{"id":"https://openalex.org/W4386249764","doi":"https://doi.org/10.1109/infocomwkshps57453.2023.10225791","title":"Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems","display_name":"Avoid attacks: A Federated Data Sanitization Defense in IoMT Systems","publication_year":2023,"publication_date":"2023-05-20","ids":{"openalex":"https://openalex.org/W4386249764","doi":"https://doi.org/10.1109/infocomwkshps57453.2023.10225791"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps57453.2023.10225791","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps57453.2023.10225791","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100348801","display_name":"Chong Chen","orcid":"https://orcid.org/0000-0003-2800-4647"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chong Chen","raw_affiliation_strings":["School of Computer Science and Technology, South China University of Technology,Guangzhou,China","School of Computer Science and Technology, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, South China University of Technology,Guangzhou,China","institution_ids":["https://openalex.org/I90610280"]},{"raw_affiliation_string":"School of Computer Science and Technology, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101828088","display_name":"Ying Gao","orcid":"https://orcid.org/0000-0002-8925-8192"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Gao","raw_affiliation_strings":["School of Computer Science and Technology, South China University of Technology,Guangzhou,China","School of Computer Science and Technology, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, South China University of Technology,Guangzhou,China","institution_ids":["https://openalex.org/I90610280"]},{"raw_affiliation_string":"School of Computer Science and Technology, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076686948","display_name":"Siquan Huang","orcid":"https://orcid.org/0000-0003-0648-3405"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]},{"id":"https://openalex.org/I4210100255","display_name":"Beijing Academy of Artificial Intelligence","ror":"https://ror.org/016a74861","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210100255"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siquan Huang","raw_affiliation_strings":["School of Computer Science and Technology, South China University of Technology,Guangzhou,China","School of Computer Science and Technology, South China University of Technology, Guangzhou, China","Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, South China University of Technology,Guangzhou,China","institution_ids":["https://openalex.org/I90610280"]},{"raw_affiliation_string":"School of Computer Science and Technology, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application, China","institution_ids":["https://openalex.org/I4210100255"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032278260","display_name":"Xingfu Yan","orcid":"https://orcid.org/0000-0002-3026-0976"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingfu Yan","raw_affiliation_strings":["School of Computer Science, South China Normal University,Guangzhou,China","School of Computer Science, South China Normal University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University,Guangzhou,China","institution_ids":["https://openalex.org/I187400657"]},{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100348801"],"corresponding_institution_ids":["https://openalex.org/I90610280"],"apc_list":null,"apc_paid":null,"fwci":1.226,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83360837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8333296775817871},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6688424348831177},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5556113719940186},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5198374390602112},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5140529870986938},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4631025493144989},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45227983593940735},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.4391370415687561},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.42618468403816223},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.41346976161003113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3465151786804199},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2419673204421997},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1538156270980835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8333296775817871},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6688424348831177},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5556113719940186},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5198374390602112},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5140529870986938},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4631025493144989},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45227983593940735},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.4391370415687561},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.42618468403816223},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.41346976161003113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3465151786804199},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2419673204421997},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1538156270980835},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps57453.2023.10225791","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps57453.2023.10225791","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G8526955030","display_name":null,"funder_award_id":"52102400","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2112507308","https://openalex.org/W2194775991","https://openalex.org/W2752689052","https://openalex.org/W2789911054","https://openalex.org/W2799947440","https://openalex.org/W2804073516","https://openalex.org/W2810065831","https://openalex.org/W2886444620","https://openalex.org/W2912213068","https://openalex.org/W2949505878","https://openalex.org/W2949523979","https://openalex.org/W3004155269","https://openalex.org/W3155912831","https://openalex.org/W3159080474","https://openalex.org/W3172894974","https://openalex.org/W3177410622","https://openalex.org/W3213330817","https://openalex.org/W4210923679","https://openalex.org/W4226057940","https://openalex.org/W4230172274","https://openalex.org/W4285876308","https://openalex.org/W4298162257","https://openalex.org/W4300427714","https://openalex.org/W4318619660","https://openalex.org/W6640425456","https://openalex.org/W6676935882","https://openalex.org/W6728757088","https://openalex.org/W6738383168","https://openalex.org/W6743821447","https://openalex.org/W6748786018","https://openalex.org/W6752600739","https://openalex.org/W6756898242","https://openalex.org/W6763780468","https://openalex.org/W6779269186","https://openalex.org/W6791305734","https://openalex.org/W6797096170"],"related_works":["https://openalex.org/W1980381208","https://openalex.org/W4298221930","https://openalex.org/W2364594919","https://openalex.org/W2167092671","https://openalex.org/W1861706286","https://openalex.org/W2219338811","https://openalex.org/W2777914285","https://openalex.org/W2149583853","https://openalex.org/W4378677776","https://openalex.org/W4388282301"],"abstract_inverted_index":{"Malicious":[0],"falsification":[1],"of":[2,9,50,97,124],"medical":[3],"data":[4,32,37,53,69,98,106,130],"destroys":[5],"the":[6,10,43,51,56,76,85,94,105,120,125],"training":[7],"process":[8],"medical-aided":[11],"diagnosis":[12],"models":[13],"and":[14,99,122],"causes":[15],"serious":[16],"damage":[17],"to":[18,47,64,79,83,118],"Healthcare":[19],"IoMT":[20],"Systems.":[21],"To":[22],"solve":[23],"this":[24,27],"unsupervised":[25],"problem,":[26],"paper":[28],"finds":[29],"a":[30,109],"robust":[31],"filtering":[33],"method":[34,128],"for":[35],"various":[36],"poisoning":[38,131],"attacks.":[39,132],"First,":[40],"we":[41,74,103],"adapt":[42],"federated":[44,77,89],"learning":[45],"framework":[46],"project":[48],"all":[49],"clients'":[52],"features":[54,82],"into":[55],"public":[57],"subspace":[58],"domain,":[59],"allowing":[60],"unified":[61],"feature":[62],"mapping":[63],"be":[65],"established":[66],"while":[67],"their":[68,81],"remains":[70],"stored":[71],"locally.":[72],"Then":[73],"adopt":[75],"clustering":[78,90],"re-group":[80],"clarify":[84],"poisoned":[86],"data.":[87],"The":[88],"is":[91],"based":[92],"on":[93],"consistent":[95],"association":[96],"its":[100],"semantics.":[101],"Finally,":[102],"do":[104],"sanitization":[107],"with":[108],"simple":[110],"yet":[111],"efficient":[112],"strategy.":[113],"Extensive":[114],"experiments":[115],"are":[116],"conducted":[117],"evaluate":[119],"accuracy":[121],"efficacy":[123],"proposed":[126],"defense":[127],"against":[129]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
