{"id":"https://openalex.org/W4413755131","doi":"https://doi.org/10.1109/tnnls.2025.3601078","title":"DSPFL: A Deep-Layer Sign Sharing Personalized Federated Learning Scheme for Mitigating Poisoning Attacks","display_name":"DSPFL: A Deep-Layer Sign Sharing Personalized Federated Learning Scheme for Mitigating Poisoning Attacks","publication_year":2025,"publication_date":"2025-08-27","ids":{"openalex":"https://openalex.org/W4413755131","doi":"https://doi.org/10.1109/tnnls.2025.3601078","pmid":"https://pubmed.ncbi.nlm.nih.gov/40864572"},"language":"en","primary_location":{"id":"doi:10.1109/tnnls.2025.3601078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnnls.2025.3601078","pdf_url":null,"source":{"id":"https://openalex.org/S4210175523","display_name":"IEEE Transactions on Neural Networks and Learning Systems","issn_l":"2162-237X","issn":["2162-237X","2162-2388"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Neural Networks and Learning Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011685108","display_name":"Chenhao Xu","orcid":"https://orcid.org/0000-0003-0819-7269"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Chenhao Xu","raw_affiliation_strings":["Institute for Sustainable Industries and Liveable Cities (ISILC), Victoria University, Footscray, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Sustainable Industries and Liveable Cities (ISILC), Victoria University, Footscray, VIC, Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015798498","display_name":"Nasrin Sohrabi","orcid":"https://orcid.org/0000-0002-8340-2261"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nasrin Sohrabi","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040772796","display_name":"Youyang Qu","orcid":"https://orcid.org/0000-0002-2944-4647"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youyang Qu","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005267734","display_name":"Hai Dong","orcid":"https://orcid.org/0000-0002-7033-5688"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":false,"raw_author_name":"Hai Dong","raw_affiliation_strings":["RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I4210095297","https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054836950","display_name":"Zahir Tari","orcid":"https://orcid.org/0000-0002-1235-9673"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":false,"raw_author_name":"Zahir Tari","raw_affiliation_strings":["RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I4210095297","https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100709723","display_name":"Xun Yi","orcid":"https://orcid.org/0000-0001-7351-5724"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":false,"raw_author_name":"Xun Yi","raw_affiliation_strings":["RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"RMIT Centre of Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I4210095297","https://openalex.org/I82951845"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5011685108"],"corresponding_institution_ids":["https://openalex.org/I71270174"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24876637,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"1","first_page":"67","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8842999935150146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8842999935150146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.7929999828338623,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T13192","display_name":"Forensic Fingerprint Detection Methods","score":0.7573000192642212,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6792258620262146},{"id":"https://openalex.org/keywords/sign","display_name":"Sign (mathematics)","score":0.6756013631820679},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.643890380859375},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6100247502326965},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4726509153842926},{"id":"https://openalex.org/keywords/single-sign-on","display_name":"Single sign-on","score":0.4431200623512268},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.41324567794799805},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39221954345703125},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32996225357055664},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.09052637219429016},{"id":"https://openalex.org/keywords/nanotechnology","display_name":"Nanotechnology","score":0.07412007451057434},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.058668702840805054},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.049897581338882446}],"concepts":[{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6792258620262146},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.6756013631820679},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.643890380859375},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6100247502326965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4726509153842926},{"id":"https://openalex.org/C2776362682","wikidata":"https://www.wikidata.org/wiki/Q568494","display_name":"Single sign-on","level":3,"score":0.4431200623512268},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41324567794799805},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39221954345703125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32996225357055664},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.09052637219429016},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.07412007451057434},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.058668702840805054},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.049897581338882446},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tnnls.2025.3601078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnnls.2025.3601078","pdf_url":null,"source":{"id":"https://openalex.org/S4210175523","display_name":"IEEE