{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:29:13Z","timestamp":1730327353158,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100006012","name":"Christian Doppler Forschungsgesellschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006012","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3635896","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"1549-1558","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Poisoning Detection in Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0001-2269-9145","authenticated-orcid":false,"given":"Denise-Phi","family":"Khuu","sequence":"first","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9612-9022","authenticated-orcid":false,"given":"Michael","family":"Sober","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2083-7145","authenticated-orcid":false,"given":"Dominik","family":"Kaaser","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6254-8288","authenticated-orcid":false,"given":"Mathias","family":"Fischer","sequence":"additional","affiliation":[{"name":"University of Hamburg, Hamburg, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6828-9945","authenticated-orcid":false,"given":"Stefan","family":"Schulte","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22020450"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings, Part I 26","author":"Awan Sana","year":"2021","unstructured":"Sana Awan, Bo Luo, and Fengjun Li. 2021. Contra: Defending against poisoning attacks in federated learning. In Computer Security-ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4--8, 2021, Proceedings, Part I 26. Springer, 455--475."},{"key":"e_1_3_2_1_3_1","volume-title":"On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. In International Conference on Security and Privacy for Emerging Areas in Communications Networks. IEEE, 327--338","author":"Awerbuch Baruch","year":"2005","unstructured":"Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, and Cristina Nita-Rotaru. 2005. On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. In International Conference on Security and Privacy for Emerging Areas in Communications Networks. IEEE, 327--338."},{"key":"e_1_3_2_1_4_1","volume-title":"Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017. 119--129."},{"key":"e_1_3_2_1_5_1","first-page":"374","article-title":"Towards federated learning at scale: System design","volume":"1","author":"Bonawitz Keith","year":"2019","unstructured":"Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Dzmitry Huba, Alex Ingerman, Vladimir Ivanov, Chloe Kiddon, Jakub Kone\u010dn\u1ef3, Stefano Mazzocchi, Brendan McMahan, et al. 2019. Towards federated learning at scale: System design. In Proceedings of Machine Learning and Systems, Vol. 1. 374--388.","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/130385.130401"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Nello Cristianini John Shawe-Taylor et al. 2000. An introduction to support vector machines and other kernel-based learning methods. Cambridge university press.","DOI":"10.1017\/CBO9780511801389"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00228"},{"key":"e_1_3_2_1_11_1","volume-title":"29th USENIX Security Symposium. USENIX, 1605--1622","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Gong. 2020. Local model poisoning attacks to Byzantine-Robust federated learning. In 29th USENIX Security Symposium. USENIX, 1605--1622."},{"key":"e_1_3_2_1_12_1","volume-title":"35th International Conference on Machine Learning. PMLR, 3521--3530","author":"Guerraoui Rachid","year":"2018","unstructured":"Rachid Guerraoui, S\u00e9bastien Rouault, et al. 2018. The hidden vulnerability of distributed learning in byzantium. In 35th International Conference on Machine Learning. PMLR, 3521--3530."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013539"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3039941"},{"key":"e_1_3_2_1_15_1","volume-title":"Federated Optimization: Distributed Machine Learning for On-Device Intelligence. ArXiv abs\/1610.02527","author":"Konecn\u00fd Jakub","year":"2016","unstructured":"Jakub Konecn\u00fd, H. B. McMahan, Daniel Ramage, and Peter Richt\u00e1rik. 2016. Federated Optimization: Distributed Machine Learning for On-Device Intelligence. ArXiv abs\/1610.02527 (2016)."},{"volume-title":"37th International Conference on Machine Learning. PMLR, 5491--5500","author":"Kumar Elizabeth I.","key":"e_1_3_2_1_16_1","unstructured":"Elizabeth I. Kumar, Suresh Venkatasubramanian, Carlos Scheidegger, and Sorelle A. Friedler. 2020. Problems with Shapley-value-based explanations as feature importance measures. In 37th International Conference on Machine Learning. PMLR, 5491--5500."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSA52907.2021.00081"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Gtg-shapley: Efficient and accurate participant contribution evaluation in federated learning","volume":"13","author":"Liu Zelei","year":"2022","unstructured":"Zelei Liu, Yuanyuan Chen, Han Yu, Yang Liu, and Lizhen Cui. 2022. Gtg-shapley: Efficient and accurate participant contribution evaluation in federated learning. ACM Transactions on Intelligent Systems and Technology (TIST) 13, 4 (2022), 1--21.","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"e_1_3_2_1_19_1","volume-title":"Lundberg and Su-In Lee","author":"Scott","year":"2017","unstructured":"Scott M. Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. (2017), 4765--4774."},{"key":"e_1_3_2_1_20_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273--1282."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.09.011"},{"key":"e_1_3_2_1_23_1","volume-title":"On the Byzantine Robustness of Clustered Federated Learning. In 2020 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 8861--8865","author":"Sattler Felix","year":"2020","unstructured":"Felix Sattler, Klaus-Robert M\u00fcller, Thomas Wiegand, and Wojciech Samek. 2020. On the Byzantine Robustness of Clustered Federated Learning. In 2020 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 8861--8865."},{"key":"e_1_3_2_1_24_1","volume-title":"32nd Annual Conference on Computer Security Applications. ACM, 508--519","author":"Shen Shiqi","year":"2016","unstructured":"Shiqi Shen, Shruti Tople, and Prateek Saxena. 2016. Auror: Defending against Poisoning Attacks in Collaborative Deep Learning Systems. In 32nd Annual Conference on Computer Security Applications. ACM, 508--519."},{"key":"e_1_3_2_1_25_1","volume-title":"34th International Conference on Machine Learning. PMLR, 3145--3153","author":"Shrikumar Avanti","year":"2017","unstructured":"Avanti Shrikumar, Peyton Greenside, and Anshul Kundaje. 2017. Learning important features through propagating activation differences. In 34th International Conference on Machine Learning. PMLR, 3145--3153."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599500"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04831-9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Yuchen Tian Weizhe Zhang Andrew Simpson Yang Liu and Zoe Lin Jiang. 2021. Defending against data poisoning attacks: from distributed learning to federated learning. Comput. J. (2021).","DOI":"10.1093\/comjnl\/bxab192"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027314"},{"key":"e_1_3_2_1_30_1","volume-title":"Data Poisoning Attacks Against Federated Learning Systems. In 25th European Symposium on Research in Computer Security. Springer, 480--501","author":"Tolpegin Vale","year":"2020","unstructured":"Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, and Ling Liu. 2020. Data Poisoning Attacks Against Federated Learning Systems. In 25th European Symposium on Research in Computer Security. Springer, 480--501."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904348"},{"key":"e_1_3_2_1_32_1","volume-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_2_1_34_1","volume-title":"Applied Federated Learning: Improving Google Keyboard Query Suggestions. CoRR abs\/1812.02903","author":"Yang Timothy","year":"2018","unstructured":"Timothy Yang, Galen Andrew, Hubert Eichner, Haicheng Sun, Wei Li, Nicholas Kong, Daniel Ramage, and Fran\u00e7oise Beaufays. 2018. Applied Federated Learning: Improving Google Keyboard Query Suggestions. CoRR abs\/1812.02903 (2018)."}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Avila Spain","acronym":"SAC '24"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3635896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T14:38:31Z","timestamp":1721831911000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":34,"alternative-id":["10.1145\/3605098.3635896","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3635896","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}