.org/W4400075150","https://openalex.org/W4400076000"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"enables":[3],"decentralized":[4],"model":[5,33,73,112,174],"training":[6,166],"to":[7,24,46,107,116],"protect":[8],"data":[9],"privacy":[10,16],"but":[11],"introduces":[12,69],"new":[13],"security":[14],"and":[15,49,76,97,152],"challenges.":[17],"One":[18],"of":[19,52,138],"the":[20,47,93,117,136,146],"most":[21],"severe":[22],"threats":[23],"FL":[25,165],"systems":[26],"is":[27,42,91,105],"poisoning":[28,169],"attacks,":[29],"which":[30],"can":[31],"disrupt":[32],"convergence":[34],"or":[35],"manipulate":[36],"prediction":[37],"outcomes.":[38],"Addressing":[39],"these":[40],"attacks":[41],"particularly":[43],"challenging":[44],"due":[45],"distributed":[48],"opaque":[50],"nature":[51],"FL.":[53],"To":[54],"proactively":[55],"strengthen":[56],"defenses,":[57],"we":[58],"propose":[59],"HoneyFED,":[60],"a":[61,70,88,109,120],"novel":[62],"mitigation":[63],"strategy":[64],"based":[65],"on":[66],"deception.":[67],"HoneyFED":[68,162],"global":[71],"decoy":[72,111,140],"that":[74,113,161],"misleads":[75],"disrupts":[77],"malicious":[78],"actors":[79],"by":[80],"creating":[81],"obstacles":[82],"in":[83,154],"their":[84,99,127],"attack":[85,101,128],"process.":[86],"When":[87],"potential":[89],"attacker":[90,156],"detected,":[92],"system":[94],"engages":[95],"them":[96],"captures":[98],"poisoned":[100],"methods.":[102],"This":[103],"information":[104],"used":[106],"design":[108],"convincing":[110],"appears":[114],"legitimate":[115],"attacker.":[118],"As":[119],"result,":[121],"attackers":[122],"are":[123],"tricked":[124],"into":[125],"believing":[126],"has":[129],"succeeded,":[130],"discouraging":[131],"further":[132],"attempts.":[133],"We":[134],"evaluate":[135],"realism":[137],"our":[139],"using":[141],"three":[142],"criteria:":[143],"indistinguishability":[144],"from":[145],"real":[147],"model,":[148],"credibility":[149],"over":[150],"time,":[151],"viability":[153],"influencing":[155],"behavior.":[157],"Experimental":[158],"results":[159],"demonstrate":[160],"effectively":[163],"defends":[164],"against":[167],"various":[168],"strategies":[170],"while":[171],"improving":[172],"overall":[173],"convergence.":[175]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
