{"id":"https://openalex.org/W4406461841","doi":"https://doi.org/10.1109/bigdata62323.2024.10825512","title":"A Defense Mechanism Against LOKI Attacks in Federated Learning for Enhancing Big Data Privacy in Mobile Systems","display_name":"A Defense Mechanism Against LOKI Attacks in Federated Learning for Enhancing Big Data Privacy in Mobile Systems","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406461841","doi":"https://doi.org/10.1109/bigdata62323.2024.10825512"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10825512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095374971","display_name":"Faria Nawshin","orcid":"https://orcid.org/0009-0006-4254-7196"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Faria Nawshin","raw_affiliation_strings":["College of Engineering, Qatar University,KINDI Computing Research Center,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Qatar University,KINDI Computing Research Center,Doha,Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069329155","display_name":"Devrim \u00dcnal","orcid":"https://orcid.org/0000-0003-3146-3502"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Devrim Unal","raw_affiliation_strings":["College of Engineering, Qatar University,KINDI Computing Research Center,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Qatar University,KINDI Computing Research Center,Doha,Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025626208","display_name":"Ponnuthurai Nagaratnam Suganthan","orcid":"https://orcid.org/0000-0003-0901-5105"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ponnuthurai N. Suganthan","raw_affiliation_strings":["College of Engineering, Qatar University,KINDI Computing Research Center,Doha,Qatar"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Qatar University,KINDI Computing Research Center,Doha,Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5095374971"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23817325,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"7971","last_page":"7980"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.7345132231712341},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7179023027420044},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5363423228263855},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5324414968490601},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5080931186676025},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47386980056762695},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.41157272458076477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16844937205314636},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.1375243067741394},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.08259159326553345}],"concepts":[{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.7345132231712341},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7179023027420044},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5363423228263855},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5324414968490601},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5080931186676025},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47386980056762695},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.41157272458076477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16844937205314636},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.1375243067741394},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.08259159326553345},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10825512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/68789","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/68789","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2596043126","https://openalex.org/W2800788706","https://openalex.org/W2951765556","https://openalex.org/W2978631110","https://openalex.org/W3027749727","https://openalex.org/W3086156262","https://openalex.org/W3105429705","https://openalex.org/W3135347465","https://openalex.org/W3157680283","https://openalex.org/W3186788521","https://openalex.org/W3189787917","https://openalex.org/W3200400919","https://openalex.org/W3210231570","https://openalex.org/W4210630464","https://openalex.org/W4213044365","https://openalex.org/W4221025359","https://openalex.org/W4283771810","https://openalex.org/W4377704487","https://openalex.org/W4381233012","https://openalex.org/W4385654308","https://openalex.org/W4389719707","https://openalex.org/W4391020370","https://openalex.org/W4394733580","https://openalex.org/W4395480811","https://openalex.org/W4402264897","https://openalex.org/W4402727678"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W2240244939"],"abstract_inverted_index":{"With":[0],"the":[1,61,67,74,81,108,141,155,165,189,192],"exponential":[2],"growth":[3],"of":[4,14,63,71,76,143,158,167,191],"mobile":[5,152],"applications,":[6],"Android":[7,118],"systems":[8],"have":[9],"become":[10],"a":[11,41,100,116,129],"significant":[12],"source":[13],"big":[15,64,168,181,205],"data":[16,49,72,159,169,182,197,206],"which":[17],"provides":[18],"both":[19],"vast":[20],"opportunities":[21],"and":[22,69,94,136,175,199],"substantial":[23],"privacy":[24,135,198,207],"challenges.":[25],"This":[26,84],"makes":[27],"it":[28],"essential":[29],"to":[30,92,139,179],"adopt":[31],"secure":[32],"learning":[33],"approaches":[34],"like":[35],"Federated":[36],"Learning":[37],"(FL).":[38],"FL":[39,55,91,113,201],"is":[40,149,173,208],"decentralized":[42,101],"approach":[43,172],"that":[44,132],"trains":[45],"models":[46],"across":[47],"distributed":[48],"without":[50],"centralizing":[51],"sensitive":[52,96],"information.":[53],"However,":[54],"still":[56],"faces":[57],"security":[58],"threats":[59],"in":[60,90,99,195],"scope":[62],"data,":[65,97],"where":[66,154,204],"volume":[68,157],"variety":[70],"increase":[73],"risks":[75],"sophisticated":[77],"attacks":[78,110],"such":[79],"as":[80],"LOKI":[82,109,144],"attacks.":[83,145],"attack":[85],"exploits":[86],"shared":[87],"model":[88],"updates":[89],"infer":[93],"leak":[95],"even":[98],"setup.":[102],"In":[103],"this":[104,147,171],"paper,":[105],"we":[106,187],"simulate":[107],"within":[111],"an":[112],"environment":[114],"using":[115],"real-world":[117],"malware":[119],"detection":[120,138],"dataset":[121],"characterized":[122],"by":[123,161],"dynamic":[124],"analysis":[125],"features.":[126],"We":[127],"propose":[128],"defense":[130],"mechanism":[131,148,194],"combines":[133],"differential":[134],"anomaly":[137],"reduce":[140],"impact":[142],"While":[146],"designed":[150],"for":[151,202],"systems,":[153],"large":[156],"generated":[160],"numerous":[162],"applications":[163,203],"mirrors":[164],"complexities":[166],"environments,":[170],"adaptable":[174],"can":[176],"be":[177],"applied":[178],"other":[180],"contexts.":[183],"Through":[184],"extensive":[185],"experiments,":[186],"demonstrate":[188],"effectiveness":[190],"proposed":[193],"enhancing":[196],"securing":[200],"foremost.":[209]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
