{“状态”:“正常”,“消息类型”:“工作”,“消息版本”:“1.0.0”,“消息”:{“索引”:{“日期部分”:[[2024,5,23],“日期时间”:“2024-05-23T06:30:52Z”,“时间戳”:1716445852805},“引用计数”:33,“发布者”:“爱思唯尔BV”,“许可证”:[{“开始”:{“日期部分”:[[2023,6,1],“日期时间”:“2023-06-01T00:00:00Z”,“时间戳”:1685577600000},“内容版本“:“tdm”,“delay-in-days”:0,“URL”:“https:\/\/www.elsevier.com/tdm\/userlicense\/1.0\/”},{“start”:{“date-parts”:[[2023,6,1]],“date-time”:“2023-06-01T00:00:00Z”,“timestamp”:1685577600000},“content-version”:“stm-asf”,“delay-in-days”:“0”,“URL“https:\\/doi.org\/10.15223\/policy-017“},{“开始”:{“日期部分”:[[2023,6,1]],“日期时间”:“2023-06-01T00:00:00Z”,“timestamp”:1685577600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”},{“start”:{“date-parts”:[[2023,6,1]],“date-time”:“2023-06-01T00:00:00Z”,“timetamp”:68557760000},https:\/\/doi.org\/10.15223\/policy-012“},{“开始”:{“日期部分”:[[2023,6,1]],“date-time”:“2023-06-01T00:00:00Z”,“timestamp”:1685577600000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2023,6,1]],“datetime”:“206-01T00:00”,“时间戳”:16855077600000neneneep,“content-version”:“st m-asf“,”delay-in-days“:0,”URL“:”https:\/\/doi.org\/10.15223\/policy-004“}],“content-domain”:{“domain”:[“elsevier.com”,“sciencedirect.com”],“crossmark-restriction”:true},“short-container-title”:[“Computers&Security”],”published-print“:{”date-parts“:[[2023,6]]},”DOI“:”10.1016\/j.cose.2023.103205“,”type“:”journal-article“,”created“:”{“date-partts”:[2023,3,24]],“date-time”:“2023-03-24T16:”28:24Z“,”时间戳“:1679675304000},“page”:“103205”,“update-policy”:”http://\/dx.doi.org\/10.1016\/elsevier_cm_policy“,”source“:”Crossref“,“is-referenced-by-count”:9,“title”:[“针对基于联合学习的入侵检测的中毒攻击的两阶段防御”],“前缀”:“10.1016”,“卷”:“129”,”author“:[{”ORCID“:“http://\ORCID.org\/00000-0003-3695-5784”,“authenticated-orcid”:false,“given”:“Yuan-Cheng”,“family”:“Lai”,“sequence”:“first”,“affiliation”:[]},{“givent”:“Jheng-Yan”,“家庭”:“Lin”,“序列”:“additional”,“从属关系”:[]},}“giving”:“英达尔”,《家庭》:“林”,“顺序”:“附加”,“附属关系”:【】},“orcid”:”http://\orcid.org\/00000-7996-4184“,”authenticated-orcid“:false,”given“:“仁宏”,“家族”:“黄”,“序列”:“附加”,“从属关系”:[]},{“给定”:“朴钦”,“家庭”:“林”,“顺序”:“额外”,“附属关系”:[]}“成员”:“78”,“引用”:[{“问题”:“108693”,“key”:“10.1016\/j.cose.2023.103205_bib0001”,“article-title”:“物联网设备恶意软件检测的联合学习”,“volume”:”204“,“author”:“Rey”,“year”:“2022”,“journal-title“:“Computer Networks”},{“key“:”10.1016\\j.cose.2023.03205_bin0002“,“series-title”:“国际黑海通信与网络会议(BlackSeaCom)”,“首页”:“1”,“文章标题”:“隐私保护入侵检测的联合模拟学习”,“作者”:“Al-Marri”,“年份”:“2020”},{“key”:“10.1016\/j.cose.2023.103205_bib0003”,“series-title”:“第39届分布式计算系统国际会议(ICDCS)”,“首页”:“756”,“文章标题”:“D\u00cfoT:物联网的联合自学习异常检测系统”,“作者”:“Nguyen”,“年份”:“2019”},{“key”:“10.1016\/j.cose.2023.103205_bib0004”,“非结构化”:“N.Papernot,P.McDaniel,A.Sinha,and M。