DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT
Pith reviewed 2026-05-19 03:56 UTC · model grok-4.3
The pith
DP2Guard replaces heavy encryption in privacy-preserving federated learning with lightweight gradient masking and a hybrid defense to block poisoning attacks in Industrial IoT.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
DP2Guard is a lightweight PPFL framework that enhances both privacy and robustness for Industrial IoT by leveraging a lightweight gradient masking mechanism to replace costly cryptographic operations while ensuring the privacy of local gradients, a hybrid defense strategy that extracts gradient features using singular value decomposition and cosine similarity and applies a clustering algorithm to identify malicious gradients, a trust score-based adaptive aggregation scheme that adjusts client weights according to historical behavior, and blockchain records of aggregated results and trust scores to ensure tamper-proof and auditable training.
What carries the argument
The hybrid defense strategy, which extracts gradient features via singular value decomposition and cosine similarity then applies clustering to identify malicious gradients.
If this is right
- Defends effectively against four advanced poisoning attacks while maintaining model utility.
- Ensures privacy of local gradients without the overhead of heavyweight encryption.
- Reduces communication and computation costs relative to prior encryption-heavy PPFL schemes.
- Delivers tamper-proof and auditable training through blockchain integration of aggregated results and trust scores.
Where Pith is reading between the lines
- The masking-plus-clustering pattern may extend to resource-constrained edge learning scenarios outside Industrial IoT where encryption budgets are tight.
- Trust scores accumulated over rounds could support client selection policies that further improve long-term robustness in dynamic device networks.
- Recording trust scores on blockchain opens a path to cross-organizational auditability in collaborative IoT analytics without revealing raw gradients.
Load-bearing premise
The hybrid defense strategy that extracts gradient features via singular value decomposition and cosine similarity and then applies clustering can reliably separate malicious gradients from benign ones even under adaptive adversaries.
What would settle it
An experiment in which an adaptive adversary crafts gradients that pass the SVD-cosine similarity feature extraction and clustering step yet still degrade the aggregated model accuracy.
Figures
read the original abstract
Privacy-Preserving Federated Learning (PPFL) has emerged as a secure distributed Machine Learning (ML) paradigm that aggregates locally trained gradients without exposing raw data. To defend against model poisoning threats, several robustness-enhanced PPFL schemes have been proposed by integrating anomaly detection. Nevertheless, they still face two major challenges: (1) the reliance on heavyweight encryption techniques results in substantial communication and computation overhead; and (2) single-strategy defense mechanisms often fail to provide sufficient robustness against adaptive adversaries. To overcome these challenges, we propose DP2Guard, a lightweight PPFL framework that enhances both privacy and robustness. DP2Guard leverages a lightweight gradient masking mechanism to replace costly cryptographic operations while ensuring the privacy of local gradients. A hybrid defense strategy is proposed, which extracts gradient features using singular value decomposition and cosine similarity, and applies a clustering algorithm to effectively identify malicious gradients. Additionally, DP2Guard adopts a trust score-based adaptive aggregation scheme that adjusts client weights according to historical behavior, while blockchain records aggregated results and trust scores to ensure tamper-proof and auditable training. Extensive experiments conducted on two public datasets demonstrate that DP2Guard effectively defends against four advanced poisoning attacks while ensuring privacy with reduced communication and computation costs.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes DP2Guard, a lightweight privacy-preserving federated learning scheme for Industrial IoT. It replaces heavyweight encryption with a gradient masking mechanism for privacy protection, introduces a hybrid defense that extracts features via singular value decomposition and cosine similarity before applying clustering to isolate malicious gradients, uses a trust-score-based adaptive aggregation rule, and logs results on blockchain for auditability. The central claim is that this combination defends effectively against four advanced poisoning attacks while reducing communication and computation costs, as demonstrated in experiments on two public datasets.
Significance. If the experimental validation holds under scrutiny, the work could contribute a practical efficiency-robustness tradeoff for PPFL in resource-limited IoT environments, addressing the overhead of cryptographic approaches and the fragility of single-strategy anomaly detection. The explicit use of blockchain for tamper-proof logging and historical trust scoring adds an auditable dimension that is not always present in prior Byzantine-robust FL schemes.
major comments (2)
- [Abstract] Abstract: the claim that DP2Guard 'effectively defends against four advanced poisoning attacks' is presented without any quantitative metrics, attack parameters (e.g., fraction of malicious clients, poisoning magnitude), baseline comparisons, or error bars. This absence makes the central robustness claim unverifiable from the provided information and constitutes a load-bearing gap for the paper's main contribution.