Transactions on Neural Networks and Learning Systems","issn_l":"2162-237X","issn":["2162-237X","2162-2388"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Neural Networks and Learning Systems","raw_type":"journal-article"},{"id":"pmid:40864572","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/40864572","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on neural networks and learning systems","raw_type":null},{"id":"pmh:oai:figshare.com:article/30081607","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/30081607","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1502320239","display_name":null,"funder_award_id":"ZR2023QF104","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"}],"funders":[{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2789828921","https://openalex.org/W2949500778","https://openalex.org/W2949848919","https://openalex.org/W2960737790","https://openalex.org/W2963049059","https://openalex.org/W2996979369","https://openalex.org/W3018102029","https://openalex.org/W3024103409","https://openalex.org/W3040266635","https://openalex.org/W3099106497","https://openalex.org/W3102359135","https://openalex.org/W3103858746","https://openalex.org/W3129004430","https://openalex.org/W3135684856","https://openalex.org/W3138153888","https://openalex.org/W3157680283","https://openalex.org/W3163222347","https://openalex.org/W3163966458","https://openalex.org/W3170841864","https://openalex.org/W3171303096","https://openalex.org/W3175919946","https://openalex.org/W3190748826","https://openalex.org/W3209752568","https://openalex.org/W3214399478","https://openalex.org/W3217476834","https://openalex.org/W4205901761","https://openalex.org/W4205909103","https://openalex.org/W4211070171","https://openalex.org/W4220996174","https://openalex.org/W4226101686","https://openalex.org/W4280629123","https://openalex.org/W4281398987","https://openalex.org/W4283796083","https://openalex.org/W4287332481","https://openalex.org/W4288758078","https://openalex.org/W4312634912","https://openalex.org/W4313216104","https://openalex.org/W4382657634","https://openalex.org/W4390660272","https://openalex.org/W4398157452","https://openalex.org/W4406137527"],"related_works":["https://openalex.org/W2493320815","https://openalex.org/W2368596295","https://openalex.org/W2381227470","https://openalex.org/W2369291690","https://openalex.org/W2373808059","https://openalex.org/W2081571413","https://openalex.org/W4249335231","https://openalex.org/W1533758957","https://openalex.org/W4408653728","https://openalex.org/W2388777446"],"abstract_inverted_index":{"With":[0],"the":[1,4,17,20,68,107,123,130,142,145,164],"rise":[2],"of":[3,19,23,77,125,133,144,168],"smart":[5],"industry,":[6],"machine":[7],"learning":[8,32],"(ML)":[9],"has":[10],"become":[11],"a":[12,35,112],"popular":[13],"method":[14],"to":[15,59,67,95,103,157,187,198],"improve":[16],"security":[18],"Industrial":[21],"Internet":[22],"Things":[24],"(IIoT)":[25],"by":[26,45],"training":[27],"anomaly":[28,41],"detection":[29,42],"models.":[30],"Federated":[31],"(FL)":[33],"is":[34],"distributed":[36,81],"ML":[37],"scheme":[38],"that":[39,182],"facilitates":[40],"on":[43,172],"IIoT":[44,85,173],"preserving":[46],"data":[47,51,83],"privacy":[48],"and":[49,79,166,190],"breaking":[50],"silos.":[52],"However,":[53],"poisoning":[54,149,176,203],"attacks":[55],"pose":[56],"significant":[57],"threats":[58],"FL,":[60],"where":[61],"adversaries":[62],"upload":[63],"poisoned":[64],"local":[65,97,134,170],"models":[66,135,171],"aggregation":[69,140],"server,":[70],"thereby":[71],"degrading":[72],"model":[73,195],"accuracy.":[74],"The":[75],"prevalence":[76],"non-independent":[78],"identically":[80],"(non-IID)":[82],"across":[84],"devices":[86,174],"further":[87],"exacerbates":[88],"this":[89],"threat,":[90],"as":[91],"it":[92],"naturally":[93],"leads":[94],"diverse":[96],"models,":[98],"making":[99],"malicious":[100],"ones":[101],"harder":[102],"distinguish.":[104],"To":[105],"address":[106],"above":[108],"challenges,":[109],"we":[110],"propose":[111],"deep-layer":[113],"sign-sharing":[114],"personalized":[115,169,194],"FL":[116],"(DSPFL)":[117],"scheme.":[118],"DSPFL":[119,183],"innovatively":[120],"aggregates":[121],"only":[122],"signs":[124],"stochastic":[126],"gradients":[127],"(SignSGD)":[128],"from":[129],"deep":[131],"layers":[132,153],"during":[136],"training.":[137],"This":[138,160],"targeted":[139],"enhances":[141],"robustness":[143],"shared":[146],"components":[147],"against":[148],"attacks,":[150],"while":[151],"shallow":[152],"are":[154],"retained":[155],"locally":[156],"preserve":[158],"personalization.":[159],"integrated":[161],"approach":[162],"improves":[163],"accuracy":[165,196],"resilience":[167],"under":[175,201],"attacks.":[177,204],"Extensive":[178],"experimental":[179],"results":[180],"show":[181],"consistently":[184],"achieves":[185],"up":[186],"20%":[188],"higher":[189],"more":[191],"stable":[192],"overall":[193],"compared":[197],"state-of-the-art":[199],"methods":[200],"specific":[202]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
