{"id":"https://openalex.org/W4413822613","doi":"https://doi.org/10.1109/icccn65249.2025.11134006","title":"Byzantine-Robust Federated Learning","display_name":"Byzantine-Robust Federated Learning","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413822613","doi":"https://doi.org/10.1109/icccn65249.2025.11134006"},"language":"en","primary_location":{"id":"doi:10.1109/icccn65249.2025.11134006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn65249.2025.11134006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090431203","display_name":"Zheyuan Liu","orcid":"https://orcid.org/0000-0002-3243-3922"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zheyuan Liu","raw_affiliation_strings":["University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716"],"affiliations":[{"raw_affiliation_string":"University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011896992","display_name":"Qian Guo","orcid":"https://orcid.org/0000-0003-0930-3174"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qian Guo","raw_affiliation_strings":["University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716"],"affiliations":[{"raw_affiliation_string":"University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052980369","display_name":"Yidan Hu","orcid":"https://orcid.org/0000-0002-9443-8411"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yidan Hu","raw_affiliation_strings":["Rochester Institute of Technology,Department of Computing Security,Rochester,NY,USA,14623"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology,Department of Computing Security,Rochester,NY,USA,14623","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053330262","display_name":"Aisha Aseeri","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Aisha Aseeri","raw_affiliation_strings":["King Abdulaziz University,Department of Information Technology,Jeddah,Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Abdulaziz University,Department of Information Technology,Jeddah,Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101727014","display_name":"Depeng Li","orcid":"https://orcid.org/0000-0002-7072-0201"},"institutions":[{"id":"https://openalex.org/I117965899","display_name":"University of Hawai\u02bbi at M\u0101noa","ror":"https://ror.org/01wspgy28","country_code":"US","type":"education","lineage":["https://openalex.org/I117965899"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Depeng Li","raw_affiliation_strings":["University of Hawaii at Manoa,Department of Information and Computer Sciences,Honolulu,HI,USA,96822"],"affiliations":[{"raw_affiliation_string":"University of Hawaii at Manoa,Department of Information and Computer Sciences,Honolulu,HI,USA,96822","institution_ids":["https://openalex.org/I117965899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100421929","display_name":"Rui Zhang","orcid":"https://orcid.org/0000-0001-5230-5998"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716"],"affiliations":[{"raw_affiliation_string":"University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716","institution_ids":["https://openalex.org/I86501945"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5090431203"],"corresponding_institution_ids":["https://openalex.org/I86501945"],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92604935,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/byzantine-architecture","display_name":"Byzantine architecture","score":0.7940124273300171},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7052619457244873},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.6117023229598999},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3666054606437683},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.1612597405910492},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.07869699597358704},{"id":"https://openalex.org/keywords/ancient-history","display_name":"Ancient history","score":0.06001743674278259}],"concepts":[{"id":"https://openalex.org/C104562893","wikidata":"https://www.wikidata.org/wiki/Q47591","display_name":"Byzantine architecture","level":2,"score":0.7940124273300171},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7052619457244873},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.6117023229598999},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3666054606437683},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.1612597405910492},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.07869699597358704},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.06001743674278259},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn65249.2025.11134006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn65249.2025.11134006","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1968817125","https://openalex.org/W2098370488","https://openalex.org/W2152498377","https://openalex.org/W2892160417","https://openalex.org/W2962763344","https://openalex.org/W2964043980","https://openalex.org/W2984488829","https://openalex.org/W3006921589","https://openalex.org/W3086809868","https://openalex.org/W3087391814","https://openalex.org/W3127520698","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W4252654521"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W635625959","https://openalex.org/W1548189724","https://openalex.org/W4242769984","https://openalex.org/W2034320198","https://openalex.org/W1985305288","https://openalex.org/W4252331942","https://openalex.org/W4386477301"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"is":[3,41,79,202],"a":[4,80,86,103,108,132,172],"transformative":[5],"paradigm":[6],"for":[7,32,205],"training":[8,144],"global":[9,60,149],"machine":[10],"learning":[11,216],"models":[12],"using":[13],"decentralized":[14],"datasets":[15,182],"hosted":[16],"by":[17],"edge":[18],"or":[19],"client":[20,123],"devices,":[21],"without":[22],"requiring":[23],"centralized":[24],"data":[25],"aggregation.":[26],"This":[27,83,151],"makes":[28],"FL":[29,40,89],"particularly":[30,203],"valuable":[31],"privacy-sensitive":[33],"applications":[34],"deployed":[35],"in":[36,67,96,168,189],"edge-cloud":[37,71,97,206],"environments.":[38],"However,":[39],"vulnerable":[42],"to":[43,54,92,118,146],"Byzantine":[44,198],"attacks,":[45],"where":[46,73],"malicious":[47,176],"clients":[48,78],"provide":[49],"falsified":[50],"local":[51],"model":[52,192],"updates":[53,141],"compromise":[55],"the":[56,59,120,143,148,158,161,169,184,219],"performance":[57],"of":[58,116,122,135,160,171,175,186,221],"model.":[61,150],"Such":[62],"vulnerabilities":[63],"are":[64],"especially":[65],"problematic":[66],"heterogeneous":[68],"and":[69,194,218],"resource-constrained":[70],"systems,":[72],"ensuring":[74,165],"trust":[75,117,153],"across":[76],"distributed":[77,215],"significant":[81,173],"challenge.":[82],"paper":[84],"introduces":[85],"novel":[87],"Byzantine-Robust":[88],"method":[90,101,129,201],"designed":[91],"address":[93],"these":[94],"challenges":[95,210],"computing":[98],"scenarios.":[99],"Our":[100,200],"leverages":[102],"central":[104],"server":[105],"equipped":[106],"with":[107],"small":[109],"clean":[110,163],"dataset":[111],"as":[112,212],"an":[113],"initial":[114,162],"root":[115],"evaluate":[119],"trustworthiness":[121],"updates.":[124],"Unlike":[125],"prior":[126],"approaches,":[127],"our":[128,187],"iteratively":[130],"builds":[131],"dynamic":[133,152],"set":[134],"trusted":[136],"clients,":[137],"gradually":[138],"incorporating":[139],"their":[140],"into":[142],"process":[145],"refine":[147],"mechanism":[154],"reduces":[155],"reliance":[156],"on":[157,180],"quality":[159],"dataset,":[164],"robustness":[166,196],"even":[167],"presence":[170],"number":[174],"clients.":[177],"Extensive":[178],"experiments":[179],"real-world":[181],"demonstrate":[183],"effectiveness":[185],"approach":[188],"achieving":[190],"high":[191],"accuracy":[193],"maintaining":[195],"against":[197],"attacks.":[199],"well-suited":[204],"environments,":[207],"addressing":[208],"critical":[209],"such":[211],"resource":[213],"constraints,":[214],"management,":[217],"reliability":[220],"collaborative":[222],"AI":[223],"systems.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