- [Hybrid defense description (likely §3)] Hybrid defense description (likely §3): the strategy projects gradients via SVD, computes cosine similarity as a feature, and applies clustering to separate malicious from benign updates. No experiment is described in which the four attacks are made adaptive to the defense (i.e., the adversary knows the SVD basis, similarity metric, and cluster count and crafts updates to remain inside the benign cluster). Without such a test, the assertion that the hybrid approach succeeds where single-strategy defenses fail against adaptive adversaries cannot be substantiated.
minor comments (3)
- Clarify the precise mathematical form of the lightweight gradient masking mechanism, including any parameters that control the privacy-utility tradeoff.
- Specify the clustering algorithm (e.g., k-means, DBSCAN), how the number of clusters is chosen, and any preprocessing steps applied to the SVD-derived features.
- Add a table or figure summarizing communication and computation costs with concrete numbers (bytes per round, FLOPs) against at least one cryptographic baseline.
Simulated Author's Rebuttal
We thank the referee for their constructive and detailed feedback on our manuscript. We address each major comment below, indicating the revisions we plan to incorporate to strengthen the presentation of our results and claims.
read point-by-point responses
-
Referee: [Abstract] Abstract: the claim that DP2Guard 'effectively defends against four advanced poisoning attacks' is presented without any quantitative metrics, attack parameters (e.g., fraction of malicious clients, poisoning magnitude), baseline comparisons, or error bars. This absence makes the central robustness claim unverifiable from the provided information and constitutes a load-bearing gap for the paper's main contribution.
Authors: We agree that the abstract would be strengthened by including summary quantitative details. In the revised version, we will update the abstract to concisely report key experimental outcomes, including model accuracy or F1 scores under each attack at specified malicious client fractions (e.g., 10-30%), poisoning magnitudes, comparisons to baselines such as FedAvg and other robust aggregation methods, and reference to variability across repeated runs. These additions will be drawn directly from the detailed results already present in the experimental section, making the robustness claim more verifiable while preserving abstract length. revision: yes
-
Referee: [Hybrid defense description (likely §3)] Hybrid defense description (likely §3): the strategy projects gradients via SVD, computes cosine similarity as a feature, and applies clustering to separate malicious from benign updates. No experiment is described in which the four attacks are made adaptive to the defense (i.e., the adversary knows the SVD basis, similarity metric, and cluster count and crafts updates to remain inside the benign cluster). Without such a test, the assertion that the hybrid approach succeeds where single-strategy defenses fail against adaptive adversaries cannot be substantiated.
Authors: We thank the referee for highlighting this important aspect of the threat model. Our experiments evaluate the hybrid defense against the standard, non-adaptive implementations of the four poisoning attacks as described in prior literature. To address the concern, we will revise Section 3 to explicitly state the assumed threat model and add a new paragraph in the experimental analysis discussing adaptive adversaries. This will include reasoning on why the multi-feature hybrid (SVD projection combined with cosine similarity and clustering) raises the bar for evasion compared to single-strategy methods, along with any feasible preliminary simulations of adaptive variants. We will also note full adaptive evaluation as an avenue for future work if space constraints limit new experiments. revision: partial
Circularity Check
No circularity: DP2Guard is a new construction whose robustness claims rest on external experiments rather than self-referential definitions or fits.
full rationale
The paper presents DP2Guard as an original lightweight PPFL framework that replaces cryptographic operations with gradient masking, introduces a hybrid defense using SVD for feature extraction plus cosine similarity and clustering to identify malicious gradients, employs trust-score adaptive aggregation, and uses blockchain for auditability. These elements are explicitly positioned as design responses to challenges in prior work. The claims of defending against four poisoning attacks and achieving lower overhead are tied to experimental results on public datasets, not to any derivation that reduces by construction to the scheme's own inputs or to self-citations that bear the load of uniqueness or ansatz justification. No equations or steps in the provided description exhibit self-definitional loops, fitted parameters renamed as predictions, or imported uniqueness theorems from the same authors. The derivation chain is therefore self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Benign and malicious gradients form separable clusters in the feature space defined by SVD and cosine similarity.
