[1]Y LeCun, Y Bengio, G Hinton. Deep learning[J], Nature, 2015, 521:436–444.
[2]H Brendan McMahan, Eider Moore, Daniel Ramage, et al. Communication-Efficient Learning of Deep Networks from Decentralized Data[C]// Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Fort Lauderdale: PMLR, 2017: 1273-1282.
[3]Peter Kairouz, H Brendan McMahan, Brendan Avent, et al. Advances and Open Problems in Federated Learning[J]. Foundations and Trends® in Machine Learning, 2021, 14(1): 1-210.
[4]X Yin, Y Zhu, and J Hu. A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions[J]. ACM Comput. Surveys, 2021, 54(6):1–36.
[5]H Aghakhani, D Meng, Y-X Wang, et al. Bullseye polytope: A scalable clean-label poisoning attack with improved transferability[C]//2021 IEEE European Symposium on Security and Privacy. Piscataway: IEEE, 2021: 159-178.
[6]P Blanchard, E M El Mhamdi, R Guerraoui, et al. Machine learning with adversaries: Byzantine tolerant gradient descent [C]//Advances in Neural Information Processing Systems. Red Hook: Curran Associates Inc, 2017: 118-128.
[7]Yin D, Chen Y, Ramchandran K, Bartlett P L. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates[C]//Proceedings of the 35th International Conference on Machine Learning. Long Beach: PMLR, 2018: 5636-5645.
[8]El Mhamdi E, Guerraoui R, Rouault S. The Hidden Vulnerability of Distributed Learning in Byzantium[C]//Proceedings of the 35th International Conference on Machine Learning. Long Beach: PMLR, 2018: 3518-3527.
[9]Sichang He, Beilong Tang, Boyan Zhang, et al. Fedkit: Enabling Cross-Platform Federated Learning for Android and iOS[C]//IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops. Vancouver: IEEE, 2024:1-2.
[10] Liu, Linfeng, Xi, et al. Mobile Charging Station Placements in Internet of Electric Vehicles: A Federated Learning Approach[J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23(12): 24561-24577.
[11]C Zhou, A Fu, S Yu, et al. Privacy-preserving federated learning in fog computing[J]. IEEE Internet of Things Journal, 2020, 7(11): 10782-10793.
[12]Praveer Dubey1, Mohit KumarCA2. Integrating Explainable AI with Federated Learning for Next-Generation IoT: A comprehensive review and prospective insights[J]. Computer Science Review, 2025, 56: 100697.
[13]宋华伟,李升起,万方杰,等. 非独立同分布场景下的联邦学习优化方法[J]. 计算机工程,2024,50(3): 166-172.
SONG H W, LI S Q, WAN F J, et al. Federated Learning Optimization Method in Non-IID Scenarios[J]. Computer Engineering, 2024,50(3): 166-172.
[14]Lan Liu, Yi Wang, Gaoyang Liu, et al. Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(3): 2341-2347.
[15]张晓均,李兴鹏,唐伟,等. 云-边融合的可验证隐私保护跨域联邦学习方案[J]. 计算机工程,2024,50(3): 148-155.
ZHANG X J, LI X P, TANG W, et al. Cloud-Edge Fusion Verifiable Privacy-Preserving Cross-Domain Federated Learning Scheme[J]. Computer Engineering, 2024, 50(3): 148-155.
[16]吴若岚,陈玉玲,豆慧,等. 抗攻击的联邦学习隐私保护算法[J]. 计算机工程,2025,51(2): 179-187.
WU R L, CHEN Y L, D H, et al. [J]. Computer Engineering, 2025, 51(2): 179-187.
[17]Li Minghui, Wan Wei, Lu Jianrong, et al. Shielding federated learning: Mitigating byzantine attacks with less constraints [C]//Proc of the 18th IEEE Int Conf on Mobility, Sensing and Networking. Piscataway, NJ: IEEE,2022:178-185
[18]Ansam Khraisat, Ammar Alazab, Moutaz Alazab, et al. Securing federated learning: a defense strategy against targeted data poisoning attack[J]. Discover Internet of Things, 2025, 5(1): 1-17.
[19]Jianping Wu, Jiahe Jin, Chunming Wu. Challenges and Countermeasures of Federated Learning Data Poisoning Attack Situation Prediction[J]. Mathematics,2024, 12(6): 901.
[20]Zhang, Jiale, Chen,et al. PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems[J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8(5): 3310-3322.v
[21]E Bagdasaryan, A Veit, Y Hua, D Estrin, V Shmatikov. How to backdoor federated learning [C]// Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics (AISTATS). Virtual:PMLR, 2020: 2938-2948.
[22]Zaixi Zhang, Xiaoyu Cao, Jinyuan Jia, et al. FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients [C]// Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Washington: ACM, 2022: 2545–2555.
[23]Moran Baruch, Gilad Baruch, Yoav Goldberg. A Little Is Enough: Circumventing Defenses For Distributed Learning[J]. Statistics, 2019, 32:5396–5410.
[24]Virat Shejwalkar, Amir Houmansadr. Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning [C]// NSF Public Access. Amherst: University of Massachusetts Amherst, 2021:1–17.
[25]Manh Cuong Dao, Phi Le NguyenCA, Huy Hieu Pham, et al. Noisy data-based attack: A new type of untargeted attack in Federated Learning and its countermeasures[J]. Future Generation Computer Systems, 2025, 173: 107900.
[26]Sonakshi Garg, Hugo Jönsson, Gustav Kalander, et al. Poisoning Attacks on Federated Learning for Autonomous Driving[J]. Scandinavian Conference on AI, 2024,1-14.
[27]Xu J, Huang S L, Song L, et al. Byzantine-robust federated learning through collaborative malicious gradient filtering[C]//2022 IEEE 42nd International Conference on Distributed Computing Systems. London:IEEE, 2022: 1223-1235.
[28]Jiao Liu, Xinghua Li, Ximeng Liu, et al. DefendFL: A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks[J]. IEEE Transactions on Neural Networks and Learning Systems, 2025, 36(5): 9098-9111.
|