{"id":"https://openalex.org/W4390190111","doi":"https://doi.org/10.1109/milcom58377.2023.10356384","title":"Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution","display_name":"Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4390190111","doi":"https://doi.org/10.1109/milcom58377.2023.10356384"},"language":"en","primary_location":{"id":"doi:10.1109/milcom58377.2023.10356384","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom58377.2023.10356384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089570143","display_name":"Yalin E. Sagduyu","orcid":"https://orcid.org/0000-0003-1576-5527"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yalin E. Sagduyu","raw_affiliation_strings":["National Security Institute,Virginia Tech,Arlington,VA","Virginia Tech, National Security Institute, Arlington, VA"],"affiliations":[{"raw_affiliation_string":"National Security Institute,Virginia Tech,Arlington,VA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Virginia Tech, National Security Institute, Arlington, VA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024995674","display_name":"Tugba Erpek","orcid":"https://orcid.org/0000-0003-0168-2587"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tugba Erpek","raw_affiliation_strings":["National Security Institute,Virginia Tech,Arlington,VA","Virginia Tech, National Security Institute, Arlington, VA"],"affiliations":[{"raw_affiliation_string":"National Security Institute,Virginia Tech,Arlington,VA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Virginia Tech, National Security Institute, Arlington, VA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054863127","display_name":"Yi Shi","orcid":"https://orcid.org/0000-0002-6110-3084"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yi Shi","raw_affiliation_strings":["Commonwealth Cyber Initiative,Virginia Tech,Arlington,VA","Virginia Tech, Commonwealth Cyber Initiative, Arlington, VA"],"affiliations":[{"raw_affiliation_string":"Commonwealth Cyber Initiative,Virginia Tech,Arlington,VA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Virginia Tech, Commonwealth Cyber Initiative, Arlington, VA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089570143"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.3491,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67583968,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"815","last_page":"820"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.749443531036377},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.705390989780426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6969107389450073},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.622606098651886},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5406398773193359},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4937923848628998},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.4914456605911255},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4796184003353119},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4277094900608063},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24065348505973816},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17316091060638428},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.13085344433784485}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.749443531036377},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.705390989780426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6969107389450073},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.622606098651886},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5406398773193359},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4937923848628998},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.4914456605911255},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4796184003353119},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4277094900608063},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24065348505973816},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17316091060638428},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.13085344433784485},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C155202549","wikidata":"https://www.wikidata.org/wiki/Q178803","display_name":"International trade","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom58377.2023.10356384","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom58377.2023.10356384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2132814903","https://openalex.org/W2963819344","https://openalex.org/W2964277700","https://openalex.org/W2971480956","https://openalex.org/W2983729222","https://openalex.org/W2986517689","https://openalex.org/W3025412407","https://openalex.org/W3025606635","https://openalex.org/W3043758338","https://openalex.org/W3090615085","https://openalex.org/W3097974940","https://openalex.org/W3119680904","https://openalex.org/W3173537849","https://openalex.org/W3195387997","https://openalex.org/W3200528697","https://openalex.org/W3203789000","https://openalex.org/W4206541522","https://openalex.org/W4226087368","https://openalex.org/W4283208496","https://openalex.org/W4295308277","https://openalex.org/W4309375394","https://openalex.org/W4315777552","https://openalex.org/W4320031173","https://openalex.org/W4386249775","https://openalex.org/W6728757088"],"related_works":["https://openalex.org/W3121667336","https://openalex.org/W2492640494","https://openalex.org/W4379054516","https://openalex.org/W4312141693","https://openalex.org/W1536009559","https://openalex.org/W2103821767","https://openalex.org/W1969185016","https://openalex.org/W2037619003","https://openalex.org/W2111030377","https://openalex.org/W1965856819"],"abstract_inverted_index":{"This":[0],"paper":[1,106],"studies":[2],"the":[3,17,37,51,71,77,81,86,112,123,133,145,155,163,175,197,205],"poisoning":[4,80,137,193],"attack":[5,156],"and":[6,136,147,152,157,202],"defense":[7,100,158],"interactions":[8,125],"in":[9,16,66,104,119,204],"a":[10,33,98,129],"federated":[11],"learning":[12,25,69],"(FL)":[13],"system,":[14,70],"specifically":[15],"context":[18,206],"of":[19,73,79,116,178,199,207],"wireless":[20],"signal":[21],"classification":[22],"using":[23],"deep":[24],"for":[26,39,58,150],"next-generation":[27],"(NextG)":[28],"communications.":[29,209],"FL":[30,120,190],"collectively":[31],"trains":[32],"global":[34,53,87],"model":[35,54,88,92],"without":[36],"need":[38],"clients":[40,75,117],"to":[41,84,107],"exchange":[42],"their":[43],"data":[44,83],"samples.":[45],"By":[46],"leveraging":[47],"geographically":[48],"dispersed":[49],"clients,":[50],"trained":[52],"can":[55,169],"be":[56],"used":[57],"incumbent":[59],"user":[60],"identification,":[61],"facilitating":[62],"spectrum":[63],"sharing.":[64],"However,":[65],"this":[67,96,105],"distributed":[68],"presence":[72],"malicious":[74],"introduces":[76],"risk":[78],"training":[82],"manipulate":[85],"through":[89],"falsified":[90],"local":[91],"exchanges.":[93],"To":[94],"address":[95],"challenge,":[97],"proactive":[99],"mechanism":[101],"is":[102],"employed":[103],"make":[108],"informed":[109],"decisions":[110],"regarding":[111],"admission":[113,135],"or":[114],"rejection":[115],"participating":[118],"systems.":[121],"Consequently,":[122],"attack-defense":[124],"are":[126,142,160],"modeled":[127],"as":[128],"game,":[130],"centered":[131],"around":[132],"underlying":[134],"decisions.":[138],"First,":[139],"performance":[140,173,198],"bounds":[141],"established,":[143],"encompassing":[144],"best":[146],"worst":[148],"strategies":[149,177],"attackers":[151],"defenders.":[153],"Subsequently,":[154],"utilities":[159],"characterized":[161],"within":[162],"Nash":[164],"equilibrium,":[165],"where":[166],"no":[167],"player":[168],"unilaterally":[170],"improve":[171],"its":[172],"given":[174],"fixed":[176],"others.":[179],"The":[180],"results":[181],"offer":[182],"insights":[183],"into":[184],"novel":[185],"operational":[186],"modes":[187],"that":[188],"safeguard":[189],"systems":[191],"against":[192],"attacks":[194,201],"by":[195],"quantifying":[196],"both":[200],"defenses":[203],"NextG":[208]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