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/AbsoluteFloorClosure.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
A hybrid defense strategy is proposed, which extracts gradient features using singular value decomposition and cosine similarity, and applies a clustering algorithm to effectively identify malicious gradients.
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
DP2Guard leverages a lightweight gradient masking mechanism to replace costly cryptographic operations while ensuring the privacy of local gradients.
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
A joint energy and latency framework for transfer learning over 5g industrial edge networks,
B. Yang, O. Fagbohungbe, X. Cao, C. Yuen, L. Qian, D. Niyato, and Y . Zhang, “A joint energy and latency framework for transfer learning over 5g industrial edge networks,” IEEE Transactions on Industrial Informatics, vol. 18, no. 1, pp. 531–541, 2021
work page 2021
-
[2]
Reconfigurable intelligent surface assisted mobile edge computing with heterogeneous learning tasks,
S. Huang, S. Wang, R. Wang, M. Wen, and K. Huang, “Reconfigurable intelligent surface assisted mobile edge computing with heterogeneous learning tasks,” IEEE Transactions on Cognitive Communications and Networking, vol. 7, no. 2, pp. 369–382, 2021
work page 2021
-
[3]
A. Arunan, Y . Qin, X. Li, and C. Yuen, “A federated learning-based industrial health prognostics for heterogeneous edge devices using matched feature extraction,” IEEE Transactions on Automation Science and Engineering, vol. 21, no. 3, pp. 3065–3079, 2024
work page 2024
-
[4]
Device-edge cooperative fine-tuning of foundation models as a 6g service,
H. Wu, X. Chen, and K. Huang, “Device-edge cooperative fine-tuning of foundation models as a 6g service,” IEEE Wireless Communications, vol. 31, no. 3, pp. 60–67, 2024
work page 2024
-
[5]
Digital twin-driven madrl approaches for communication-computing- control co-optimization,
X. Yuan, H. Tian, X. Zhang, H. Du, N. Zhang, K. Huang, and L. Cai, “Digital twin-driven madrl approaches for communication-computing- control co-optimization,” IEEE Journal on Selected Areas in Communi- cations, pp. 1–1, 2025
work page 2025
-
[6]
F. Naeem, M. Ali, G. Kaddoum, C. Huang, and C. Yuen, “Security and privacy for reconfigurable intelligent surface in 6g: A review of prospective applications and challenges,” IEEE Open Journal of the Communications Society, vol. 4, pp. 1196–1217, 2023
work page 2023
-
[7]
Decentralized federated learning with asynchronous parameter sharing for large-scale iot networks,
H. Xie, M. Xia, P. Wu, S. Wang, and K. Huang, “Decentralized federated learning with asynchronous parameter sharing for large-scale iot networks,” IEEE Internet of Things Journal , vol. 11, no. 21, pp. 34 123–34 139, 2024
work page 2024
-
[8]
Deploying federated learning in large-scale cellular networks: Spatial convergence analysis,
Z. Lin, X. Li, V . K. N. Lau, Y . Gong, and K. Huang, “Deploying federated learning in large-scale cellular networks: Spatial convergence analysis,” IEEE Transactions on Wireless Communications , vol. 21, no. 3, pp. 1542–1556, 2022
work page 2022
-
[9]
L. You, Z. Guo, B. Zuo, Y . Chang, and C. Yuen, “Slmfed: A stage- based and layerwise mechanism for incremental federated learning to assist dynamic and ubiquitous iot,” IEEE Internet of Things Journal , vol. 11, no. 9, pp. 16 364–16 381, 2024
work page 2024
-
[10]
Efficient parallel split learning over resource-constrained wireless edge networks,
Z. Lin, G. Zhu, Y . Deng, X. Chen, Y . Gao, K. Huang, and Y . Fang, “Efficient parallel split learning over resource-constrained wireless edge networks,” IEEE Transactions on Mobile Computing , vol. 23, no. 10, pp. 9224–9239, 2024
work page 2024
-
[11]
User- level privacy-preserving federated learning: Analysis and performance optimization,