Wellman,\u201cTowards the Science of Security and Privacy in Machine Learning,预印本arXiv:1611.038142016。doi:10.44850\/arXiv.1611.03814“},{“key”:“10.1016\/j.cose.2023.103205_bib0005”,“系列标题”:“数据库中的机器学习和知识发现欧洲联合会议”,“首页”:“387”,“文章标题”:“测试时对机器学习的规避攻击”,“作者”:“Biggio”,“年份”:“2013”},{“key”:“10.1016\/j.cose.2023.103205_bib0006”,“series-title“:”第29届国际机器学习会议“,”first page“:”1467“,”article-title“:“针对支持向量机的中毒攻击”,”author“:”Biggio“,”year“:”2012“},{“key”:“10.1016\/j.cose.2023.103205_bib0007”,”doi-asserted-by“:”crossref“,”首页“:”53“,”doi“:”10.1016\/j.neucom.2014.08.081“,”article-title“:”对抗性标签污染下的支持向量机“,”volume“:”160“,”author“:”Xiao“,”year“:”2015“,”journal-title”:“Neurocomputing”},{“key”:“10.1016\/j.cose.2023.103205_bib0008”,“series-title”:”IEEE安全与隐私研讨会(SP)“,”首页“:”707“,”article-title“Neural Cleanse:识别和缓解神经网络中的后门攻击”,“author”:“Wang”,“year”:“2019”},{“key”:“10.1016\/j.cose.2023.103205_bib0009”,“series-title”:“第18届IEEE计算与通信信任、安全和隐私国际会议\/第13届IEEE大数据科学与工程国际会议(TrustCom\/BigDataSE)“,“首页”:“374”,“文章标题”:“使用生成对抗网的联合学习中的毒药攻击”,“作者”:“张”,“年份”:“2019”},{“问题”:“5”,“key“:”10.1016\/j.cose.2023.103205_bib0010“,”doi-asserted-by“:”crossref“,”first-page“:”3310“,”doi“:”101109\/JIOT.2020.3023126“,”article-title“:”毒药:“毒药:针对边缘计算系统中联合学习的生成毒药攻击”,“volume”:“8”,“author”:“Zhang”,“year”:“2020”,“journal-title”:“IEEE物联网杂志”},{“key”:”10.1016\/j.cose.2023.103205_bib0011“,“series-title”:“人工智能与统计国际会议”,“首页”:“2938”,“article-title”:“How to Backdoor Federated Learning”,“author”:“Bagdasaryan”,“year”:“2020”},{“issue”:“3”,“key”:10.3390\/fi13030073“,”article-title“:”对联合学习的深度模型中毒攻击“,”volume“:”13“,”author“:”Zhou“,”year“:”2021“,”journal-title”:“未来互联网”},{“key”:“10.1016\/j.cose.2023.103205_bib0013”,“series-title”:”Workshop Decentralized IoT Syst.Secur(DISS)“,”first page“:“1”,“article-title”“:”基于联合学习的物联网入侵检测系统中毒攻击”,“作者”:“Nguyen”,“年份”:“2020”},{“密钥”:“10.1016\/j.cose.2023.103205_bib0014”,“series-title”:“IEEE第44届计算机、软件和应用年会(COMPSAC)”,“首页”:“1183”,“文章标题”:“使用区块链技术提高联合学习系统的安全性”,“author”:“Short”,“year”:“2020”},{“key”:“10.1016\/j.cose.2023.103205_bib0015”,“article-title”:“D2MIF:一种用于联合学习的恶意模型检测机制,支持人工智能的事物”,“author”:“Liu”,“年份”:“2021”,“新闻标题”:“IEEE物联网杂志“},{“key”:“10.1016\/j.cose.2023.103205_bib0016”,“series-title”:“IEEE第十八届消费者通信与网络会议(CCNC)”,“首页”:“1”,“article-title”:《缓解联邦学习边缘计算