{"id":"https://openalex.org/W4411688972","doi":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11037134","title":"DDFL: A Robust Clustering-Based Defense Against Poisoning Attacks in Decentralized Federated Learning","display_name":"DDFL: A Robust Clustering-Based Defense Against Poisoning Attacks in Decentralized Federated Learning","publication_year":2025,"publication_date":"2025-06-03","ids":{"openalex":"https://openalex.org/W4411688972","doi":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11037134"},"language":"en","primary_location":{"id":"doi:10.1109/eucnc/6gsummit63408.2025.11037134","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11037134","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053835749","display_name":"A.G. Amarasinghe","orcid":null},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Asanka Amarasinghe","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069043129","display_name":"Yushan Siriwardhana","orcid":"https://orcid.org/0000-0001-5992-891X"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Yushan Siriwardhana","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048493557","display_name":"Tharaka Hewa","orcid":"https://orcid.org/0000-0002-4520-6542"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Tharaka Hewa","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059694865","display_name":"Mika Ylianttila","orcid":"https://orcid.org/0000-0002-8079-5514"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Mika Ylianttila","raw_affiliation_strings":["University of Oulu,Centre for Wireless Communications,Finland"],"affiliations":[{"raw_affiliation_string":"University of Oulu,Centre for Wireless Communications,Finland","institution_ids":["https://openalex.org/I98381234"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053835749"],"corresponding_institution_ids":["https://openalex.org/I98381234"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08118198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"745","last_page":"750"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8151000142097473,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8151000142097473,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8126999735832214,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12488","display_name":"Mental Health via Writing","score":0.7098000049591064,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.791705846786499},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243592739105225},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6363597512245178},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5425058603286743},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26318585872650146}],"concepts":[{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.791705846786499},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243592739105225},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6363597512245178},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5425058603286743},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26318585872650146}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eucnc/6gsummit63408.2025.11037134","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eucnc/6gsummit63408.2025.11037134","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Joint European Conference on Networks and Communications &amp;amp; 6G Summit (EuCNC/6G Summit)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W2981096252","https://openalex.org/W3217639405","https://openalex.org/W4385080416","https://openalex.org/W4386766438","https://openalex.org/W4390874351","https://openalex.org/W4400811071","https://openalex.org/W4403052649","https://openalex.org/W4405181861","https://openalex.org/W6678914141","https://openalex.org/W6728757088","https://openalex.org/W6752029299","https://openalex.org/W6754708055","https://openalex.org/W6767676916","https://openalex.org/W6780640148","https://openalex.org/W6798772894","https://openalex.org/W6803790066"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4298221930","https://openalex.org/W2390279801","https://openalex.org/W2777914285","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W3176937389","https://openalex.org/W4408069290"],"abstract_inverted_index":{"Federated":[0,58],"Learning":[1,8,59],"(FL)":[2],"is":[3,30,90,123],"a":[4,20,31,40,66,73,145,171],"privacy-preserving":[5],"decentralized":[6],"Machine":[7],"(ML)":[9],"paradigm":[10],"where":[11,61],"the":[12,24,43,47,62,70,84,109,113,119,131,134,166,197],"users":[13],"are":[14,104],"massively":[15],"distributed":[16],"and":[17,112,142],"coordinated":[18],"by":[19],"central":[21,74],"server":[22,29,44],"during":[23],"training":[25,48],"process.":[26,49],"The":[27,76],"FL":[28,55,95],"single":[32],"point":[33],"of":[34,72,79,86,133],"failure,":[35],"therefore,":[36],"an":[37,91],"absence":[38],"or":[39],"delay":[41],"with":[42,137,177,196],"severely":[45],"affects":[46],"This":[50],"leads":[51],"to":[52],"further":[53,82],"extending":[54],"into":[56],"Decentralized":[57],"(DFL)":[60],"learning":[63],"happens":[64],"in":[65,94,101,108,192,200],"peer-to-peer":[67,77],"manner":[68],"without":[69],"involvement":[71],"server.":[75],"sharing":[78],"model":[80,162],"updates":[81],"increases":[83],"threat":[85],"poisoning":[87,99,182],"attacks,":[88],"which":[89],"inherent":[92],"vulnerability":[93],"systems.":[96,152],"Defenses":[97],"against":[98],"attacks":[100],"DFL":[102,151],"systems":[103],"not":[105,155],"extensively":[106,129],"discussed":[107],"state-of-the-art":[110,198],"research,":[111],"existing":[114,135],"algorithms":[115],"perform":[116],"poorly":[117],"when":[118],"client":[120,139],"data":[121,140,179],"distribution":[122],"non-IID.":[124],"In":[125],"this":[126],"work,":[127],"we":[128,169],"evaluate":[130],"performance":[132],"defenses":[136],"non-IID":[138,178,201],"distribution,":[141],"propose":[143],"DDFL,":[144],"novel":[146],"clustering-based":[147],"defense":[148],"mechanism":[149],"for":[150,165,174],"DDFL":[153,189],"does":[154],"rely":[156],"on":[157],"empirical":[158],"parameters":[159],"but":[160],"considers":[161],"update":[163],"history":[164],"defense.":[167],"Moreover,":[168],"provide":[170],"comprehensive":[172],"analysis":[173],"DDFL's":[175],"effectiveness":[176],"under":[180],"various":[181],"attack":[183],"scenarios.":[184,202],"Our":[185],"results":[186],"show":[187],"that":[188],"performs":[190],"better":[191],"removing":[193],"poisoners":[194],"compared":[195],"techniques":[199]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