K. Wei, J. Li, M. Ding, C. Ma, H. Su, B. Zhang, and H. V . Poor, “User- level privacy-preserving federated learning: Analysis and performance optimization,” IEEE Transactions on Mobile Computing , vol. 21, no. 9, pp. 3388–3401, 2022
work page 2022
-
[12]
Y . Lu, X. Huang, Y . Dai, S. Maharjan, and Y . Zhang, “Differentially private asynchronous federated learning for mobile edge computing in urban informatics,”IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 2134–2143, 2020
work page 2020
-
[13]
B. Han, B. Li, R. Jurdak, P. Zhang, H. Zhang, P. Feng, and C. Yuen, “Pbfl: A privacy-preserving blockchain-based federated learning frame- work with homomorphic encryption and single masking,” IEEE Internet of Things Journal , pp. 1–1, 2024. JOURNAL OF LATEX CLASS FILES, VOL. 18, NO. 9, SEPTEMBER 2020 13
work page 2024
-
[14]
Securesl: A privacy-preserving vertical cooperative learning scheme for web 3.0,
W. Yang, X. Wang, Z. Guan, L. Wu, X. Du, and M. Guizani, “Securesl: A privacy-preserving vertical cooperative learning scheme for web 3.0,” IEEE Transactions on Network Science and Engineering , vol. 11, no. 5, pp. 3983–3994, 2024
work page 2024
-
[15]
Communication-efficient privacy-preserving neural network inference via arithmetic secret sharing,
R. Bi, J. Xiong, C. Luo, J. Ning, X. Liu, Y . Tian, and Y . Zhang, “Communication-efficient privacy-preserving neural network inference via arithmetic secret sharing,” IEEE Transactions on Information Foren- sics and Security , vol. 19, pp. 6722–6737, 2024
work page 2024
-
[16]
Nspfl: A novel secure and privacy-preserving federated learning with data integrity auditing,
Z. Zhang and Y . Li, “Nspfl: A novel secure and privacy-preserving federated learning with data integrity auditing,” IEEE Transactions on Information Forensics and Security , vol. 19, pp. 4494–4506, 2024
work page 2024
-
[17]
Distributed learning in wireless networks: Recent progress and future challenges,
M. Chen, D. G ¨und¨uz, K. Huang, W. Saad, M. Bennis, A. V . Feljan, and H. V . Poor, “Distributed learning in wireless networks: Recent progress and future challenges,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 12, pp. 3579–3605, 2021
work page 2021
-
[18]
Distributed and secure federated learning for wireless computing power networks,
P. Wang, W. Sun, H. Zhang, W. Ma, and Y . Zhang, “Distributed and secure federated learning for wireless computing power networks,”IEEE Transactions on Vehicular Technology , vol. 72, no. 7, pp. 9381–9393, 2023
work page 2023
-
[19]
Trustworthy federated learning against malicious attacks in web 3.0,
Z. Yuan, Y . Tian, Z. Zhou, T. Li, S. Wang, and J. Xiong, “Trustworthy federated learning against malicious attacks in web 3.0,” IEEE Trans- actions on Network Science and Engineering , vol. 11, no. 5, pp. 3969– 3982, 2024
work page 2024
-
[20]
Ma- chine learning with adversaries: Byzantine tolerant gradient descent,
P. Blanchard, E. M. El Mhamdi, R. Guerraoui, and J. Stainer, “Ma- chine learning with adversaries: Byzantine tolerant gradient descent,” Advances in neural information processing systems , vol. 30, 2017
work page 2017
-
[21]
arXiv preprint arXiv:2012.13995 , year=
X. Cao, M. Fang, J. Liu, and N. Z. Gong, “Fltrust: Byzantine- robust federated learning via trust bootstrapping,” arXiv preprint arXiv:2012.13995, 2020
-
[22]
V . Shejwalkar and A. Houmansadr, “Manipulating the byzantine: Opti- mizing model poisoning attacks and defenses for federated learning,” in NDSS, 2021
work page 2021
-
[23]
A scheme for robust federated learning with privacy-preserving based on krum agr,
X. Li, M. Wen, S. He, R. Lu, and L. Wang, “A scheme for robust federated learning with privacy-preserving based on krum agr,” in 2023 IEEE/CIC International Conference on Communications in China (ICCC), 2023, pp. 1–6
work page 2023
-
[24]
Biscotti: A blockchain system for private and secure federated learning,
