{"id":"https://openalex.org/W4200441560","doi":"https://doi.org/10.1109/iscc53001.2021.9631506","title":"FLPhish: Reputation-based Phishing Byzantine Defense in Ensemble Federated Learning","display_name":"FLPhish: Reputation-based Phishing Byzantine Defense in Ensemble Federated Learning","publication_year":2021,"publication_date":"2021-09-05","ids":{"openalex":"https://openalex.org/W4200441560","doi":"https://doi.org/10.1109/iscc53001.2021.9631506"},"language":"en","primary_location":{"id":"doi:10.1109/iscc53001.2021.9631506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631506","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100423730","display_name":"Beibei Li","orcid":"https://orcid.org/0000-0002-0485-1975"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I64852412","display_name":"Sichuan University of Science and Engineering","ror":"https://ror.org/053fzma23","country_code":"CN","type":"education","lineage":["https://openalex.org/I64852412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Beibei Li","raw_affiliation_strings":["Sichuan University,School of Cyber Science and Engineering,China","School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"Sichuan University,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I64852412"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102749927","display_name":"Peiran Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I64852412","display_name":"Sichuan University of Science and Engineering","ror":"https://ror.org/053fzma23","country_code":"CN","type":"education","lineage":["https://openalex.org/I64852412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiran Wang","raw_affiliation_strings":["Sichuan University,School of Cyber Science and Engineering,China","School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"Sichuan University,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I64852412"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106223300","display_name":"Hanyuan Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I64852412","display_name":"Sichuan University of Science and Engineering","ror":"https://ror.org/053fzma23","country_code":"CN","type":"education","lineage":["https://openalex.org/I64852412"]},{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanyuan Huang","raw_affiliation_strings":["Sichuan University,School of Cyber Science and Engineering,China","School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"Sichuan University,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I64852412"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038782350","display_name":"Shang Ma","orcid":"https://orcid.org/0000-0001-8119-0851"},"institutions":[{"id":"https://openalex.org/I64852412","display_name":"Sichuan University of Science and Engineering","ror":"https://ror.org/053fzma23","country_code":"CN","type":"education","lineage":["https://openalex.org/I64852412"]},{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shang Ma","raw_affiliation_strings":["Sichuan University,School of Cyber Science and Engineering,China","School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"Sichuan University,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I64852412"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030771414","display_name":"Yukun Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I64852412","display_name":"Sichuan University of Science and Engineering","ror":"https://ror.org/053fzma23","country_code":"CN","type":"education","lineage":["https://openalex.org/I64852412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yukun Jiang","raw_affiliation_strings":["Sichuan University,School of Cyber Science and Engineering,China","School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"Sichuan University,School of Cyber Science and Engineering,China","institution_ids":["https://openalex.org/I64852412"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100423730"],"corresponding_institution_ids":["https://openalex.org/I24185976","https://openalex.org/I64852412"],"apc_list":null,"apc_paid":null,"fwci":0.2513,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.51187138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7534235715866089},{"id":"https://openalex.org/keywords/byzantine-architecture","display_name":"Byzantine architecture","score":0.7298058867454529},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.7285348176956177},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.7063474655151367},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.6753354668617249},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6348694562911987},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5902100801467896},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.5631226897239685},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4569026529788971},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4464621841907501},{"id":"https://openalex.org/keywords/quantum-byzantine-agreement","display_name":"Quantum Byzantine