{"id":"https://openalex.org/W3044509221","doi":"https://doi.org/10.1109/mnet.011.1900450","title":"Protecting Machine Learning Integrity in Distributed Big Data Networking","display_name":"Protecting Machine Learning Integrity in Distributed Big Data Networking","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3044509221","doi":"https://doi.org/10.1109/mnet.011.1900450","mag":"3044509221"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.011.1900450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.011.1900450","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066830962","display_name":"Yunkai Wei","orcid":"https://orcid.org/0000-0002-4895-2073"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunkai Wei","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012827589","display_name":"Yijin Chen","orcid":"https://orcid.org/0000-0002-4307-0346"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijin Chen","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101819605","display_name":"Mingyue Xiao","orcid":"https://orcid.org/0000-0002-6918-9732"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyue Xiao","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056311070","display_name":"Sabita Maharjan","orcid":"https://orcid.org/0000-0002-4616-8488"},"institutions":[{"id":"https://openalex.org/I184942183","display_name":"University of Oslo","ror":"https://ror.org/01xtthb56","country_code":"NO","type":"education","lineage":["https://openalex.org/I184942183"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Sabita Maharjan","raw_affiliation_strings":["University of Oslo, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"University of Oslo, Oslo, Norway","institution_ids":["https://openalex.org/I184942183"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100456327","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0002-8561-5092"},"institutions":[{"id":"https://openalex.org/I184942183","display_name":"University of Oslo","ror":"https://ror.org/01xtthb56","country_code":"NO","type":"education","lineage":["https://openalex.org/I184942183"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["University of Oslo, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"University of Oslo, Oslo, Norway","institution_ids":["https://openalex.org/I184942183"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5066830962"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.08056226,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"34","issue":"4","first_page":"84","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8785316944122314},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.7991378307342529},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6299922466278076},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5657786130905151},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5567131042480469},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4935098886489868},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.4727177023887634},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.45272305607795715},{"id":"https://openalex.org/keywords/distributed-learning","display_name":"Distributed learning","score":0.4462948739528656},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38958531618118286},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32979756593704224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3219652771949768},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2130269706249237}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8785316944122314},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.7991378307342529},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6299922466278076},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5657786130905151},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5567131042480469},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4935098886489868},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.4727177023887634},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.45272305607795715},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.4462948739528656},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38958531618118286},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32979756593704224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3219652771949768},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2130269706249237},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.011.1900450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.011.1900450","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2060393849","https://openalex.org/W2479004360","https://openalex.org/W2773446523","https://openalex.org/W2783155279","https://openalex.org/W2791319131","https://openalex.org/W2793925626","https://openalex.org/W2815313157","https://openalex.org/W2883922993","https://openalex.org/W2901380461","https://openalex.org/W2917715707","https://openalex.org/W2929545370","https://openalex.org/W2949471570","https://openalex.org/W2960833983","https://openalex.org/W2962788286","https://openalex.org/W2963103668","https://openalex.org/W2992054303","https://openalex.org/W4247200422"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W196724832","https://openalex.org/W2149511883","https://openalex.org/W2413243907","https://openalex.org/W216928377","https://openalex.org/W1987873680","https://openalex.org/W2097955059","https://openalex.org/W2884869850","https://openalex.org/W4200413214","https://openalex.org/W2036681117"],"abstract_inverted_index":{"A":[0],"distributed":[1,14,45,94],"big":[2,9,24,95],"data":[3,10,25,60,83,96],"network":[4,46,63],"is":[5],"the":[6,12,20,89,101,113,127,133,146],"integration":[7],"of":[8,77,103,120,135],"and":[11,81,107],"underlying":[13],"network.":[15],"This":[16],"emerging":[17],"paradigm":[18],"brings":[19],"potential":[21],"to":[22,130,140,152],"divide":[23],"processing":[26,121],"tasks":[27],"into":[28],"smaller":[29],"ones":[30],"so":[31],"that":[32,109],"they":[33,110],"can":[34,111],"be":[35],"intelligently":[36],"processed":[37],"in":[38,93],"parallel":[39],"with":[40],"machine":[41,56,90],"learning":[42,57,91,114],"based":[43],"on":[44],"resources.":[47],"Such":[48],"a":[49,73],"pattern":[50],"requires":[51],"strict":[52],"system":[53],"integrity,":[54],"especially":[55],"integrity":[58,92],"against":[59],"tampering":[61,84],"or":[62],"control":[64],"by":[65,150],"malicious":[66],"nodes.":[67],"In":[68],"this":[69],"article,":[70],"we":[71],"propose":[72],"secure":[74],"architecture":[75],"consisting":[76],"one":[78],"HaSi":[79],"scheme":[80],"two":[82],"detection":[85],"schemes":[86,138],"for":[87],"protecting":[88],"networking.":[97],"Illustrative":[98],"results":[99],"demonstrate":[100],"effect":[102],"our":[104,136],"proposed":[105,137],"schemes,":[106],"show":[108],"ensure":[112],"accuracy":[115,134],"even":[116],"when":[117],"30-40":[118],"percent":[119],"nodes":[122],"are":[123],"maliciously":[124],"controlled.":[125],"When":[126],"figure":[128],"raises":[129],"40-50":[131],"percent,":[132],"begins":[139],"fall":[141],"visibly,":[142],"but":[143],"still":[144],"outperforms":[145],"scenario":[147],"without":[148],"protection":[149],"up":[151],"70-80":[153],"percent.":[154]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
