{"id":"https://openalex.org/W7117877345","doi":"https://doi.org/10.1109/milcom64451.2025.11310452","title":"Targeted Attacks and Defenses for Distributed Federated Learning in Vehicular Networks","display_name":"Targeted Attacks and Defenses for Distributed Federated Learning in Vehicular Networks","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W7117877345","doi":"https://doi.org/10.1109/milcom64451.2025.11310452"},"language":null,"primary_location":{"id":"doi:10.1109/milcom64451.2025.11310452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038931213","display_name":"Utku Demir","orcid":"https://orcid.org/0000-0001-8410-4912"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Utku Demir","raw_affiliation_strings":["Nexcepta Inc.,Gaithersburg,MD,USA"],"affiliations":[{"raw_affiliation_string":"Nexcepta Inc.,Gaithersburg,MD,USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024995674","display_name":"Tugba Erpek","orcid":"https://orcid.org/0000-0003-0168-2587"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tugba Erpek","raw_affiliation_strings":["Nexcepta Inc.,Gaithersburg,MD,USA"],"affiliations":[{"raw_affiliation_string":"Nexcepta Inc.,Gaithersburg,MD,USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121466541","display_name":"Yalin Sagduyu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yalin E. Sagduyu","raw_affiliation_strings":["Nexcepta Inc.,Gaithersburg,MD,USA"],"affiliations":[{"raw_affiliation_string":"Nexcepta Inc.,Gaithersburg,MD,USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007158362","display_name":"Sastry Kompella","orcid":"https://orcid.org/0000-0001-7696-6213"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sastry Kompella","raw_affiliation_strings":["Nexcepta Inc.,Gaithersburg,MD,USA"],"affiliations":[{"raw_affiliation_string":"Nexcepta Inc.,Gaithersburg,MD,USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121747682","display_name":"Mengran Xue","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128697","display_name":"Buckingham Browne & Nichols","ror":"https://ror.org/030p1h383","country_code":"US","type":"education","lineage":["https://openalex.org/I4210128697"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mengran Xue","raw_affiliation_strings":["RTX BBN Technologies,Cambridge,MA,USA"],"affiliations":[{"raw_affiliation_string":"RTX BBN Technologies,Cambridge,MA,USA","institution_ids":["https://openalex.org/I4210128697"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038931213"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8202567,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"962","last_page":"967"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.47510001063346863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.47510001063346863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2694000005722046,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.06210000067949295,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.758400022983551},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5335999727249146},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4846999943256378},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.45010000467300415},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4205999970436096},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.39089998602867126},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.3725999891757965},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3555000126361847},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3497999906539917}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.758400022983551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7480000257492065},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5335999727249146},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4846999943256378},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.45010000467300415},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39089998602867126},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3725999891757965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37229999899864197},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3555000126361847},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3497999906539917},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32359999418258667},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3199999928474426},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3082999885082245},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3052999973297119},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2971000075340271},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.27410000562667847},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2612000107765198},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26019999384880066},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.25780001282691956}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom64451.2025.11310452","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11310452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5032653212547302}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2995240473","https://openalex.org/W3045657906","https://openalex.org/W3101755493","https://openalex.org/W3171142246","https://openalex.org/W4206552422","https://openalex.org/W4226087368","https://openalex.org/W4315777552","https://openalex.org/W4363648952","https://openalex.org/W4366147513","https://openalex.org/W4366250585","https://openalex.org/W4378469872","https://openalex.org/W4385192312","https://openalex.org/W4385235873","https://openalex.org/W4385800918","https://openalex.org/W4386249775","https://openalex.org/W4388200888","https://openalex.org/W4390190111","https://openalex.org/W4405304342","https://openalex.org/W4406266590","https://openalex.org/W4409683106","https://openalex.org/W4411675349"],"related_works":[],"abstract_inverted_index":{"In":[0,147],"emerging":[1,164,194],"networked":[2],"systems,":[3],"mobile":[4],"edge":[5],"devices":[6],"such":[7,28,177],"as":[8,29],"ground":[9],"vehicles":[10],"and":[11,35,40,50,101,130,144,157,161,183],"unmanned":[12],"aerial":[13],"system":[14],"(UAS)":[15],"swarms":[16],"collectively":[17],"aggregate":[18],"vast":[19],"amounts":[20],"of":[21,66],"data":[22,155],"to":[23,56,84,107,125,141,180,188],"make":[24],"machine":[25],"learning":[26,45,90,120,128,182],"decisions":[27],"threat":[30],"detection":[31],"in":[32,88,166],"remote,":[33],"dynamic,":[34],"infrastructure-constrained":[36],"environments":[37],"where":[38],"power":[39],"bandwidth":[41],"are":[42],"scarce.":[43],"Federated":[44],"(FL)":[46],"addresses":[47],"these":[48,136],"constraints":[49],"privacy":[51],"concerns":[52],"by":[53],"enabling":[54],"nodes":[55],"share":[57],"local":[58],"model":[59,86],"weights":[60],"for":[61],"deep":[62],"neural":[63],"networks":[64],"instead":[65],"raw":[67],"data,":[68],"facilitating":[69],"more":[70,131],"reliable":[71],"decision-making":[72],"than":[73],"individual":[74,181],"learning.":[75],"However,":[76],"conventional":[77],"FL":[78],"relies":[79],"on":[80,97,114],"a":[81,115,167],"central":[82,99,116],"server":[83],"coordinate":[85],"updates":[87],"each":[89],"round,":[91],"which":[92],"imposes":[93],"significant":[94],"computational":[95],"burdens":[96],"the":[98,108,163,193],"node":[100,126],"may":[102],"not":[103],"be":[104],"feasible":[105],"due":[106],"connectivity":[109],"constraints.":[110],"By":[111],"eliminating":[112],"dependence":[113],"server,":[117],"distributed":[118],"federated":[119],"(DFL)":[121],"offers":[122],"scalability,":[123],"resilience":[124,175],"failures,":[127],"robustness,":[129],"effective":[132,185],"defense":[133,186],"strategies.":[134],"Despite":[135],"advantages,":[137],"DFL":[138,173,191],"remains":[139],"vulnerable":[140],"increasingly":[142],"advanced":[143],"stealthy":[145],"cyberattacks.":[146],"this":[148],"paper,":[149],"we":[150],"design":[151],"sophisticated":[152],"targeted":[153],"training":[154],"poisoning":[156],"backdoor":[158],"(Trojan)":[159],"attacks,":[160],"characterize":[162],"vulnerabilities":[165],"vehicular":[168],"network.":[169],"We":[170],"analyze":[171],"how":[172],"provides":[174],"against":[176,192],"attacks":[178],"compared":[179],"present":[184],"mechanisms":[187],"further":[189],"strengthen":[190],"cyber":[195],"threats.":[196]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-01T00:00:00"}