M. Shayan, C. Fung, C. J. M. Yoon, and I. Beschastnikh, “Biscotti: A blockchain system for private and secure federated learning,” IEEE Transactions on Parallel and Distributed Systems , vol. 32, no. 7, pp. 1513–1525, 2021
work page 2021
-
[25]
Rflpa: A robust federated learning framework against poisoning attacks with secure aggregation,
P. Mai, R. Yan, and Y . Pang, “Rflpa: A robust federated learning framework against poisoning attacks with secure aggregation,” Advances in Neural Information Processing Systems, vol. 37, pp. 104 329–104 356, 2024
work page 2024
-
[26]
Shieldfl: Mitigating model poisoning attacks in privacy-preserving federated learning,
Z. Ma, J. Ma, Y . Miao, Y . Li, and R. H. Deng, “Shieldfl: Mitigating model poisoning attacks in privacy-preserving federated learning,” IEEE Transactions on Information Forensics and Security , vol. 17, pp. 1639– 1654, 2022
work page 2022
-
[27]
Flod: Oblivious defender for private byzantine-robust federated learning with dishonest- majority,
Y . Dong, X. Chen, K. Li, D. Wang, and S. Zeng, “Flod: Oblivious defender for private byzantine-robust federated learning with dishonest- majority,” in European Symposium on Research in Computer Security . Springer, 2021, pp. 497–518
work page 2021
-
[28]
Dpfla: defending private federated learning against poisoning attacks,
X. Feng, W. Cheng, C. Cao, L. Wang, and V . S. Sheng, “Dpfla: defending private federated learning against poisoning attacks,” IEEE Transactions on Services Computing , 2024
work page 2024
-
[29]
B. Jiang, J. Li, H. Wang, and H. Song, “Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression,”IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1136–1144, 2023
work page 2023
-
[30]
Fl2dp: Privacy-preserving federated learning via differential privacy for artificial iot,
C. Gu, X. Cui, X. Zhu, and D. Hu, “Fl2dp: Privacy-preserving federated learning via differential privacy for artificial iot,” IEEE Transactions on Industrial Informatics, vol. 20, no. 4, pp. 5100–5111, 2024
work page 2024
-
[31]
Towards adaptive privacy protection for interpretable federated learning,
Z. Li, H. Chen, Z. Ni, Y . Gao, and W. Lou, “Towards adaptive privacy protection for interpretable federated learning,” IEEE Transactions on Mobile Computing, vol. 23, no. 12, pp. 14 471–14 483, 2024
work page 2024
-
[32]
Practical secure aggregation for privacy-preserving machine learning,
K. Bonawitz, V . Ivanov, B. Kreuter, A. Marcedone, H. B. McMahan, S. Patel, D. Ramage, A. Segal, and K. Seth, “Practical secure aggregation for privacy-preserving machine learning,” in proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security , 2017, pp. 1175–1191
work page 2017
-
[33]
X. Fu, L. Xiong, F. Li, X. Yang, and N. Xiong, “Blockchain-based efficiently privacy-preserving federated learning framework using shamir secret sharing,” IEEE Transactions on Consumer Electronics , pp. 1–1, 2024
work page 2024
-
[34]
B. D. Manh, C.-H. Nguyen, D. T. Hoang, and D. N. Nguyen, “Ho- momorphic encryption-enabled federated learning for privacy-preserving intrusion detection in resource-constrained iov networks,” in 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), 2024, pp. 1–6
work page 2024
-
[35]
P 3: Privacy-preserving prediction of real-time energy demands in ev charging networks,
B. Li, Y . Guo, Q. Du, Z. Zhu, X. Li, and R. Lu, “P 3: Privacy-preserving prediction of real-time energy demands in ev charging networks,” IEEE Transactions on Industrial Informatics , vol. 19, no. 3, pp. 3029–3038, 2023
work page 2023
-
[36]
Privacy- preserving byzantine-robust federated learning via blockchain systems,
Y . Miao, Z. Liu, H. Li, K.-K. R. Choo, and R. H. Deng, “Privacy- preserving byzantine-robust federated learning via blockchain systems,” IEEE Transactions on Information Forensics and Security , vol. 17, pp. 2848–2861, 2022
work page 2022
-
[37]
