{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:11:41Z","timestamp":1773231101707,"version":"3.50.1"},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702316"],"award-info":[{"award-number":["61702316"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Shanxi Province Natural Science Foundation","doi-asserted-by":"publisher","award":["201901D111280"],"award-info":[{"award-number":["201901D111280"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004480","name":"Shanxi Province Natural Science Foundation","doi-asserted-by":"publisher","award":["20210302123338"],"award-info":[{"award-number":["20210302123338"]}],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014103","name":"Key Technology Research and Development Program of Shandong","doi-asserted-by":"publisher","award":["2023GXYF15"],"award-info":[{"award-number":["2023GXYF15"]}],"id":[{"id":"10.13039\/100014103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012561","name":"Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund","doi-asserted-by":"publisher","award":["NSCL-KF2021-06"],"award-info":[{"award-number":["NSCL-KF2021-06"]}],"id":[{"id":"10.13039\/501100012561","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1016\/j.comnet.2025.111720","type":"journal-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T05:16:59Z","timestamp":1758950219000},"page":"111720","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Defense against backdoor attacks in federated learning with robust adaptive learning rates"],"prefix":"10.1016","volume":"272","author":[{"given":"Hongtao","family":"Li","sequence":"first","affiliation":[]},{"given":"Yongjun","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xianglin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2025.111720_bib0001","series-title":"International Conference on Artificial Intelligence and Statistics","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","author":"McMahan","year":"2016"},{"key":"10.1016\/j.comnet.2025.111720_bib0002","series-title":"China Automation Congress (CAC)","first-page":"6049","article-title":"Elite: Defending Federated Learning against Byzantine Attacks Based on Information Entropy","author":"Wang","year":"2021"},{"key":"10.1016\/j.comnet.2025.111720_bib0003","unstructured":"E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, V. Shmatikov, How to backdoor federated learning, ArXiv1807.00459 (2018)."},{"key":"10.1016\/j.comnet.2025.111720_bib0004","unstructured":"Z. Sun, P. Kairouz, A.T. Suresh, H.B. McMahan, Can you really backdoor federated learning? arXiv:1911.07963 (2019)."},{"key":"10.1016\/j.comnet.2025.111720_bib0005","unstructured":"A. Nguyen, A. Tran, Input-Aware dynamic backdoor attack, arXiv:2010.08138 (2020)."},{"key":"10.1016\/j.comnet.2025.111720_bib0006","first-page":"703","article-title":"Dynamic backdoor attacks against machine learning models","author":"Salem","year":"2020","journal-title":"2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)"},{"key":"10.1016\/j.comnet.2025.111720_bib0007","unstructured":"T. Gu, B. Dolan-Gavitt, S. Garg, Badnets: identifying vulnerabilities in the machine learning model supply chain, arXiv:1708.06733 (2017). https:\/\/api.semanticscholar.org\/CorpusID:26783139."},{"key":"10.1016\/j.comnet.2025.111720_bib0008","unstructured":"J. Konecn\u00fd, H.B. McMahan, F.X. Yu, P. Richt\u00e1rik, A.T. Suresh, D. Bacon, Federated learning: strategies for improving communication efficiency, arXiv:1610.05492 (2016)."},{"key":"10.1016\/j.comnet.2025.111720_bib0009","doi-asserted-by":"crossref","unstructured":"R. Shokri, V. Shmatikov, Privacy-preserving Deep Learning, in: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp. 1310\u20131321.","DOI":"10.1145\/2810103.2813687"},{"key":"10.1016\/j.comnet.2025.111720_bib0010","doi-asserted-by":"crossref","unstructured":"N.H. Tran, W. Bao, A. Zomaya, M.N.H. Nguyen, C.S. Hong, Federated Learning over Wireless Networks: Optimization Model Design and Analysis, in: IEEE INFOCOM 2019-IEEE conference on computer communications, pp. 1387\u20131395.","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"10.1016\/j.comnet.2025.111720_bib0011","unstructured":"X. Chen, C. Liu, B. Li, K. Lu, D.X. Song, Targeted backdoor attacks on deep learning systems using data poisoning, arXiv:1712.05526 (2017)."},{"key":"10.1016\/j.comnet.2025.111720_bib0012","doi-asserted-by":"crossref","unstructured":"Y. Liu, S. Ma, Y. Aafer, W.-C. Lee, J. Zhai, W. Wang, X. Zhang, Trojaning Attack on Neural Networks, in: 25th Annual Network And Distributed System Security Symposium (NDSS 2018), Internet Soc.","DOI":"10.14722\/ndss.2018.23291"},{"key":"10.1016\/j.comnet.2025.111720_bib0013","unstructured":"C. Xie, K. Huang, P.-Y. Chen, B. Li, DBA: Distributed Backdoor Attacks against Federated Learning, in: International conference on learning representations."},{"key":"10.1016\/j.comnet.2025.111720_bib0014","unstructured":"A. Turner, D. Tsipras, A. Madry, Label-Consistent backdoor attacks, arXiv:1912.02771 (2019)."