[1] Mao Y, You C, Zhang J, et al. A survey on mobile edge
computing: The communication perspective[J]. IEEE
communications surveys & tutorials, 2017, 19(4):
2322-2358.
[2] Zhao B, Liu X, Chen W N, et al. CrowdFL:
Privacy-Preserving Mobile Crowdsensing System via
Federated Learning[J]. IEEE Transactions on Mobile
Computing, 2023, 21(8): 4607-4619.
[3] Yang Q, Liu Y, Chen T, et al. Federated machine learning:
Concept and applications[J]. ACM Transactions onIntelligent Systems and Technology (TIST), 2019, 10(2):
1-19.
[4] Kairouz P, McMahan H B, Avent B, et al. Advances and
open problems in federated learning[J]. Foundations and
Trends® in Machine Learning, 2021, 14(1–2): 1-210.
[5] Yu S, Cui L. Poisoning Attacks and Counterattacks in
Federated Learning[M]//Security and Privacy in Federated
Learning. Singapore: Springer Nature Singapore, 2022:
37-54.
[6] Mothukuri V, Parizi R M, Pouriyeh S, et al. A survey on
security and privacy of federated learning[J]. Future
Generation Computer Systems, 2021, 115: 619-640.
[7] Lyu L, Yu H, Ma X, et al. Privacy and robustness in
federated learning: Attacks and defenses[J]. IEEE
transactions on neural networks and learning systems,
2022.
[8] Shokri R, Stronati M, Song C, et al. Membership inference
attacks against machine learning models[C]//2017 IEEE
symposium on security and privacy (SP). IEEE, 2017:
3-18.
[9] Sun Y, Chen Y, Wu P, et al. DRL: Dynamic rebalance
learning for adversarial robustness of UAV with
long-tailed distribution[J]. Computer Communications,
2023, 205: 14-23.
[10] Huang Y, Chen Y, Wang X, et al. Promoting Adversarial
Transferability via Dual-Sampling Variance Aggregation
and Feature Heterogeneity Attacks[J]. Electronics, 2023,
12(3): 767.
[11] Arachchige P C M, Bertok P, Khalil I, et al. Local
differential privacy for deep learning[J]. IEEE Internet of
Things Journal, 2019, 7(7): 5827-5842.
[12] Cormode G, Jha S, Kulkarni T, et al. Privacy at scale:
Local differential privacy in practice[C]//Proceedings of
the 2018 International Conference on Management of Data.
2018: 1655-1658.
[13] Bhagoji A N, Chakraborty S, Mittal P, et al. Analyzing
federated learning through an adversarial
lens[C]//International Conference on Machine Learning.
PMLR, 2019: 634-643.
[14] Fang M, Cao X, Jia J, et al. Local model poisoning attacks
to byzantine-robust federated learning[C]//Proceedings of
the 29th USENIX Conference on Security Symposium.
2020: 1623-1640.
[15] Zhang Z, Cao X, Jia J, et al. FLDetector: Defending
Federated Learning Against Model Poisoning Attacks via
Detecting Malicious Clients[J]. arXiv e-prints, 2022: arXiv:
2207.09209.
[16] Xu X, Lyu L. A reputation mechanism is all you need:
Collaborative fairness and adversarial robustness in
federated learning[J]. arXiv preprint arXiv:2011.10464,
2020.
[17] Bernau D, Robl J, Grassal P W, et al. Comparing local and
central differential privacy using membership inference
attacks[C]//IFIP Annual Conference on Data and
Applications Security and Privacy. Cham: Springer
International Publishing, 2021: 22-42.
[18] Khaliq A A, Anjum A, Ajmal A B, et al. A secure and
privacy preserved parking recommender system using
elliptic curve cryptography and local differential privacy[J].
IEEE Access, 2022, 10: 56410-56426.
[19] Gursoy M E, Tamersoy A, Truex S, et al. Secure and
utility-aware data collection with condensed local
differential privacy[J]. IEEE Transactions on Dependable
and Secure Computing, 2019, 18(5): 2365-2378.
[20] 温依霖, 赵乃良, 曾艳, 韩猛, 岳鲁鹏, 张纪林. 基于本
地模型质量的客户端选择方法[J]. 计算机工程, 2023,
49(6): 131-143.
WEN Yilin, ZHAO Nailiang, ZENG Yan, HAN Meng,
YUE Lupeng, ZHANG Jilin. Client Selection Method
Based on Local Model Quality[J]. Computer Engineering,
2023, 49(6): 131-143.
[21] Cao X, Fang M, Liu J, et al. Fltrust: Byzantine-robust
federated learning via trust bootstrapping[J]. arXiv
preprint arXiv:2012.13995, 2020.
[22] Fung C, Yoon C J M, Beschastnikh I. The limitations of
federated learning in sybil settings[C]//23rd International
Symposium on Research in Attacks, Intrusions and
Defenses (RAID 2020). 2020: 301-316.
[23] LeCun Y. The MNIST database of handwritten digits[J].
http://yann. lecun. com/exdb/mnist/, 1998.
[24] Krizhevsky A, Hinton G. Learning multiple layers of
features from tiny images[J]. 2009.
[25] Pang B, Lee L. Seeing stars: Exploiting class relationships
for sentiment categorization with respect to rating scales[J].arXiv preprint cs/0506075, 2005.
[26] McMahan B, Moore E, Ramage D, et al.
Communication-efficient learning of deep networks from
decentralized data[C]//Artificial intelligence and statistics.
PMLR, 2017: 1273-1282.
[27] Wu R, Chen Y, Tan C, et al. MDIFL: Robust Federated
Learning Based on Malicious Detection and Incentives[J].
Applied Sciences, 2023, 13(5): 2793.
[28] Qiang Yang, Yang Liu, Yong Cheng, Yan Kang, Tianjian
Chen, and Han Yu, Federated Learning, Morgan &
Claypool, Dec. 2019.
[29] Biggio B, Nelson B, Laskov P. Support vector machines
under adversarial label noise[C]//Asian conference on
machine learning. PMLR, 2011: 97-112.
[30] Bernstein J, Zhao J, Azizzadenesheli K, et al. signSGD
with majority vote is communication efficient and fault
tolerant[J]. arXiv preprint arXiv:1810.05291, 2018.
|