Communication-efficient learning of deep networks from decentralized data,
B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial intelligence and statistics . PMLR, 2017, pp. 1273– 1282
work page 2017
-
[38]
The limitations of federated learning in sybil settings,
C. Fung, C. J. Yoon, and I. Beschastnikh, “The limitations of federated learning in sybil settings,” in 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) , 2020, pp. 301–316
work page 2020
-
[39]
Local model poisoning attacks to {Byzantine-Robust} federated learning,
M. Fang, X. Cao, J. Jia, and N. Gong, “Local model poisoning attacks to {Byzantine-Robust} federated learning,” in 29th USENIX security symposium (USENIX Security 20) , 2020, pp. 1605–1622
work page 2020
-
[40]
Securing smart grids through an incentive mechanism for blockchain-based data sharing,
D. Reijsbergen, A. Maw, T. T. A. Dinh, W.-T. Li, and C. Yuen, “Securing smart grids through an incentive mechanism for blockchain-based data sharing,” in Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy , 2022, pp. 191–202
work page 2022
-
[41]
Blockchain for the internet of vehicles towards intelligent transportation systems: A survey,
M. B. Mollah, J. Zhao, D. Niyato, Y . L. Guan, C. Yuen, S. Sun, K.-Y . Lam, and L. H. Koh, “Blockchain for the internet of vehicles towards intelligent transportation systems: A survey,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4157–4185, 2020
work page 2020
-
[42]
Svd approach to data unfolding,
A. Hoecker and V . Kartvelishvili, “Svd approach to data unfolding,” Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment , vol. 372, no. 3, pp. 469–481, 1996
work page 1996
-
[43]
K-means based constellation optimization for index modulated reconfigurable intelligent surfaces,
H. Liu, J. An, W. Xu, X. Jia, L. Gan, and C. Yuen, “K-means based constellation optimization for index modulated reconfigurable intelligent surfaces,” IEEE Communications Letters, vol. 27, no. 8, pp. 2152–2156, 2023
work page 2023
-
[44]
Y . Tong, J. Chen, M. Xu, J. Kang, Z. Xiong, D. Niyato, C. Yuen, and Z. Han, “Multi-attribute auction-based resource allocation for twins migration in vehicular metaverses: A gpt-based drl approach,” IEEE Transactions on Cognitive Communications and Networking , 2024
work page 2024
-
[45]
How to simulate it–a tutorial on the simulation proof technique,
Y . Lindell, “How to simulate it–a tutorial on the simulation proof technique,” Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich , pp. 277–346, 2017
work page 2017
-
[46]
Gradient-based learning applied to document recognition,
Y . LeCun, L. Bottou, Y . Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE , vol. 86, no. 11, pp. 2278–2324, 2002
work page 2002
-
[47]
A data poisoning resistible and privacy protection federated-learning mechanism for ubiquitous iot,
G. Chen, X. Li, L. You, A. M. Abdelmoniem, Y . Zhang, and C. Yuen, “A data poisoning resistible and privacy protection federated-learning mechanism for ubiquitous iot,” IEEE Internet of Things Journal, vol. 12, no. 8, pp. 10 736–10 750, 2025
work page 2025
-
[48]
How to backdoor federated learning,
E. Bagdasaryan, A. Veit, Y . Hua, D. Estrin, and V . Shmatikov, “How to backdoor federated learning,” in International conference on artificial intelligence and statistics . PMLR, 2020, pp. 2938–2948
work page 2020
-
[49]
Poisoning Attacks against Support Vector Machines
B. Biggio, B. Nelson, and P. Laskov, “Poisoning attacks against support vector machines,” arXiv preprint arXiv:1206.6389 , 2012. Baofu Han received the M.S. degree from the School of Information Science and Engineering, Shenyang University of Technology, Shenyang, China, in 2021. He is currently pursuing the Ph.D. degree with the School of Cyber Science a...
work page internal anchor Pith review Pith/arXiv arXiv 2012
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.