agreement","score":0.4308857321739197},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.41270720958709717},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3748689293861389},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3433713912963867},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.27008581161499023},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.24360358715057373},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22343960404396057}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7534235715866089},{"id":"https://openalex.org/C104562893","wikidata":"https://www.wikidata.org/wiki/Q47591","display_name":"Byzantine architecture","level":2,"score":0.7298058867454529},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.7285348176956177},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.7063474655151367},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.6753354668617249},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6348694562911987},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5902100801467896},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.5631226897239685},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4569026529788971},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4464621841907501},{"id":"https://openalex.org/C17532199","wikidata":"https://www.wikidata.org/wiki/Q17083590","display_name":"Quantum Byzantine agreement","level":4,"score":0.4308857321739197},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.41270720958709717},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3748689293861389},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3433713912963867},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27008581161499023},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.24360358715057373},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22343960404396057},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc53001.2021.9631506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631506","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4958677405","display_name":null,"funder_award_id":"62002248","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5520903213","display_name":null,"funder_award_id":"2019TQ0217,2020M673277","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7463024246","display_name":null,"funder_award_id":"2020YFB1805400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8770232319","display_name":null,"funder_award_id":"20ZDYF3145","funder_id":"https://openalex.org/F4320336596","funder_display_name":"Key Research and Development Program of Sichuan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320336596","display_name":"Key Research and Development Program of Sichuan Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2162552722","https://openalex.org/W2417282157","https://openalex.org/W2752689052","https://openalex.org/W2789911054","https://openalex.org/W2810065831","https://openalex.org/W2950447132","https://openalex.org/W2964261056","https://openalex.org/W3048715803","https://openalex.org/W3086579950","https://openalex.org/W3138597937","https://openalex.org/W3158003593","https://openalex.org/W4229903227","https://openalex.org/W6684011098","https://openalex.org/W6743821447","https://openalex.org/W6748786018","https://openalex.org/W6752600739","https://openalex.org/W6754358263","https://openalex.org/W6762462524","https://openalex.org/W6770634426"],"related_works":["https://openalex.org/W1698117324","https://openalex.org/W2292106967","https://openalex.org/W4290996430","https://openalex.org/W2109232026","https://openalex.org/W4210453042","https://openalex.org/W2997526278","https://openalex.org/W2775054947","https://openalex.org/W2146384899","https://openalex.org/W603186994","https://openalex.org/W2126087831"],"abstract_inverted_index":{"The":[0],"increasing":[1],"demand":[2],"for":[3,67],"privacy":[4],"protection":[5],"facilitates":[6],"growing":[7],"interests":[8],"in":[9,124,128],"Federated":[10,57],"Learning":[11,58],"(FL).":[12],"Nevertheless,":[13],"most":[14],"of":[15,96,102,109,119],"existing":[16],"FL":[17,42,53,69],"schemes":[18],"are":[19],"susceptible":[20],"to":[21,71,82],"malicious":[22,85],"participating":[23,86],"clients":[24,87,104],"compromised":[25,88],"by":[26,89,98],"Byzantine":[27,90,103,126],"attacks,":[28],"which":[29],"remains":[30],"a":[31,39,50,62,77],"challenging":[32],"issue.":[33],"In":[34],"this":[35],"paper,":[36],"we":[37,47],"propose":[38],"novel":[40],"Byzantine-robust":[41],"scheme,":[43],"coined":[44],"FLPhish.":[45],"Specifically,":[46],"first":[48],"design":[49],"ensemble":[51],"learning-based":[52],"architecture,":[54],"named":[55],"Ensemble":[56,129],"(Ensemble":[59],"FL).":[60],"Second,":[61],"phishing":[63],"mechanism":[64,79],"is":[65,80],"crafted":[66],"the":[68,94,110,116,120],"architecture":[70],"detect":[72],"abnormal":[73],"client":[74],"behaviors.":[75],"Third,":[76],"reputation":[78],"developed":[81],"further":[83],"identify":[84],"attackers.":[91],"We":[92],"evaluate":[93],"performance":[95],"FLPhish":[97,122],"considering":[99],"various":[100,106],"fractions":[101],"and":[105],"imbalance":[107],"degrees":[108],"data":[111],"distribution.":[112],"Extensive":[113],"experiments":[114],"demonstrate":[115],"high":[117],"effectiveness":[118],"proposed":[121],"scheme":[123],"resisting":[125],"attacks":[127],"FL.":[130]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
