{"id":"https://openalex.org/W7131888190","doi":"https://doi.org/10.1109/ton.2026.3668944","title":"FLET: Game-Theoretic Free-Riding Mitigation via Test Tasks in Federated Learning","display_name":"FLET: Game-Theoretic Free-Riding Mitigation via Test Tasks in Federated Learning","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7131888190","doi":"https://doi.org/10.1109/ton.2026.3668944"},"language":null,"primary_location":{"id":"doi:10.1109/ton.2026.3668944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2026.3668944","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026771955","display_name":"Guo Sf","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shaolong Guo","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127373336","display_name":"Yuntao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuntao Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127112650","display_name":"Zhou Su","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhou Su","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124057463","display_name":"Yanghe Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanghe Pan","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122868733","display_name":"Tom H. Luan","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tom H. Luan","raw_affiliation_strings":["School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066189295","display_name":"Xizhao Luo","orcid":"https://orcid.org/0000-0002-4294-1365"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xizhao Luo","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, Suzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, Suzhou, China","institution_ids":["https://openalex.org/I3923682"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5026771955"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.5716428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"34","issue":null,"first_page":"3995","last_page":"4010"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4318999946117401,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.4318999946117401,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.1551000028848648,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.041200000792741776,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6891999840736389},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6018000245094299},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.5479999780654907},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5078999996185303},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.42559999227523804},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.399399995803833},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.37860000133514404},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3582000136375427},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.3463999927043915}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7551000118255615},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6891999840736389},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6018000245094299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5565000176429749},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.5479999780654907},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5078999996185303},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.42590001225471497},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.42559999227523804},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.399399995803833},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3582000136375427},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3463999927043915},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3450999855995178},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.3400999903678894},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.33959999680519104},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.33820000290870667},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3325999975204468},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.33160001039505005},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.32120001316070557},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.31529998779296875},{"id":"https://openalex.org/C2780982575","wikidata":"https://www.wikidata.org/wiki/Q332142","display_name":"Deterrence (psychology)","level":2,"score":0.3068000078201294},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30640000104904175},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.28949999809265137},{"id":"https://openalex.org/C153517567","wikidata":"https://www.wikidata.org/wiki/Q26090","display_name":"Mechanism design","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C32407928","wikidata":"https://www.wikidata.org/wiki/Q2733833","display_name":"Best response","level":3,"score":0.26170000433921814},{"id":"https://openalex.org/C200594392","wikidata":"https://www.wikidata.org/wiki/Q812529","display_name":"Bayesian