{"id":"https://openalex.org/W3211010549","doi":"https://doi.org/10.1145/3472883.3486990","title":"Siren","display_name":"Siren","publication_year":2021,"publication_date":"2021-10-27","ids":{"openalex":"https://openalex.org/W3211010549","doi":"https://doi.org/10.1145/3472883.3486990","mag":"3211010549"},"language":"en","primary_location":{"id":"doi:10.1145/3472883.3486990","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3472883.3486990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Symposium on Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009370494","display_name":"Hanxi Guo","orcid":"https://orcid.org/0000-0002-7566-1589"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hanxi Guo","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100769481","display_name":"Hao Wang","orcid":"https://orcid.org/0000-0002-1444-2657"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hao Wang","raw_affiliation_strings":["Louisiana State University, Baton Rouge, Louisiana"],"affiliations":[{"raw_affiliation_string":"Louisiana State University, Baton Rouge, Louisiana","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100459489","display_name":"Tao Song","orcid":"https://orcid.org/0000-0002-5965-3140"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Song","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016123060","display_name":"Hua Yang","orcid":"https://orcid.org/0000-0001-5536-503X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yang Hua","raw_affiliation_strings":["Queen's University Belfast Belfast, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast Belfast, Northern Ireland","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075577655","display_name":"Zhangcheng Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123571","display_name":"Huawei Technologies (France)","ror":"https://ror.org/02rbzf697","country_code":"FR","type":"company","lineage":["https://openalex.org/I2250955327","https://openalex.org/I4210123571"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Zhangcheng Lv","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Hangzhou, Zhejiang"],"affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Hangzhou, Zhejiang","institution_ids":["https://openalex.org/I4210123571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088333633","display_name":"Xiulang Jin","orcid":"https://orcid.org/0000-0002-8242-9972"},"institutions":[{"id":"https://openalex.org/I4210123571","display_name":"Huawei Technologies (France)","ror":"https://ror.org/02rbzf697","country_code":"FR","type":"company","lineage":["https://openalex.org/I2250955327","https://openalex.org/I4210123571"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Xiulang Jin","raw_affiliation_strings":["Huawei Technologies Co., Ltd., Hangzhou, Zhejiang"],"affiliations":[{"raw_affiliation_string":"Huawei Technologies Co., Ltd., Hangzhou, Zhejiang","institution_ids":["https://openalex.org/I4210123571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103101740","display_name":"Zhengui Xue","orcid":"https://orcid.org/0000-0002-7120-1622"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengui Xue","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036789442","display_name":"Ruhui Ma","orcid":"https://orcid.org/0000-0001-9592-8490"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruhui Ma","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049487451","display_name":"Haibing Guan","orcid":"https://orcid.org/0000-0002-4714-7400"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibing Guan","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5009370494"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":5.7338,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.96672232,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"47","last_page":"60"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8242363929748535},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7050660252571106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5417519211769104},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5072612166404724},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4641168713569641},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4509373605251312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36661386489868164}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8242363929748535},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7050660252571106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5417519211769104},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5072612166404724},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4641168713569641},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4509373605251312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36661386489868164},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3472883.3486990","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3472883.3486990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Symposium on Cloud Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/d873410d-3bf0-4a4f-8d80-72610741f364","is_oa":false,"landing_page_url":"https://pure.qub.ac.uk/en/publications/d873410d-3bf0-4a4f-8d80-72610741f364","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Guo, H, Wang, H, Song, T, Hua, Y, Lv, Z, Jin, X, Xue, Z, Ma, R & Guan, H 2021, Siren: Byzantine-robust federated learning via proactive alarming. in Proceedings of the ACM Symposium on Cloud Computing. vol. SoCC '21, Proceedings of the ACM Symposium on Cloud Computing, pp. 47-60. https://doi.org/10.1145/3472883.3486990","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[{"id":"https://openalex.org/G7501710009","display_name":null,"funder_award_id":"61872234, 61732010, 61525204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W398859631","https://openalex.org/W569478347","https://openalex.org/W2060393849","https://openalex.org/W2268702383","https://openalex.org/W2402144811","https://openalex.org/W2535838896","https://openalex.org/W2579247884","https://openalex.org/W2750384547","https://openalex.org/W2789903762","https://openalex.org/W2789911054","https://openalex.org/W2810065831","https://openalex.org/W2887439430","https://openalex.org/W2912213068","https://openalex.org/W2922259313","https://openalex.org/W2946633206","https://openalex.org/W2952782294","https://openalex.org/W2963165390","https://openalex.org/W2963334472","https://openalex.org/W2963422767","https://openalex.org/W2995164118","https://openalex.org/W2995191368","https://openalex.org/W3021654819","https://openalex.org/W3048715803","https://openalex.org/W3100515187","https://openalex.org/W3103802018","https://openalex.org/W3118608800","https://openalex.org/W3127520698","https://openalex.org/W3137092842","https://openalex.org/W4252654521","https://openalex.org/W6713134421"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W2170801710","https://openalex.org/W2952704802","https://openalex.org/W4294565801","https://openalex.org/W4320017490"],"abstract_inverted_index":{"With":[0],"the":[1,22,64,99],"popularity":[2],"of":[3,48,75,102],"machine":[4,17,32],"learning":[5,18,26],"on":[6],"many":[7,90],"applications,":[8],"data":[9,43,54],"privacy":[10,55],"has":[11,58],"become":[12,116],"a":[13,37,45],"severe":[14],"issue":[15],"when":[16],"is":[19,70],"applied":[20],"in":[21,31,50,68],"real":[23],"world.":[24],"Federated":[25],"(FL),":[27],"an":[28],"emerging":[29],"paradigm":[30],"learning,":[33],"aims":[34],"to":[35,52,72,85],"train":[36],"centralized":[38],"model":[39,82],"while":[40],"distributing":[41],"training":[42,66],"among":[44],"large":[46],"number":[47,101],"clients":[49,88,104],"order":[51],"avoid":[53],"leaking,":[56],"which":[57,106],"attracted":[59],"great":[60],"attention":[61],"recently.":[62],"However,":[63],"distributed":[65],"scheme":[67],"FL":[69],"susceptible":[71],"different":[73],"kinds":[74],"attacks.":[76],"Existing":[77],"defense":[78,95],"systems":[79,96],"mainly":[80],"utilize":[81],"weight":[83],"analysis":[84],"identify":[86],"malicious":[87,103],"with":[89],"limitations.":[91],"For":[92],"example,":[93],"some":[94],"must":[97],"know":[98],"exact":[100],"beforehand,":[105],"can":[107],"be":[108],"easily":[109],"bypassed":[110],"by":[111],"well-designed":[112],"attack":[113],"methods":[114],"and":[115],"impractical":[117],"for":[118],"real-world":[119],"scenarios.":[120]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":5}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2021-11-08T00:00:00"}
