{"id":"https://openalex.org/W7138836395","doi":"https://doi.org/10.1109/globecom59602.2025.11432772","title":"FedMRA: Defending Poisoning Attacks in Federated Learning Over Wireless Networks via Multimodal Feature Analysis and Reputation Aggregation","display_name":"FedMRA: Defending Poisoning Attacks in Federated Learning Over Wireless Networks via Multimodal Feature Analysis and Reputation Aggregation","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138836395","doi":"https://doi.org/10.1109/globecom59602.2025.11432772"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11432772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432772","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129974410","display_name":"Xuyuan Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuyuan Sun","raw_affiliation_strings":["Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067819530","display_name":"Lei Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Shi","raw_affiliation_strings":["Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103656398","display_name":"Li Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Wei","raw_affiliation_strings":["Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130131251","display_name":"Mengyang He","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengyang He","raw_affiliation_strings":["Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040192701","display_name":"Huijuan Lian","orcid":null},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huijuan Lian","raw_affiliation_strings":["Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou University,School of Cyber Science and Engineering,Zhengzhou,China","institution_ids":["https://openalex.org/I38877650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5129974410"],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88086577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"6057","last_page":"6062"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5637000203132629,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5637000203132629,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.07660000026226044,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.07410000264644623,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7753999829292297},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6887999773025513},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.6815999746322632},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5167999863624573},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.46219998598098755},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4620000123977661},{"id":"https://openalex.org/keywords/reputation-system","display_name":"Reputation system","score":0.3917999863624573},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.3792000114917755},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.3594000041484833}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8061000108718872},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7753999829292297},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6887999773025513},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.6815999746322632},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5167999863624573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5055999755859375},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.46219998598098755},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4620000123977661},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.3917999863624573},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3873000144958496},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3792000114917755},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3644999861717224},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3594000041484833},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34769999980926514},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.34450000524520874},{"id":"https://openalex.org/C2985362895","wikidata":"https://www.wikidata.org/wiki/Q478594","display_name":"Reputation management","level":3,"score":0.3427000045776367},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.30169999599456787},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.2612999975681305},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.25769999623298645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2517000138759613},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11432772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432772","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.697522759437561,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W3004591935","https://openalex.org/W3021654819","https://openalex.org/W3043758338","https://openalex.org/W3046449784","https://openalex.org/W3086809868","https://openalex.org/W3138597937","https://openalex.org/W3140854437","https://openalex.org/W4232896595","https://openalex.org/W4293155325","https://openalex.org/W4310145706","https://openalex.org/W4367397315","https://openalex.org/W4376149513","https://openalex.org/W4398243979","https://openalex.org/W4399531961","https://openalex.org/W4400076000","https://openalex.org/W4406047340","https://openalex.org/W4413680076"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"is":[3],"an":[4,50,73,130],"emerging":[5],"distributed":[6],"learning":[7],"framework":[8],"for":[9,136],"collaboratively":[10],"training":[11],"global":[12,126],"models":[13],"while":[14],"protecting":[15],"data":[16,31],"privacy.":[17],"However,":[18],"FL":[19],"faces":[20],"serious":[21],"threats":[22],"from":[23],"malicious":[24,84,112],"attacks":[25,97],"such":[26],"as":[27],"model":[28],"poisoning":[29],"and":[30,45,66,71,103,116,122,132,138,145],"poisoning.":[32],"To":[33],"address":[34],"these":[35],"challenges,":[36],"this":[37],"paper":[38],"proposes":[39],"FedMRA":[40,48,90,128],"(MRA:":[41],"Multimodal":[42],"feature":[43,57],"analysis":[44,65],"Reputation":[46],"Aggregation).":[47],"establishes":[49],"anomaly":[51],"detection":[52],"index":[53],"system":[54],"through":[55],"multimodal":[56],"extraction,":[58],"combines":[59],"HDBSCAN":[60],"clustering,":[61],"historical":[62],"trajectory":[63],"sparsification":[64],"dynamic":[67],"reputation":[68,78],"assessment":[69],"mechanism,":[70],"adopts":[72],"aggregation":[74],"strategy":[75],"based":[76],"on":[77],"weight":[79],"fusion":[80],"to":[81,110],"defend":[82],"against":[83,93],"client":[85],"damage.":[86],"Experiments":[87],"show":[88],"that":[89],"performs":[91,140],"well":[92,141],"multiple":[94],"types":[95],"of":[96,124],"(label":[98],"flipping":[99],"attack,":[100,102],"gaussian":[101],"random":[104],"gradient":[105],"attack),":[106],"especially":[107],"when":[108],"up":[109],"30%":[111],"clients":[113],"are":[114],"involved,":[115],"still":[117],"significantly":[118],"improves":[119],"the":[120,125],"robustness":[121],"accuracy":[123],"model.":[127],"provides":[129],"efficient":[131],"robust":[133],"defense":[134],"scheme":[135],"FL,":[137],"it":[139],"in":[142],"both":[143],"no-attack":[144],"attack":[146],"scenarios.":[147]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