网络上的数据中毒攻击》,“author”:“Doku”,“year”:“2021”}10.1016\/j.cose.2023.103205_bib0017“,“series-title”:“IEEE全球通信会议(GLOBECOM)”,“首页”:“1”,“article-title”:“联邦学习中基于成本效益的洗牌和重组防御”,“author”:“Huang”,“year”:“2021”},{“key”:”10.1016\\j.cose.2023.03205_bbb0018“,”doi-asserted-by“:”crossref“,“first-page”:“217463”,“doi”:“10.1109\/ACCESS.2020.3041793“,”article-title“:”基于联合学习的无线边缘网络入侵检测“,”volume“:”8“,”author“:”Chen“,”year“:”2020“,”journal-title”:“IEEE ACCESS”},{“key”:“10.1016\/j.cose.2023.103205_bib0019”,”doi-asserted-by“:”crossref“,”unstructured“:”j.Zhou,N.Wu,Y.Wang,S.Gu,Z.Cao,X。Dong等人。,\u201cA Differentially Private Federated Learning Model against Poisoning Attacks in Edge Computing,\u201d IEEE Transactions on Reliable and Secure Computing。doi:10.1109\/TDSC.2022.3168556“,”doi“:”10.1109\/TDC.2022.3168556“},{“key”:“10.1016\/j.cose.2023.103205_bib0020”,“series-title”:“IEEE国际并行与分布式处理研讨会(IPDPS)”,“首页”:“671”,“文章-标题”:“从条件变分自动编码器的联合学习中检测恶意模型更新”,“作者”:“Gu“,”year“:“2021”},{“issue”:“2”,“key”:“10.1016\/j.cose.2023.103205_bib0021”,“doi-asserted-by”:“crossref”,“first-pages”:“1”,”doi“:”10.1145\/3298981“,”article-title“:”联合机器学习:概念和应用“,”volume“:”10“,”author“:”Yang“,”year“:”2019“,”journal title“:“ACM Transactions on Intelligent Systems and Technology(TIST)”},{“key“:”10.1016\/j.cose.2023.103205_bib0022“,”series-title“:”第二次分布式基础设施深度学习研讨会“,”first page“:“1”,”article-title“:“联合学习算法的性能评估”,”author“:”Nilsson“,”year“:”2018“},{“issue”:“3.24”,“key”:“10.1016\/j.cose.2023.103205_bib 0023”,”firstpage“”:“479”,”article-titel“:”《CICIDS2017入侵检测系统设计数据集详细分析》,“卷”:“7”,“作者”:“Panigrahi”,“年份”:“2018年”,“期刊标题”:“国际工程技术杂志”。“},{”issue“:”5“,”key“:”10.1016\/j.cose.2023.103205_bib0024“,”doi-asserted-by“:”crossref“,”doi“:”101109\/TNN.1998.712192“,”article-title“:”强化学习:简介“,”volume“:“9”,”author“:”Sutton“,”year“:”1998“,”journal-title”:“IEEE Transactions on Neural Networks”},“,”非结构化“:”V。Mnih,K.Kavukcuoglu,D.Silver,A.Graves,I.Antonoglou,D.Wierstra,和M.Riedmiller,《用深度强化学习来玩阿塔里》,《arXiv预印本arXiv:1312.56022013》。doi:10.48550\/ArXiv.1312.5602“},{“key”:“10.1016\/j.cose.2023.103205_bib0026”,“series-title”:“康涅狄格州希尔斯代尔夏令营学校,新泽西州劳伦斯·埃尔鲍姆”,“article-title”:《使用函数逼近进行强化学习的问题》,“author”:“Thrun”,“year”:“1993”},}“keys”:“1016\/j.cose.2023.1032005_bib027”,“series-title“:”ACM SIGMOD国际数据管理会议”,“首页”:“93”,“article-title”:“LOF:识别基于密度的本地异常值”,“author”:“Breunig”,“year”:“2000”},{“issue”:“3”,“key”:“10.1016\/j.cose.2023.103205_bib0028”,“first-page”:“96”,“article-title”:“局部异常因子算法在检测计算机网络异常中的应用”,“卷”:“24”,“作者”:“Auskalnis”,“年份”:“2017”,“期刊标题”:“Elektronika