{"id":"https://openalex.org/W4312996082","doi":"https://doi.org/10.1109/tifs.2022.3212174","title":"FLCert: Provably Secure Federated Learning Against Poisoning Attacks","display_name":"FLCert: Provably Secure Federated Learning Against Poisoning Attacks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312996082","doi":"https://doi.org/10.1109/tifs.2022.3212174"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3212174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3212174","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076945318","display_name":"Xiaoyu Cao","orcid":"https://orcid.org/0000-0002-8731-2706"},"institutions":[{"id":"https://openalex.org/I4210114444","display_name":"Meta (United States)","ror":"https://ror.org/01zbnvs85","country_code":"US","type":"company","lineage":["https://openalex.org/I4210114444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiaoyu Cao","raw_affiliation_strings":["Meta Platforms, Menlo Park, CA, USA"],"affiliations":[{"raw_affiliation_string":"Meta Platforms, Menlo Park, CA, USA","institution_ids":["https://openalex.org/I4210114444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063733770","display_name":"Zaixi Zhang","orcid":"https://orcid.org/0000-0002-0380-6558"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zaixi Zhang","raw_affiliation_strings":["School of Computer Science and Technology, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006298897","display_name":"Jinyuan Jia","orcid":"https://orcid.org/0000-0002-9785-7769"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinyuan Jia","raw_affiliation_strings":["Department of Computer Science, University of Illinois Urbana&#x2013;Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois Urbana&#x2013;Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009102659","display_name":"Neil Zhenqiang Gong","orcid":"https://orcid.org/0000-0002-9900-9309"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neil Zhenqiang Gong","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076945318"],"corresponding_institution_ids":["https://openalex.org/I4210114444"],"apc_list":null,"apc_paid":null,"fwci":10.0737,"has_fulltext":false,"cited_by_count":79,"citation_normalized_percentile":{"value":0.98486405,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"17","issue":null,"first_page":"3691","last_page":"3705"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9710999727249146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11860","display_name":"HIV, Drug Use, Sexual Risk","score":0.9476000070571899,"subfield":{"id":"https://openalex.org/subfields/2713","display_name":"Epidemiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8455674648284912},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.615618109703064},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.588272750377655},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5707594156265259},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.524685800075531},{"id":"https://openalex.org/keywords/disjoint-sets","display_name":"Disjoint sets","score":0.49855732917785645},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49761298298835754},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.46321186423301697},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.4427075684070587},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3478626608848572},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3388826251029968}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8455674648284912},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.615618109703064},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.588272750377655},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5707594156265259},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.524685800075531},{"id":"https://openalex.org/C45340560","wikidata":"https://www.wikidata.org/wiki/Q215382","display_name":"Disjoint sets","level":2,"score":0.49855732917785645},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49761298298835754},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.46321186423301697},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.4427075684070587},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3478626608848572},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3388826251029968},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3212174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3212174","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions"},{"id":"https://metadata.un.org/sdg/10","score":0.46000000834465027,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G2996144953","display_name":null,"funder_award_id":"W911NF2110182","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G6117838619","display_name":null,"funder_award_id":"1937786","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G652313190","display_name":null,"funder_award_id":"2125977","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G777550411","display_name":null,"funder_award_id":"2131859","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8377316191","display_name":null,"funder_award_id":"2112562","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2137591261","https://openalex.org/W2194775991","https://openalex.org/W2535838896","https://openalex.org/W2541884796","https://openalex.org/W2807363941","https://openalex.org/W2995022099","https://openalex.org/W3012737746","https://openalex.org/W3048759177","https://openalex.org/W3087391814","https://openalex.org/W3118608800","https://openalex.org/W3127520698","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3163222347","https://openalex.org/W3171412022","https://openalex.org/W3173035617","https://openalex.org/W3215171287","https://openalex.org/W4229455429","https://openalex.org/W4290948380","https://openalex.org/W6605479355","https://openalex.org/W6729239390","https://openalex.org/W6739088070","https://openalex.org/W6743581629","https://openalex.org/W6743821447","https://openalex.org/W6748786018","https://openalex.org/W6752600739","https://openalex.org/W6756840679","https://openalex.org/W6770634426","https://openalex.org/W6774126473","https://openalex.org/W6780123631","https://openalex.org/W6787972765","https://openalex.org/W6799246147"],"related_works":["https://openalex.org/W1971174658","https://openalex.org/W2099195351","https://openalex.org/W4256429076","https://openalex.org/W2012063272","https://openalex.org/W2348092930","https://openalex.org/W4298221930","https://openalex.org/W2777914285","https://openalex.org/W1501776718","https://openalex.org/W4287823391","https://openalex.org/W3013363440"],"abstract_inverted_index":{"Due":[0],"to":[1,9,31,77,86,116,146,156,181],"its":[2],"distributed":[3],"nature,":[4],"federated":[5,54,95,134],"learning":[6,55,96,135],"is":[7,99,115,203],"vulnerable":[8,76],"poisoning":[10,71,103,216],"attacks,":[11],"in":[12,173],"which":[13],"malicious":[14,59,110,211],"clients":[15,119,130,159,172,180],"poison":[16],"the":[17,32,37,88,118,143,158,193],"training":[18,24],"process":[19],"via":[20],"manipulating":[21],"their":[22],"local":[23,27],"data":[25],"and/or":[26],"model":[28,40,125],"updates":[29],"sent":[30],"cloud":[33],"server,":[34],"such":[35],"that":[36,98,169,178,192],"poisoned":[38],"global":[39,124,144],"misclassifies":[41],"many":[42],"indiscriminate":[43],"test":[44,149,201],"inputs":[45],"or":[46,57],"attacker-chosen":[47],"ones.":[48],"Existing":[49],"defenses":[50,63],"mainly":[51],"leverage":[52],"Byzantine-robust":[53],"methods":[56,155],"detect":[58],"clients.":[60,111],"However,":[61],"these":[62],"do":[64],"not":[65],"have":[66],"provable":[67],"security":[68],"guarantees":[69],"against":[70,102],"attacks":[72,104,217],"and":[73,137,160,176],"may":[74],"be":[75],"more":[78],"advanced":[79],"attacks.":[80],"In":[81],"this":[82],"work,":[83],"we":[84,152],"aim":[85],"bridge":[87],"gap":[89],"by":[90,196,206],"proposing":[91],"FLCert,":[92],"an":[93],"ensemble":[94],"framework,":[97],"provably":[100,204],"secure":[101],"with":[105],"a":[106,123,139,148,200,207],"bounded":[107,208],"number":[108,209],"of":[109,129,164,210],"Our":[112,185],"key":[113],"idea":[114],"divide":[117],"into":[120],"groups,":[121],"learn":[122],"for":[126,199],"each":[127,174],"group":[128,157],"using":[131],"any":[132],"existing":[133],"method,":[136],"take":[138],"majority":[140],"vote":[141],"among":[142],"models":[145],"classify":[147],"input.":[150],"Specifically,":[151],"consider":[153],"two":[154,162],"propose":[161],"variants":[163],"FLCert":[165,198],"correspondingly,":[166],"i.e.,":[167],"FLCert-P":[168],"randomly":[170],"samples":[171],"group,":[175],"FLCert-D":[177],"divides":[179],"disjoint":[182],"groups":[183],"deterministically.":[184],"extensive":[186],"experiments":[187],"on":[188],"multiple":[189],"datasets":[190],"show":[191],"label":[194],"predicted":[195],"our":[197],"input":[202],"unaffected":[205],"clients,":[212],"no":[213],"matter":[214],"what":[215],"they":[218],"use.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":26},{"year":2024,"cited_by_count":29},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