game","level":4,"score":0.25940001010894775},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.2567000091075897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ton.2026.3668944","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2026.3668944","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7988923192024231,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W2112796928","https://openalex.org/W2989120265","https://openalex.org/W3001989995","https://openalex.org/W3015636663","https://openalex.org/W3107632872","https://openalex.org/W3138597937","https://openalex.org/W3193606869","https://openalex.org/W3199618787","https://openalex.org/W3204548382","https://openalex.org/W3211102054","https://openalex.org/W3216934335","https://openalex.org/W4226047321","https://openalex.org/W4281639882","https://openalex.org/W4285132379","https://openalex.org/W4288064643","https://openalex.org/W4289533960","https://openalex.org/W4290948380","https://openalex.org/W4292387144","https://openalex.org/W4295308234","https://openalex.org/W4307926598","https://openalex.org/W4313173408","https://openalex.org/W4386249639","https://openalex.org/W4386952188","https://openalex.org/W4387886184","https://openalex.org/W4390691907","https://openalex.org/W4390938796","https://openalex.org/W4393147330","https://openalex.org/W4398243979","https://openalex.org/W4398788557","https://openalex.org/W4400314708","https://openalex.org/W4401246411","https://openalex.org/W4401753291","https://openalex.org/W4402969644","https://openalex.org/W4403296082","https://openalex.org/W4403675548","https://openalex.org/W4407937522","https://openalex.org/W4408095389","https://openalex.org/W4409883296","https://openalex.org/W4410314734","https://openalex.org/W4415797614","https://openalex.org/W7133214444"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1,85],"(FL)":[2],"is":[3,136],"a":[4,19,82,156,171,202],"widely":[5],"studied":[6],"framework":[7,86],"for":[8,240],"privacy-preserving":[9],"collaborative":[10],"training":[11,97],"among":[12],"multiple":[13],"clients.":[14],"However,":[15],"real-world":[16],"deployments":[17],"reveal":[18],"persistent":[20],"challenge:":[21],"free-riders,":[22],"i.e.,":[23],"participants":[24,154],"who":[25],"benefit":[26],"from":[27,109,115],"the":[28,47,96,116,148,151,228,232],"system":[29],"without":[30],"contributing":[31],"meaningful":[32],"updates.":[33],"If":[34],"not":[35],"properly":[36],"addressed,":[37],"free-riders":[38],"can":[39],"discourage":[40],"honest":[41],"contributors":[42],"and":[43,49,67,143,153,169,185,194,200,226,234],"ultimately":[44],"impair":[45],"both":[46,139,192,231],"fairness":[48],"efficiency":[50],"of":[51,126,230],"FL":[52,103],"ecosystems.":[53],"Existing":[54],"defenses":[55,244],"mainly":[56],"rely":[57],"on":[58],"post-hoc":[59],"per-client,":[60],"per-round":[61],"evaluation,":[62],"leading":[63],"to":[64,182],"limited":[65],"deterrence":[66,142],"high":[68],"resource":[69],"overhead,":[70],"particularly":[71],"in":[72,245],"large-scale":[73],"deployments.":[74],"To":[75,129],"tackle":[76],"these":[77],"problems,":[78],"we":[79],"propose":[80,201],"FLET,":[81],"novel":[83],"federated":[84],"with":[87,101,161,215],"test":[88,93,112],"tasks.":[89],"FLET":[90,222],"introduces":[91],"dedicated":[92],"tasks":[94,104],"into":[95],"process,":[98],"blending":[99],"them":[100],"real":[102],"while":[105],"concealing":[106],"their":[107],"types":[108],"participants.":[110,235],"These":[111],"tasks,":[113],"generated":[114],"reference":[117],"datasets,":[118],"serve":[119],"as":[120],"decoys":[121],"that":[122,206,221],"enable":[123],"accurate":[124],"detection":[125],"free-riding":[127,157,225,243],"behavior.":[128,189],"enforce":[130],"accountability,":[131],"an":[132],"economic":[133],"penalty":[134],"mechanism":[135],"employed,":[137],"achieving":[138],"proactive":[140],"(ex-ante)":[141],"reactive":[144],"(expost)":[145],"detection.We":[146],"analyze":[147],"interactions":[149],"between":[150],"server":[152,233],"through":[155],"suppression":[158],"game":[159],"model":[160],"asymmetric":[162],"information":[163,173],"(<italic":[164,176],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[165,177],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">i.e.,</i>":[166,178],"task":[167,180],"type),":[168],"develop":[170],"strategic":[172],"disclosure":[174],"scheme":[175],"revealing":[179],"requirements)":[181],"mislead":[183],"attackers":[184],"proactively":[186],"shape":[187],"participant":[188],"We":[190],"characterize":[191],"pure-strategy":[193],"mixed-strategy":[195],"perfect":[196],"Bayesian":[197],"Nash":[198],"equilibria,":[199],"lightweight":[203],"strateg-ymaking":[204],"algorithm":[205],"guides":[207],"players":[208],"toward":[209],"equilibrium":[210],"strategies":[211],"under":[212],"different":[213],"conditions":[214],"modest":[216],"overhead.":[217],"Extensive":[218],"experiments":[219],"validate":[220],"effectively":[223],"suppresses":[224],"enhances":[227],"utility":[229],"Our":[236],"findings":[237],"provide":[238],"insights":[239],"designing":[241],"cost-effective":[242],"practical":[246],"FL.":[247]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-28T00:00:00"}
