{"id":"https://openalex.org/W7084078536","doi":"https://doi.org/10.1109/icc52391.2025.11161880","title":"Deception-Based Defense Against Model Poisoning Attacks in Federated Learning Using Generative Adversarial Network (GAN)","display_name":"Deception-Based Defense Against Model Poisoning Attacks in Federated Learning Using Generative Adversarial Network (GAN)","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W7084078536","doi":"https://doi.org/10.1109/icc52391.2025.11161880"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11161880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Grace Colette Tessa Masse","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Grace Colette Tessa Masse","raw_affiliation_strings":["Avignon University,Laboratoire Informatique d&#x0027;Avignon,Avignon,France"],"affiliations":[{"raw_affiliation_string":"Avignon University,Laboratoire Informatique d&#x0027;Avignon,Avignon,France","institution_ids":["https://openalex.org/I4210119991"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Abderrahim Benslimane","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119991","display_name":"Laboratoire Informatique d'Avignon","ror":"https://ror.org/02n399288","country_code":"FR","type":"facility","lineage":["https://openalex.org/I198415970","https://openalex.org/I4210119991"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abderrahim Benslimane","raw_affiliation_strings":["Avignon University,Laboratoire Informatique d&#x0027;Avignon,Avignon,France"],"affiliations":[{"raw_affiliation_string":"Avignon University,Laboratoire Informatique d&#x0027;Avignon,Avignon,France","institution_ids":["https://openalex.org/I4210119991"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Vianney Kengne Tchendji","orcid":null},"institutions":[{"id":"https://openalex.org/I178331978","display_name":"Universit\u00e9 de Dschang","ror":"https://ror.org/0566t4z20","country_code":"CM","type":"education","lineage":["https://openalex.org/I178331978"]}],"countries":["CM"],"is_corresponding":false,"raw_author_name":"Vianney Kengne Tchendji","raw_affiliation_strings":["University of Dschang,Department of Mathematics and Computer Science,Dschang,Cameroon"],"affiliations":[{"raw_affiliation_string":"University of Dschang,Department of Mathematics and Computer Science,Dschang,Cameroon","institution_ids":["https://openalex.org/I178331978"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ahmed H. Anwar Hemida","orcid":null},"institutions":[{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]},{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed H. Anwar Hemida","raw_affiliation_strings":["DEVCOM Army Research Laboratory,Adelphi,MD,USA"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Laboratory,Adelphi,MD,USA","institution_ids":["https://openalex.org/I166416128","https://openalex.org/I2802705668"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhou Su","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Su","raw_affiliation_strings":["Xi&#x0027;an Jiaotong University,China"],"affiliations":[{"raw_affiliation_string":"Xi&#x0027;an Jiaotong University,China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":null,"display_name":"Shuai Han","orcid":null},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Han","raw_affiliation_strings":["Harbin Institute of Technology,China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology,China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210119991"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.62009793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4933","last_page":"4938"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10194","display_name":"Nonlinear Partial Differential Equations","score":0.46869999170303345,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10194","display_name":"Nonlinear Partial Differential Equations","score":0.46869999170303345,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12589","display_name":"Differential Equations and Boundary Problems","score":0.3440000116825104,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11110","display_name":"Stability and Controllability of Differential Equations","score":0.048700001090765,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7742999792098999},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.555899977684021},{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.48669999837875366},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.43299999833106995},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.41600000858306885},{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.4106000065803528},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3824999928474426},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.37720000743865967},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.3763999938964844}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7896999716758728},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7742999792098999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6977999806404114},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.555899977684021},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.48669999837875366},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.43299999833106995},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.41600000858306885},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.4106000065803528},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39419999718666077},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.37720000743865967},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3763999938964844},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.36090001463890076},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3522000014781952},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3264000117778778},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.32589998841285706},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3197000026702881},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.30090001225471497},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29249998927116394},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.2827000021934509},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.2750999927520752},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.26489999890327454},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.2639999985694885}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11161880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.44118088483810425}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,176],"Federated":[1],"Learning":[2],"paradigm":[3],"enables":[4],"multiple":[5],"clients":[6,45,109],"to":[7,50,92,120,146,166],"collaborate":[8],"on":[9,76,126],"training":[10],"a":[11,127,137,156,182,228],"machine":[12],"learning":[13],"model":[14,37,66,199,211],"while":[15,185,212],"maintaining":[16],"their":[17,96],"data":[18],"decentralized.":[19],"Although":[20],"this":[21,223],"approach":[22,81,164],"enhances":[23],"privacy":[24],"and":[25,71,94,168,205,230],"security,":[26],"it":[27],"also":[28],"introduces":[29],"vulnerabilities,":[30],"particularly":[31,41],"adversarial":[32,238],"attacks.":[33],"Among":[34],"these":[35],"threats,":[36],"poisoning":[38,200],"attacks":[39],"are":[40],"severe,":[42],"as":[43],"malicious":[44,78],"can":[46,110],"submit":[47],"harmful":[48],"updates":[49],"degrade":[51],"the":[52,55,83,100,104,113,151,160,172,179,186,196,203,209,220],"performance":[53],"of":[54,115,130,159,198,208,222],"global":[56,161,210],"model.":[57],"Existing":[58],"defense":[59,139,225],"mechanisms":[60],"mitigation":[61],"against":[62,237],"such":[63],"attacks,":[64,97,201],"including":[65],"analysis,":[67],"Byzantine":[68],"robust":[69],"aggregation,":[70],"verification-based":[72],"approaches,":[73],"primarily":[74],"focus":[75],"removing":[77],"clients.":[79],"This":[80,134,191],"informs":[82],"attackers":[84],"that":[85],"they":[86],"have":[87],"been":[88],"detected,":[89],"allowing":[90],"them":[91],"adapt":[93],"strengthen":[95],"which":[98],"reduces":[99,195],"defender's":[101],"control":[102],"over":[103],"system.":[105],"Furthermore,":[106],"revoking":[107],"certain":[108],"significantly":[111,194],"decrease":[112],"number":[114,129],"participants":[116,131],"in":[117],"FL":[118,152,235],"due":[119],"detection":[121],"errors.":[122],"FL,":[123],"however,":[124],"relies":[125],"large":[128],"by":[132],"definition.":[133],"paper":[135],"proposes":[136],"novel":[138],"mechanism":[140],"using":[141],"Generative":[142],"Adversarial":[143],"Networks":[144],"(GANs)":[145],"introduce":[147],"cyber":[148],"deception":[149,192],"into":[150],"framework.":[153],"By":[154],"creating":[155],"synthetic":[157],"version":[158],"model,":[162,184],"our":[163],"aims":[165],"mislead":[167],"divert":[169],"attackers,":[170],"protecting":[171],"genuine":[173],"model's":[174],"integrity.":[175],"generator":[177],"within":[178],"GAN":[180],"produces":[181],"counterfeit":[183],"discriminator":[187],"assesses":[188],"its":[189],"authenticity.":[190],"strategy":[193],"impact":[197],"preserving":[202],"accuracy":[204],"convergence":[206],"rate":[207],"depleting":[213],"attackers'":[214],"resources.":[215],"Our":[216],"experimental":[217],"simulations":[218],"demonstrate":[219],"effectiveness":[221],"GAN-based":[224],"mechanism,":[226],"providing":[227],"proactive":[229],"resilient":[231],"solution":[232],"for":[233],"enhancing":[234],"security":[236],"threats.":[239]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
