{"id":"https://openalex.org/W4313181385","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927914","title":"Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning","display_name":"Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning","publication_year":2022,"publication_date":"2022-09-12","ids":{"openalex":"https://openalex.org/W4313181385","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927914"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927914","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927914","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091167202","display_name":"Pinar Erbil","orcid":null},"institutions":[{"id":"https://openalex.org/I1351752","display_name":"Ko\u00e7 University","ror":"https://ror.org/00jzwgz36","country_code":"TR","type":"education","lineage":["https://openalex.org/I1351752"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Pinar Erbil","raw_affiliation_strings":["Koc University,Department of Computer Engineering,Istanbul,Turkey","Department of Computer Engineering, Koc University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Koc University,Department of Computer Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I1351752"]},{"raw_affiliation_string":"Department of Computer Engineering, Koc University, Istanbul, Turkey","institution_ids":["https://openalex.org/I1351752"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052765649","display_name":"Mehmet Emre G\u00fcrsoy","orcid":"https://orcid.org/0000-0002-7676-0167"},"institutions":[{"id":"https://openalex.org/I1351752","display_name":"Ko\u00e7 University","ror":"https://ror.org/00jzwgz36","country_code":"TR","type":"education","lineage":["https://openalex.org/I1351752"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"M. Emre Gursoy","raw_affiliation_strings":["Koc University,Department of Computer Engineering,Istanbul,Turkey","Department of Computer Engineering, Koc University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Koc University,Department of Computer Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I1351752"]},{"raw_affiliation_string":"Department of Computer Engineering, Koc University, Istanbul, Turkey","institution_ids":["https://openalex.org/I1351752"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091167202"],"corresponding_institution_ids":["https://openalex.org/I1351752"],"apc_list":null,"apc_paid":null,"fwci":0.4158,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.59820082,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11775","display_name":"COVID-19 diagnosis using AI","score":0.9430999755859375,"subfield":{"id":"https://openalex.org/subfields/2741","display_name":"Radiology, Nuclear Medicine and Imaging"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8250214457511902},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7116726040840149},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.598761796951294},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5416449308395386},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5065730810165405},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5010802745819092},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5007708072662354},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4559316337108612},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4510185718536377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41461414098739624},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2022000253200531}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8250214457511902},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7116726040840149},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.598761796951294},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5416449308395386},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5065730810165405},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5010802745819092},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5007708072662354},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4559316337108612},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4510185718536377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41461414098739624},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2022000253200531},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927914","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927914","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1585610988","https://openalex.org/W2072358441","https://openalex.org/W2099242680","https://openalex.org/W2112507308","https://openalex.org/W2133059825","https://openalex.org/W2145023731","https://openalex.org/W2170590171","https://openalex.org/W2559840118","https://openalex.org/W2810065831","https://openalex.org/W2903356604","https://openalex.org/W2912023992","https://openalex.org/W2930926105","https://openalex.org/W2964162474","https://openalex.org/W2970408908","https://openalex.org/W2977072935","https://openalex.org/W2995022099","https://openalex.org/W2995164118","https://openalex.org/W3004155269","https://openalex.org/W3021654819","https://openalex.org/W3043758338","https://openalex.org/W3048715803","https://openalex.org/W3085804918","https://openalex.org/W3087391814","https://openalex.org/W3091870957","https://openalex.org/W3103245149","https://openalex.org/W3113458348","https://openalex.org/W3138153888","https://openalex.org/W3201824817","https://openalex.org/W3203600060","https://openalex.org/W4298140072","https://openalex.org/W6635035540","https://openalex.org/W6676935882","https://openalex.org/W6750462152","https://openalex.org/W6752600739","https://openalex.org/W6756840679","https://openalex.org/W6758398813","https://openalex.org/W6764838729","https://openalex.org/W6770634426","https://openalex.org/W6771533808","https://openalex.org/W6787633081"],"related_works":["https://openalex.org/W4298221930","https://openalex.org/W2777914285","https://openalex.org/W3013363440","https://openalex.org/W3080832531","https://openalex.org/W4214626077","https://openalex.org/W3172436983","https://openalex.org/W4285322112","https://openalex.org/W3158596343","https://openalex.org/W4292794239","https://openalex.org/W4385572030"],"abstract_inverted_index":{"Federated":[0],"learning":[1,14],"(FL)":[2],"has":[3],"emerged":[4],"as":[5],"a":[6,21,84,106,144,148,165],"promising":[7],"paradigm":[8],"for":[9,83,110,123],"distributed":[10],"training":[11,34,59],"of":[12,87,92,164,172],"machine":[13],"models.":[15],"In":[16,61],"FL,":[17],"several":[18],"participants":[19,52],"train":[20],"global":[22],"model":[23,28,81,94,146,149],"collaboratively":[24],"by":[25,155],"only":[26,193],"sharing":[27],"parameter":[29,54],"updates":[30,55,113],"while":[31,89,191],"keeping":[32],"their":[33,133],"data":[35,46,70],"local.":[36],"However,":[37],"FL":[38],"was":[39],"recently":[40],"shown":[41],"to":[42,45,78,213],"be":[43,159],"vulnerable":[44],"poisoning":[47,71,166],"attacks,":[48,72,102],"in":[49,142,216],"which":[50,143],"malicious":[51,112],"send":[53],"derived":[56],"from":[57,114],"poisoned":[58],"data.":[60],"this":[62],"paper,":[63],"we":[64,103,119,136,183],"focus":[65],"on":[66],"defending":[67],"against":[68,100],"targeted":[69],"where":[73],"the":[74,80,90,93,162,200],"attacker\u2019s":[75],"goal":[76],"is":[77,95,151],"make":[79],"misbehave":[82],"small":[85],"subset":[86],"classes":[88],"rest":[91],"relatively":[96],"unaffected.":[97],"To":[98],"defend":[99],"such":[101],"first":[104],"propose":[105,120,137],"method":[107],"called":[108],"MAPPS":[109,126,129],"separating":[111],"benign":[115],"ones.":[116],"Using":[117],"MAPPS,":[118],"three":[121],"methods":[122,174,209],"attack":[124,139],"detection:":[125],"+":[127,130],"X-Means,":[128],"VAT,":[131],"and":[132],"Ensemble.":[134],"Then,":[135],"an":[138,156,217],"mitigation":[140],"approach":[141],"\"clean\"":[145],"(i.e.,":[147],"that":[150,182,203],"not":[152],"negatively":[153],"impacted":[154],"attack)":[157],"can":[158,184],"trained":[160,205,215],"despite":[161],"existence":[163],"attempt.":[167],"We":[168],"empirically":[169],"evaluate":[170],"all":[171],"our":[173,207],"using":[175,206],"popular":[176],"image":[177],"classification":[178],"datasets.":[179],"Results":[180],"show":[181],"achieve":[185],">":[186],"95%":[187],"true":[188],"positive":[189,197],"rates":[190],"incurring":[192],"<":[194],"2%":[195],"false":[196],"rate.":[198],"Furthermore,":[199],"clean":[201],"models":[202,214],"are":[204],"proposed":[208],"have":[210],"accuracy":[211],"comparable":[212],"attack-free":[218],"scenario.":[219]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
