{"id":"https://openalex.org/W7138410323","doi":"https://doi.org/10.1109/tifs.2026.3674690","title":"FORCE: Byzantine-Resilient Decentralized Federated Learning via Game-Theoretic Contribution Aggregation","display_name":"FORCE: Byzantine-Resilient Decentralized Federated Learning via Game-Theoretic Contribution Aggregation","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7138410323","doi":"https://doi.org/10.1109/tifs.2026.3674690"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3674690","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3674690","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036085089","display_name":"Qihao Dong","orcid":"https://orcid.org/0000-0002-4215-971X"},"institutions":[{"id":"https://openalex.org/I90727586","display_name":"Zhejiang University of Finance and Economics","ror":"https://ror.org/055vj5234","country_code":"CN","type":"education","lineage":["https://openalex.org/I90727586"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qihao Dong","raw_affiliation_strings":["School of Information Technology and Artificial Intelligence, Zhejiang University of Finance and Economics, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Artificial Intelligence, Zhejiang University of Finance and Economics, Hangzhou, China","institution_ids":["https://openalex.org/I90727586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104314504","display_name":"Zhiyang Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyang Dai","raw_affiliation_strings":["School of Cyberspace Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109606155","display_name":"Yunqi Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["The University of Western Australia, Albany, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Western Australia, Albany, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120850132","display_name":"Yupeng Zheng","orcid":"https://orcid.org/0000-0003-4720-7378"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yifeng Zheng","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Cyberspace Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129672527","display_name":"Willy Susilo","orcid":null},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5036085089"],"corresponding_institution_ids":["https://openalex.org/I90727586"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79668111,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"3182","last_page":"3196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.47620001435279846,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.47620001435279846,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10991","display_name":"Game Theory and Voting Systems","score":0.10769999772310257,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.0737999975681305,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.3409999907016754},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.2863999903202057},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.27810001373291016},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.2777999937534332},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.26019999384880066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8264999985694885},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3474999964237213},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.3409999907016754},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3154999911785126},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2777999937534332},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3674690","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3674690","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0,30,115],"Learning":[1,31,116],"(FL)":[2],"enables":[3],"collaborative":[4],"machine":[5],"learning":[6],"training":[7],"while":[8],"preserving":[9],"data":[10],"privacy.":[11],"However,":[12],"reliance":[13,84],"on":[14,85,199],"a":[15,35,107,137,172],"central":[16],"server":[17,27,46],"of":[18,25,90,142,146,160,165],"the":[19,23,124,140,143,157,163],"typical":[20],"FL":[21],"confronts":[22],"risk":[24],"single":[26],"failure.":[28],"Decentralized":[29,114],"(DFL)":[32],"emerges":[33],"as":[34,162],"promising":[36],"distributed":[37],"framework,":[38],"allowing":[39],"clients":[40,167,192],"to":[41,54,62,77,81,135,149,155],"directly":[42],"share":[43],"models":[44],"without":[45],"intervention,":[47],"thereby":[48],"addressing":[49],"this":[50,103],"challenge.":[51],"Nevertheless,":[52],"due":[53,80],"its":[55],"decentralized":[56],"nature,":[57],"DFL":[58,71,108,191,222],"is":[59,177],"highly":[60],"susceptible":[61],"Byzantine":[63,228],"attacks":[64,79,214],"orchestrated":[65],"by":[66,98],"malicious":[67,152],"clients.":[68,153],"Existing":[69],"Byzantine-resilient":[70,221],"algorithms,":[72],"though":[73],"few,":[74],"remain":[75],"vulnerable":[76],"adaptive":[78],"their":[82],"heavy":[83],"<italic":[86],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[87],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">gradient":[88],"checks</i>":[89],"local":[91,144],"models,":[92],"which":[93,176],"can":[94],"be":[95],"adaptively":[96],"manipulated":[97],"intelligent":[99],"adversaries.":[100],"To":[101],"tackle":[102],"issue,":[104],"we":[105,170],"propose":[106,171],"aggregation":[109,223],"scheme":[110],"called":[111],"FORCE":[112,130,161,217],"(Byzantine-Resilient":[113],"via":[117],"Game-Theoretic":[118],"Contribution":[119],"Aggregation).":[120],"Drawing":[121],"inspiration":[122],"from":[123,132],"Shapley":[125,181],"value":[126,182],"in":[127],"game":[128],"theory,":[129],"shifts":[131],"gradient-checking":[133],"approaches":[134],"employ":[136],"universal":[138],"metric,":[139],"loss":[141],"model\u2014independent":[145],"specific":[147],"gradients,":[148],"identify":[150],"potentially":[151],"Moreover,":[154],"reduce":[156],"computational":[158],"overhead":[159],"number":[164],"neighboring":[166],"scales":[168],"up,":[169],"computationlightweight":[173],"variant,":[174],"FORCE\u2212,":[175],"optimized":[178],"through":[179],"approximating":[180],"computation.":[183],"This":[184],"variant":[185],"becomes":[186],"more":[187],"scalable":[188],"for":[189],"resource-restricted":[190],"that":[193,216],"are":[194],"also":[195],"aggregators.":[196],"Experimental":[197],"results":[198],"three":[200,212],"diverse":[201],"datasets":[202],"(two":[203],"image":[204],"modalities":[205],"and":[206],"one":[207],"textual":[208],"modality":[209],"datasets)":[210],"under":[211],"existing":[213,219],"demonstrate":[215],"outperforms":[218],"state-of-the-art":[220],"methods,":[224],"effectively":[225],"defending":[226],"against":[227],"attacks.":[229]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-18T00:00:00"}
