{"id":"https://openalex.org/W4400187745","doi":"https://doi.org/10.1109/tdsc.2024.3419211","title":"FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning","display_name":"FedPA: Generator-Based Heterogeneous Federated Prototype Adversarial Learning","publication_year":2024,"publication_date":"2024-07-01","ids":{"openalex":"https://openalex.org/W4400187745","doi":"https://doi.org/10.1109/tdsc.2024.3419211"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3419211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3419211","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101541295","display_name":"Lei Jiang","orcid":"https://orcid.org/0000-0002-7790-1021"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Jiang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101888309","display_name":"Xiaoding Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoding Wang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101590509","display_name":"Xu Yang","orcid":"https://orcid.org/0000-0003-2735-2359"},"institutions":[{"id":"https://openalex.org/I354108","display_name":"Minjiang University","ror":"https://ror.org/00s7tkw17","country_code":"CN","type":"education","lineage":["https://openalex.org/I354108"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Yang","raw_affiliation_strings":["College of Computer and Data Science, Minjiang University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Minjiang University, Fuzhou, China","institution_ids":["https://openalex.org/I354108"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101740783","display_name":"Jiwu Shu","orcid":"https://orcid.org/0000-0002-7362-2789"},"institutions":[{"id":"https://openalex.org/I354108","display_name":"Minjiang University","ror":"https://ror.org/00s7tkw17","country_code":"CN","type":"education","lineage":["https://openalex.org/I354108"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Shu","raw_affiliation_strings":["College of Computer and Data Science, Minjiang University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Minjiang University, Fuzhou, China","institution_ids":["https://openalex.org/I354108"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037848927","display_name":"Hui Lin","orcid":"https://orcid.org/0000-0003-1716-1399"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100709723","display_name":"Xun Yi","orcid":"https://orcid.org/0000-0001-7351-5724"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xun Yi","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","School of Computing Technologies, RMIT University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]},{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, Australia","institution_ids":["https://openalex.org/I82951845"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101541295"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":1.8185,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86978533,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"22","issue":"2","first_page":"939","last_page":"949"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.812358021736145},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.7289778590202332},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7002754211425781},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4347286820411682},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.4086470603942871},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3210434913635254},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.10975697636604309},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.05239883065223694}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.812358021736145},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.7289778590202332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7002754211425781},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4347286820411682},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.4086470603942871},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3210434913635254},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.10975697636604309},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.05239883065223694},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3419211","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3419211","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2104094955","https://openalex.org/W2131953535","https://openalex.org/W2963306805","https://openalex.org/W3021654819","https://openalex.org/W3133814152","https://openalex.org/W3182158470","https://openalex.org/W4226101686","https://openalex.org/W4283796083","https://openalex.org/W4312551160","https://openalex.org/W4382239439","https://openalex.org/W6638523607","https://openalex.org/W6728757088","https://openalex.org/W6752029299","https://openalex.org/W6759238902","https://openalex.org/W6767676916","https://openalex.org/W6770046221","https://openalex.org/W6770590064","https://openalex.org/W6772318479","https://openalex.org/W6773520829","https://openalex.org/W6773817997","https://openalex.org/W6779499942","https://openalex.org/W6780224944","https://openalex.org/W6781318954","https://openalex.org/W6789100154","https://openalex.org/W6796484261","https://openalex.org/W6798692760","https://openalex.org/W6809453916","https://openalex.org/W6840391442","https://openalex.org/W6849023765"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Federated":[0,115],"Learning":[1,118],"is":[2,8],"an":[3,157],"emerging":[4],"distributed":[5],"algorithm":[6],"that":[7,86,168,180],"designed":[9,139],"to":[10,28,43,66,129,140,151,176],"collaboratively":[11],"train":[12],"the":[13,63,70,95,133,153],"global":[14],"model":[15,32,38,52,163,185],"without":[16],"accessing":[17],"clients\u2019":[18],"private":[19],"data.":[20,81],"However,":[21],"heterogeneity":[22],"of":[23,62,77,132],"data":[24,101],"among":[25],"clients":[26],"leads":[27],"significant":[29],"degradation":[30],"in":[31,156],"performance.":[33,53,164],"Some":[34],"studies":[35],"suggest":[36],"adopting":[37],"regularization":[39,68,131],"and":[40,73,94,126,147],"using":[41],"generators":[42,87,128,137],"enrich":[44],"datasets":[45],"with":[46,91],"diverse":[47],"features":[48,142,155],"can":[49,102,182],"effectively":[50,183],"enhance":[51],"But":[54],"current":[55],"research":[56],"focuses":[57],"on":[58],"regularizing":[59],"specific":[60],"modules":[61],"model,":[64,72],"failing":[65],"achieve":[67,130],"across":[69],"entire":[71,134],"offering":[74],"limited":[75],"mitigation":[76],"bias":[78],"from":[79],"heterogeneous":[80,114],"Moreover,":[82],"few":[83],"methods":[84],"consider":[85],"often":[88],"produce":[89],"samples":[90],"simple":[92],"features,":[93],"direct":[96],"use":[97,148],"for":[98],"generating":[99],"raw":[100,145],"raise":[103],"privacy":[104],"concerns.":[105],"To":[106],"solve":[107],"these":[108],"challenges,":[109],"we":[110],"propose":[111],"a":[112],"generator-based":[113],"Prototype":[116],"Adversarial":[117],"framework,":[119],"named":[120],"FedPA,":[121],"which":[122],"combines":[123],"prototype":[124,149],"learning":[125,150,159],"lightweight":[127],"model.":[135],"Our":[136],"are":[138],"generate":[141],"rather":[143],"than":[144],"data,":[146],"find":[152],"hard":[154],"adversarial":[158],"manner,":[160],"thereby":[161],"improving":[162],"Experimental":[165],"results":[166],"show":[167],"FedPA":[169,181],"improves":[170],"test":[171],"accuracy":[172],"by":[173],"3.7%":[174],"compared":[175],"state-of-the-art":[177],"methods,":[178],"validating":[179],"mitigate":[184],"bias.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
