{"id":"https://openalex.org/W4402592926","doi":"https://doi.org/10.1109/tifs.2024.3463532","title":"Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models","display_name":"Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4402592926","doi":"https://doi.org/10.1109/tifs.2024.3463532"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3463532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3463532","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030439377","display_name":"Yihao Cao","orcid":"https://orcid.org/0000-0001-9940-5400"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yihao Cao","raw_affiliation_strings":["College of Computer Science, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","Faculty of Information Technology, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-9940-5400","affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Faculty of Information Technology, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034822825","display_name":"Jianbiao Zhang","orcid":"https://orcid.org/0000-0002-4917-7996"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbiao Zhang","raw_affiliation_strings":["College of Computer Science, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","Faculty of Information Technology, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4917-7996","affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Faculty of Information Technology, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066339584","display_name":"Yaru Zhao","orcid":"https://orcid.org/0000-0002-4782-4571"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaru Zhao","raw_affiliation_strings":["College of Computer Science, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","Faculty of Information Technology, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4782-4571","affiliations":[{"raw_affiliation_string":"College of Computer Science, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Faculty of Information Technology, Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070128994","display_name":"Hong Shen","orcid":"https://orcid.org/0000-0002-3663-6591"},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hong Shen","raw_affiliation_strings":["School of Engineering and Technology, Central Queensland University, Rockhampton, Australia","School of Engineering and Technology, Central Queensland University, Australia"],"raw_orcid":"https://orcid.org/0000-0002-3663-6591","affiliations":[{"raw_affiliation_string":"School of Engineering and Technology, Central Queensland University, Rockhampton, Australia","institution_ids":["https://openalex.org/I74899385"]},{"raw_affiliation_string":"School of Engineering and Technology, Central Queensland University, Australia","institution_ids":["https://openalex.org/I74899385"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085470422","display_name":"Haoxiang Huang","orcid":"https://orcid.org/0000-0002-5650-1758"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoxiang Huang","raw_affiliation_strings":["School of Computer Science and Technology, Xinjiang University, &#x00DC;r&#x00FC;mqi, Xinjiang, China","School of Computer Science and Technology, Xinjiang University, Xinjiang, China"],"raw_orcid":"https://orcid.org/0000-0002-5650-1758","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xinjiang University, &#x00DC;r&#x00FC;mqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xinjiang University, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030439377"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.9934,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80341181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"19","issue":null,"first_page":"8845","last_page":"8859"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9623000025749207,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8288401961326599},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.6830039620399475},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.46572205424308777},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4630897343158722},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4338111877441406},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24160471558570862}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8288401961326599},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.6830039620399475},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.46572205424308777},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4630897343158722},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4338111877441406},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24160471558570862}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3463532","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3463532","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[{"id":"https://openalex.org/G4837994069","display_name":null,"funder_award_id":"0033/2023/RIA1","funder_id":"https://openalex.org/F4320321655","funder_display_name":"Science and Technology Development Fund"},{"id":"https://openalex.org/G8989164010","display_name":null,"funder_award_id":"M21039","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"}],"funders":[{"id":"https://openalex.org/F4320321655","display_name":"Science and Technology Development Fund","ror":"https://ror.org/044vr6g03"},{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2108855378","https://openalex.org/W2601243251","https://openalex.org/W2734358244","https://openalex.org/W2930926105","https://openalex.org/W2963334472","https://openalex.org/W3016075089","https://openalex.org/W3132258589","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3155912831","https://openalex.org/W3173677040","https://openalex.org/W3176364684","https://openalex.org/W3176786489","https://openalex.org/W3180257170","https://openalex.org/W3180608480","https://openalex.org/W3182125009","https://openalex.org/W3196498627","https://openalex.org/W3213827288","https://openalex.org/W4205366980","https://openalex.org/W4221129260","https://openalex.org/W4226047321","https://openalex.org/W4297031253","https://openalex.org/W4307300892","https://openalex.org/W4311457580","https://openalex.org/W4312634912","https://openalex.org/W4313591370","https://openalex.org/W4316661314","https://openalex.org/W4324007153","https://openalex.org/W4382463479","https://openalex.org/W4399943989"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W4396832952","https://openalex.org/W2138522421","https://openalex.org/W3046095319","https://openalex.org/W3197497514","https://openalex.org/W1591172238","https://openalex.org/W2111194702","https://openalex.org/W2972172135","https://openalex.org/W2116878667","https://openalex.org/W315296216"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL),":[2],"a":[3,60,67,107,175],"secure":[4],"and":[5,31,46,53,78,94,120,141,180],"emerging":[6],"distributed":[7],"learning":[8,87],"paradigm,":[9],"has":[10],"garnered":[11],"significant":[12],"interest":[13],"in":[14,42,182],"the":[15,72,86,125,137,170],"Internet":[16],"of":[17,74,88,127,139],"Things":[18],"(IoT)":[19],"domain.":[20],"However,":[21],"it":[22,166],"remains":[23],"vulnerable":[24],"to":[25,48,98,102,114,123,174],"adversaries":[26],"who":[27],"may":[28],"compromise":[29],"privacy":[30],"integrity.":[32],"Previous":[33],"studies":[34],"on":[35],"privacy-preserving":[36],"FL":[37],"(PPFL)":[38],"have":[39],"demonstrated":[40],"limitations":[41],"client":[43,90],"model":[44,118],"personalization":[45],"resistance":[47],"poisoning":[49,103],"attacks,":[50,104],"including":[51],"Byzantine":[52,163],"backdoor":[54,188],"attacks.":[55,164,189],"In":[56],"response,":[57],"we":[58,105],"propose":[59],"novel":[61,108],"PPFL":[62],"framework,":[63],"FedRectify,":[64],"that":[65,111,152],"employs":[66,112],"personalized":[68,89],"dual-layer":[69],"approach":[70],"through":[71,146],"deployment":[73],"Trusted":[75],"Execution":[76],"Environments":[77],"an":[79],"interactive":[80],"training":[81],"strategy.":[82],"This":[83],"strategy":[84],"facilitates":[85],"features":[91],"via":[92],"private":[93],"shared":[95],"layers.":[96],"Furthermore,":[97],"improve":[99],"model\u2019s":[100],"robustness":[101],"introduce":[106],"aggregation":[109],"method":[110],"clustering":[113],"filter":[115],"out":[116],"outlier":[117],"parameters":[119],"robust":[121],"regression":[122],"assess":[124],"confidence":[126],"cluster":[128],"members,":[129],"thereby":[130],"rectifying":[131],"poisoned":[132],"parameters.":[133],"We":[134],"theoretically":[135],"prove":[136],"convergence":[138],"FedRectify":[140,153],"empirically":[142],"validate":[143],"its":[144],"performance":[145],"extensive":[147],"experiments.":[148],"The":[149],"results":[150],"demonstrate":[151],"converges":[154],"1.47-2.63":[155],"times":[156],"faster":[157],"than":[158],"state-of-the-art":[159],"methods":[160],"when":[161,185],"countering":[162],"Moreover,":[165],"can":[167],"rapidly":[168],"reduce":[169],"attack":[171],"success":[172],"rate":[173],"low":[176],"level":[177],"between":[178],"10%":[179],"40%":[181],"subsequent":[183],"rounds":[184],"confronting":[186],"bursty":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