},{"key":"10.1016\/j.comnet.2025.111720_bib0015","article-title":"Machine learning with adversaries: byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.comnet.2025.111720_bib0016","unstructured":"C. Fung, C.J.M. Yoon, I. Beschastnikh, The Limitations of Federated Learning in Sybil Settings, in: 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pp. 301\u2013316."},{"key":"10.1016\/j.comnet.2025.111720_bib0017","unstructured":"C. Xie, O. Koyejo, I. Gupta, Generalized byzantine-tolerant SGD, arXiv:1802.10116 (2018)."},{"issue":"5","key":"10.1016\/j.comnet.2025.111720_bib0018","doi-asserted-by":"crossref","first-page":"4619","DOI":"10.1109\/TDSC.2024.3354736","article-title":"Efficient and secure federated learning against backdoor attacks","volume":"21","author":"Miao","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.comnet.2025.111720_bib0019","doi-asserted-by":"crossref","first-page":"3877","DOI":"10.1109\/TIFS.2025.3555193","article-title":"Enhanced model poisoning attack and multi-Strategy defense in federated learning","volume":"20","author":"Yang","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2025.111720_bib0020","unstructured":"C. Peace Obioma, Y. Sun, M.A. Mustafa, Defending the Edge: Representative-Attention for Mitigating Backdoor Attacks in Federated Learning, (2025) arXiv e-prints2505.10297."},{"key":"10.1016\/j.comnet.2025.111720_bib0021","series-title":"USENIX Security Symposium","first-page":"1415","article-title":"FLAME: Taming Backdoors in Federated Learning","author":"Nguyen","year":"2022"},{"issue":"1-2","key":"10.1016\/j.comnet.2025.111720_bib0022","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Foundations and trends\u00ae in machine learning"},{"key":"10.1016\/j.comnet.2025.111720_bib0023","unstructured":"M. Nasr, R. Shokri, A. Houmansadr, Comprehensive privacy analysis of deep learning: stand-alone and federated learning under passive and active white-box inference attacks, arXiv:1812.00910 (2018)."},{"key":"10.1016\/j.comnet.2025.111720_bib0024","doi-asserted-by":"crossref","first-page":"14431","DOI":"10.1109\/CVPR42600.2020.01445","article-title":"Clean-Label backdoor attacks on video recognition models","author":"Zhao","year":"2020","journal-title":"2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"10.1016\/j.comnet.2025.111720_bib0025","doi-asserted-by":"crossref","unstructured":"M.S. Ozdayi, M. Kantarcioglu, Y.R. Gel, Defending against backdoors in federated learning with robust learning rate, arXiv:2007.03767 (2020).","DOI":"10.1609\/aaai.v35i10.17118"},{"key":"10.1016\/j.comnet.2025.111720_bib0026","unstructured":"J. Bernstein, J. Zhao, K. Azizzadenesheli, A. Anandkumar, SignSGD with majority vote is communication efficient and byzantine fault tolerant, arXiv:1810.05291 (2018)."},{"key":"10.1016\/j.comnet.2025.111720_bib0027","unstructured":"H. Xiao, K. Rasul, R. Vollgraf, Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms, arXiv:1708.07747 (2017)."},{"key":"10.1016\/j.comnet.2025.111720_bib0028","unstructured":"A. Krizhevsky, G. Hinton, Learning multiple layers of features from tiny images (2009)."},{"key":"10.1016\/j.comnet.2025.111720_bib0029","unstructured":"B. Chen, W. Carvalho, N. Baracaldo, H. Ludwig, B. Edwards, T. Lee, I. Molloy, B. Srivastava, Detecting backdoor attacks on deep neural networks by activation clustering, arXiv:1811.03728 (2018)."},{"key":"10.1016\/j.comnet.2025.111720_bib0030","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/3359789.3359790","article-title":"STRIP: A defence against trojan attacks on deep neural networks","author":"Gao","year":"2019","journal-title":"Proceedings of the 35th Annual Computer Security Applications Conference"},{"key":"10.1016\/j.comnet.2025.111720_bib0031","unstructured":"D. Yin, Y. Chen, R. Kannan, P. Bartlett, Byzantine-robust Distributed Learning: Towards Optimal Statistical Rates, in: International conference on machine learning, Pmlr, pp. 5650\u20135659."},{"key":"10.1016\/j.comnet.2025.111720_bib0032","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-0-387-70992-5_8","article-title":"A survey of quantification of privacy preserving data mining algorithms","author":"Bertino","year":"2008","journal-title":"Privacy-preserving data mining: Models and Algorithms"},{"key":"10.1016\/j.comnet.2025.111720_bib0033","doi-asserted-by":"crossref","unstructured":"B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, A.M. Bayen, M. Annavaram, Q. Jacobson, Virtual Trip Lines for Distributed Privacy-preserving Traffic Monitoring, in: Proceedings of the 6th international conference on Mobile systems, applications, and services, pp. 15\u201328.","DOI":"10.1145\/1378600.1378604"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625006863?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625006863?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:30:14Z","timestamp":1773156614000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128625006863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":33,"alternative-id":["S1389128625006863"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111720","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Defense against backdoor attacks in federated learning with robust adaptive learning rates","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111720","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111720"}}