ir Elektrotechnika”},{“问题”:“9”,“密钥”:“10.1016\/j.cose.2023103205_bib0029”,“doi断言者”:“crossref”,“首页”:“9575”,“doi”:“10.1109\/TIE.20213114740”,“文章标题”:“使用改进的局部离群因子和核支持向量回归预测电能计量设备的测量误差”,“卷”:“69”,“作者”:“Ma”,“年份”:“2022”,“期刊标题”:“IEEE工业电子学报”},{“问题”:“2663”,“关键”:“10.1016\/j.cose.2023.103205_bib0030”,“文章标题”:联合学习的连锁异常检测模型:入侵检测案例研究”,“卷”:“8”,“作者”:“Preuveneers”,“年份”:“2018年”,“期刊标题”:“应用科学”},{“密钥”:“10.1016\/j.cose.2023.103205_bib0031”,“series-title”:“IEEE第八届网络软件化国际会议(NetSoft)”,“article-title”:FedSA:使用联邦模拟退火加速协作环境中的入侵检测”,“author”:“Neto”,“year”:“2022”},{“key”:“10.1016\/j.cose.2023.103205_bib0032”,“unstructured”:“A.Madry,A.Makelov,L.Schmidt,D.Tsipras,A。Vladu,\u201cTowards Deep Learning Models Resistant to Adversarial Attacks,\u201 d arXiv预印本arXiv:1706.060832017。doi:10.48550\/arXiv.1706.06083“},{“key”:“10.1016\/j.cose.2023.103205_bib0033”,“series-title”:“第三届ACM CoNEXT数据通信网络大数据、机器学习和人工智能研讨会”,“首页”:“8”,“文章-标题”:“筑起入侵检测系统的后门”,“作者”:“Bachl”,“年份”:“2019”}],“container-title”:[”计算机与安全“],”原始标题“:[],”语言“:”en“,”链接“:[{”URL“:”https:\/\/api.elsevier.com\/content\/article\/PII:S016704823001153?httpAccept=text\/xml“,”内容类型“:”text\/xml“,”内容版本“:”vor“,”预期应用程序“:”文本挖掘“},{”URL“:”https:\/\/api.elsevier.com\/content\/article\/PII:S016740042823001153?httpAccept=text\/plain“,”content-type“:”text\/prain“,“content-version”:“vor”,“intended-application”:“text-mining”}],“deposed”:{“date-parts”:[[2023,11,25]],“date-time”:“2023-11-25T03:12:20Z”,“timestamp”:170088140000},“score”:1,“resource”:{“primary”:“URL”:“https:\\/linkinghub.elsevier.com/retrieve\/pii\/S016740482 3001153“}},”副标题“:[],”shorttitle“:[],”issued“:{”date-parts“:[[2023,6]]},”references-count“:33,”alternative-id“:[”S016740482301153“],”URL“:”http://\/dx.doi.org\/10.1016\/j.cose.2023.103205“,”relation“:{},“ISSN”:[“0167-4048”],“ISSN-type”:[{“value”:“0167-4048”,“type”:“print”}],“subject”:【】,“published”:{“date-parts”:[[2023,6]]},“assertion”:[{“value”:“Elsevier”,“name”:“publisher“,”label“:”本文由“},”{“value”:“针对基于联合学习的入侵检测的中毒攻击的两阶段防御”,“name”:“articletite”,“label”:“article Title”},{“value”:“Computers&Security”,“name”:“journaltitle”,“table”:“Journal Title“}”,{”value“:”https:\/\/doi.org\/101016\/j.cose.2023.103205“,“name“:”articlelink“,”label“:”CrossRef DOI link to publisher maintained version“},{“value”:“article”,“name”:“content_type”,“label”:“content-type”},}“value”:“\u00a9 2023 Elsevier Ltd.保留所有权利。”,“名称”:“版权”,“标签”:“copyright”}],“文章编号”:“103205”}